首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   465篇
  免费   168篇
  国内免费   17篇
化学   59篇
晶体学   3篇
力学   26篇
综合类   32篇
数学   124篇
物理学   406篇
  2024年   1篇
  2023年   11篇
  2022年   50篇
  2021年   48篇
  2020年   31篇
  2019年   20篇
  2018年   14篇
  2017年   23篇
  2016年   23篇
  2015年   21篇
  2014年   43篇
  2013年   38篇
  2012年   20篇
  2011年   34篇
  2010年   37篇
  2009年   29篇
  2008年   35篇
  2007年   36篇
  2006年   26篇
  2005年   30篇
  2004年   15篇
  2003年   10篇
  2002年   12篇
  2001年   6篇
  2000年   6篇
  1999年   5篇
  1998年   8篇
  1997年   6篇
  1996年   2篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1982年   1篇
  1980年   1篇
排序方式: 共有650条查询结果,搜索用时 31 毫秒
1.
Quantum Key Distribution Using Four-Qubit W State   总被引:3,自引:0,他引:3  
A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.  相似文献   
2.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
3.
本文给出了关系数据库模式中求解关键字的一个算法。算法很简洁并且对于[1]定义的一大类问题,执行时间是多项式级的。  相似文献   
4.
Construction of the side chain of brassrnolide and its related compounds by the aldolreaction of lithofuran with 22-steroidal aldehyde obtained from hyodeoxycholic acid isdescribed. A key intermediate, 22R, 23R-γ-hydroxy-α, β-unsaturated lactone (16) wassynthesized.  相似文献   
5.
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exceed the basic rate-distance limit without quantum repeaters. Its variant protocol, sending or not-sending quantum key distribution (SNS-QKD), not only fixes the security vulnerability of TF-QKD, but also can tolerate large misalignment errors. However, the current SNS-QKD protocol is based on the active decoy-state method, which may lead to side channel information leakage when multiple light intensities are modulated in practice. In this work, we propose a passive decoy-state SNS-QKD protocol to further enhance the security of SNS-QKD. Numerical simulation results show that the protocol not only improves the security in source, but also retains the advantages of tolerating large misalignment errors. Therefore, it may provide further guidance for the practical application of SNS-QKD.  相似文献   
6.
Software maintenance is indispensable in the software development process. Developers need to spend a lot of time and energy to understand the software when maintaining the software, which increases the difficulty of software maintenance. It is a feasible method to understand the software through the key classes of the software. Identifying the key classes of the software can help developers understand the software more quickly. Existing techniques on key class identification mainly use static analysis techniques to extract software structure information. Such structure information may contain redundant relationships that may not exist when the software runs and ignores the actual interaction times between classes. In this paper, we propose an approach based on dynamic analysis and entropy-based metrics to identify key classes in the Java GUI software system, called KEADA (identifying KEy clAsses based on Dynamic Analysis and entropy-based metrics). First, KEADA extracts software structure information by recording the calling relationship between classes during the software running process; such structure information takes into account the actual interaction of classes. Second, KEADA represents the structure information as a weighted directed network and further calculates the importance of each node using an entropy-based metric OSE (One-order Structural Entropy). Third, KEADA ranks classes in descending order according to their OSE values and selects a small number of classes as the key class candidates. In order to verify the effectiveness of our approach, we conducted experiments on three Java GUI software systems and compared them with seven state-of-the-art approaches. We used the Friedman test to evaluate all approaches, and the results demonstrate that our approach performs best in all software systems.  相似文献   
7.
This paper develops a QKD (quantum key distribution)-based queueing model to investigate the data delay on QKD link and network, especially that based on trusted relays. It shows the mean packet delay performance of the QKD system. Furthermore, it proposes a key buffering policy which could effectively improve the delay performance in practice. The results will be helpful for quality of service in practical QKD systems.  相似文献   
8.
Qiang Lai 《中国物理 B》2022,31(6):68905-068905
The identification of key nodes plays an important role in improving the robustness of the transportation network. For different types of transportation networks, the effect of the same identification method may be different. It is of practical significance to study the key nodes identification methods corresponding to various types of transportation networks. Based on the knowledge of complex networks, the metro networks and the bus networks are selected as the objects, and the key nodes are identified by the node degree identification method, the neighbor node degree identification method, the weighted k-shell degree neighborhood identification method (KSD), the degree k-shell identification method (DKS), and the degree k-shell neighborhood identification method (DKSN). Take the network efficiency and the largest connected subgraph as the effective indicators. The results show that the KSD identification method that comprehensively considers the elements has the best recognition effect and has certain practical significance.  相似文献   
9.
Zhongqi Sun 《中国物理 B》2021,30(11):110303-110303
Reference-frame-independent quantum key distribution (RFI-QKD) can allow a quantum key distribution system to obtain the ideal key rate and transmission distance without reference system calibration, which has attracted much attention. Here, we propose an RFI-QKD protocol based on wavelength division multiplexing (WDM) considering finite-key analysis and crosstalk. The finite-key bound for RFI-QKD with decoy states is derived under the crosstalk of WDM. The resulting secret key rate of RFI-QKD, which is more rigorous, is obtained. Simulation results reveal that the secret key rate of RFI-QKD based on WDM is affected by the multiplexing channel number, as well as crosstalk between adjacent channels.  相似文献   
10.
长距离长期稳定的量子密钥分发系统   总被引:6,自引:0,他引:6       下载免费PDF全文
介绍了最近完成的长距离长期稳定的量子密钥分发系统.该系统利用往返光路补偿光纤偏振 抖动和相位漂移的原理,采用结电容平衡魔T网络耦合的单光子探测技术,在506km单模 光纤中实现了长时间(大于12h)稳定的量子密钥分发实验.单脉冲平均光子数为007, 误码率为4%,其中单光子探测器的探测效率大于5%,单脉冲暗计数低于29×10-6. 关键词: 量子保密通信 量子密钥分发 单光子探测  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号