首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3795篇
  免费   243篇
  国内免费   460篇
化学   2582篇
晶体学   27篇
力学   171篇
综合类   42篇
数学   1317篇
物理学   359篇
  2024年   4篇
  2023年   83篇
  2022年   148篇
  2021年   149篇
  2020年   170篇
  2019年   151篇
  2018年   96篇
  2017年   127篇
  2016年   152篇
  2015年   93篇
  2014年   159篇
  2013年   248篇
  2012年   143篇
  2011年   165篇
  2010年   141篇
  2009年   204篇
  2008年   199篇
  2007年   221篇
  2006年   222篇
  2005年   185篇
  2004年   182篇
  2003年   209篇
  2002年   160篇
  2001年   136篇
  2000年   115篇
  1999年   124篇
  1998年   85篇
  1997年   96篇
  1996年   66篇
  1995年   64篇
  1994年   43篇
  1993年   28篇
  1992年   29篇
  1991年   23篇
  1990年   21篇
  1989年   7篇
  1988年   8篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   5篇
  1983年   3篇
  1982年   4篇
  1981年   1篇
  1979年   5篇
  1977年   1篇
  1972年   3篇
  1971年   1篇
排序方式: 共有4498条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
We examine two criteria for balance of a gain graph, one based on binary cycles and one on circles. The graphs for which each criterion is valid depend on the set of allowed gain groups. The binary cycle test is invalid, except for forests, if any possible gain group has an element of odd order. Assuming all groups are allowed, or all abelian groups, or merely the cyclic group of order 3, we characterize, both constructively and by forbidden minors, the graphs for which the circle test is valid. It turns out that these three classes of groups have the same set of forbidden minors. The exact reason for the importance of the ternary cyclic group is not clear. © 2005 Wiley Periodicals, Inc. J Graph Theory  相似文献   
5.
A (w,r) cover‐free family is a family of subsets of a finite set such that no intersection of w members of the family is covered by a union of r others. A (w,r) superimposed code is the incidence matrix of such a family. Such a family also arises in cryptography as the concept of key distribution pattern. In the present paper, we give some new results on superimposed codes. First we construct superimposed codes from super‐simple designs which give us results better than superimposed codes constructed by other known methods. Next we prove the uniqueness of the (1,2) superimposed code of size 9 × 12, the (2,2) superimposed code of size 14 × 8, and the (2,3) superimposed code of size 30 × 10. Finally, we improve numerical values of upper bounds for the asymptotic rate of some (w,r) superimposed codes. © 2004 Wiley Periodicals, Inc.  相似文献   
6.
Poly(pyridine ether)s were prepared in two ways: the polycondensation of silylated 1,1,1‐tris(4‐hydroxyphenyl)ethane (THPE) with 2,6‐difluoropyridine (method A) and the polycondensation of free THPE with 2,6‐dichloropyridine (method B). With method A, the THPE/difluoropyridine feed ratio was varied from 1.0:1.0 to 1.0:1.6. Cycles, bicycles, and multicycles were the main reaction products, and crosslinking was never observed. When ideal stoichiometry was used exclusively, multicycles free of functional groups were obtained. These multicycles were detectable in matrix‐assisted laser desorption/ionization time‐of‐flight (MALDI‐TOF) mass spectra up to B38C76 with a mass of approximately 32,000 Da. With method B, the reaction conditions were varied at a fixed feed ratio to achieve an optimum for the preparation of multicyclic polyethers, but because of the lower reactivity of 2,6‐dichloropyridine, a quantitative conversion was not achieved. The reaction products were characterized with MALDI‐TOF mass spectrometry, viscosity measurements, and size exclusion chromatography. © 2004 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 42: 5725–5735, 2004  相似文献   
7.
We give a Gray code and constant average time generating algorithm for derangements, i.e., permutations with no fixed points. In our Gray code, each derangement is transformed into its successor either via one or two transpositions or a rotation of three elements. We generalize these results to permutations with number of fixed points bounded between two constants.  相似文献   
8.
The covering radius of all ternary cyclic codes of length up to 25 is given. Some of the results were obtained by computer and for others mathematical reasonings were applied. The minimal distances of all codes were recalculated.  相似文献   
9.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
10.
We determine all linear codes C containing the constant code E, for which there is a weight-preserving group of semilinear automorphisms which acts transitively on the set of nontrivial cosets of E in C. Michael Giudici - The author holds an Australian Postdoctoral Fellowship.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号