首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   79篇
  免费   8篇
  国内免费   5篇
化学   4篇
力学   4篇
综合类   1篇
数学   69篇
物理学   14篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2014年   1篇
  2013年   5篇
  2012年   4篇
  2011年   3篇
  2010年   4篇
  2009年   5篇
  2008年   3篇
  2007年   4篇
  2006年   6篇
  2005年   4篇
  2004年   9篇
  2003年   6篇
  2002年   8篇
  2001年   1篇
  2000年   1篇
  1999年   5篇
  1998年   5篇
  1997年   4篇
  1996年   4篇
  1995年   1篇
  1992年   1篇
  1982年   1篇
排序方式: 共有92条查询结果,搜索用时 15 毫秒
1.
Gilmer and Heinzer proved that given a reduced ring R, a polynomial f divides a monic polynomial in R[X] if and only if there exists a direct sum decomposition of R = R0 ⊕ … ⊕ Rm (m ≤ deg f), associated to a fundamental system of idempotents e0, … , em, such that the component of f in each Ri[X] has degree coefficient which is a unit of Ri. We propose to give an algorithm to explicitly find such a decomposition. Moreover, we extend this result to divisors of doubly monic Laurent polynomials.  相似文献   
2.
A combinatorial method of encryption with a similarity to the classical scheme of linear coding has been suggested by the author. The general idea is to treat vertices of a graph as messages and arcs of a certain length as encryption tools. We will study the quality of such an encryption in the case of graphs of high girth by comparing the probability to guess the message, (vertex) at random with the probability of breaking the key, i.e. guessing the encoding arc. In fact, the quality is good for graphs which are close to the Erdös bound, defined by the Even Cycle Theorem.In the case of parallelotopic graphs, there is a uniform way to match arcs with strings in a certain alphabet. Among parallelotopic graphs we distinguish linguistic graphs of affine type whose vertices (messages) and arcs (encoding tools) both could be naturally identified with vectors over the GF(q), and neighbors of the vertex defined by a system of linear equations. We will discuss families of linguistic and parallelotopic graphs of increasing girth as the source for assymmetric cryptographic functions and related open key algorithms.Several constructions of families of linguistic graphs of high girth with good quality, complexity and expansion coefficients will be considered. Some of those constructions have been obtained via group-theoretical and geometrical techniques.  相似文献   
3.
给出解决微分中值问题时,所需辅助函数的构造程式,并通过实例加以详细解释.所给程式具有一定的可操作性,可帮助学生掌握同类问题解决方案中的规律性.  相似文献   
4.
The aim of this paper is to give a purely logical construction of repletion, i.e. the reflection of an arbitrary set to a replete one. Replete sets within constructive logic were introduced independently by M. Hyland and P. Taylor as the most restrictive but sufficiently general notion of predomain suitable for the purposes of denotational semantics à la Scott.For any set A its repletion R(A) appears as an inductively defined subset of S2(A) (A S) S which can be expressed within the internal language of a model of type theory. More explicitly, R(A) is the least subset of S2(A) containing all point filters and closed under a class of generalised limit processes. Improvements of our construction arise from several results saying that it suffices for the purpose of repletion to consider more restrictive classes of generalised limit processes.  相似文献   
5.
We study into the relationship between constructivizations of an associative commutative ring K with unity and constructivizations of matrix groups GL n(K) (general), SL n(K) (special), and UT n(K) (unitriangular) over K. It is proved that for n 3, a corresponding group is constructible iff so is K. We also look at constructivizations of ordered groups. It turns out that a torsion-free constructible Abelian group is orderly constructible. It is stated that the unitriangular matrix group UT n(K) over an orderly constructible commutative associative ring K is itself orderly constructible. A similar statement holds also for finitely generated nilpotent groups, and countable free nilpotent groups.  相似文献   
6.
Computable Homogeneous Boolean Algebras and a Metatheorem   总被引:1,自引:0,他引:1  
We consider computable homogeneous Boolean algebras. Previously, countable homogeneous Boolean algebras have been described up to isomorphism and a simple criterion has been found for the existence of a strongly constructive (decidable) isomorphic copy for such. We propose a natural criterion for the existence of a constructive (computable) isomorphic copy. For this, a new hierarchy of -computable functions and sets is introduced, which is more delicate than Feiner's. Also, a metatheorem is proved connecting computable Boolean algebras and their hyperarithmetical quotient algebras.  相似文献   
7.
Within the framework of Bishop's constructive mathematics, we give conditions under which a bounded convex subset of a uniformly smooth normed space over is located, extending results presented recently by F. Richman and H. Ishihara for subsets of a Hilbert space.

  相似文献   

8.
9.
考虑一类推广后的Feigenbaum函数方程{g(0)=1,-1≤g(x)≤1,x∈[-1,1],h(g(x))=g(g(h(x)))其中h(x)是[-1,1]上的递减光滑奇函数且满足h(0)=0,-1〈h’(x)〈0,z∈[-1,1].利用构造性方法讨论上述方程的光滑解的存在性及唯一性.  相似文献   
10.
The continuum as a formal space   总被引:1,自引:0,他引:1  
A constructive definition of the continuum based on formal topology is given and its basic properties studied. A natural notion of Cauchy sequence is introduced and Cauchy completeness is proved. Other results include elementary proofs of the Baire and Cantor theorems. From a classical standpoint, formal reals are seen to be equivalent to the usual reals. Lastly, the relation of real numbers as a formal space to other approaches to constructive real numbers is determined. Received: 11 November 1996  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号