首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   167篇
  免费   6篇
化学   5篇
数学   68篇
物理学   11篇
无线电   89篇
  2023年   3篇
  2022年   6篇
  2021年   2篇
  2020年   7篇
  2019年   1篇
  2018年   2篇
  2017年   4篇
  2016年   8篇
  2015年   4篇
  2014年   13篇
  2013年   12篇
  2012年   5篇
  2011年   6篇
  2010年   11篇
  2009年   11篇
  2008年   4篇
  2007年   5篇
  2006年   15篇
  2005年   9篇
  2004年   3篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   2篇
  1999年   5篇
  1998年   3篇
  1997年   4篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1989年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
排序方式: 共有173条查询结果,搜索用时 87 毫秒
1.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (nt+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis [3] for all nt ≥ 2.  相似文献   
2.
In several recent investigations dealing with the economic order quantity with permissible delay in payments, the following assumptions are made:  相似文献   
3.
4.
一种完整的非对称公钥叛逆者追踪方案   总被引:2,自引:0,他引:2  
利用不经意多项式估值协议,该文提出了一种新的非对称公钥叛逆者追踪方案。当参与共谋的叛逆者数量不超过预先设置的范围时,与现有的非对称公钥追踪方案相比,该方案能够以完全的黑盒子追踪方式准确地确定出全部叛逆者;借助于密钥更新,该方案具有完善的撤销性,能够撤销任意数量的叛逆者。此外,与已有方案相比该方案显著降低了追踪时的计算量并且有着更高的传输效率。  相似文献   
5.
本文所讨论的范围主要集中在与集成电路芯片技术相关的案件,这些与芯片技术相关的案件中涉及最多的是专利和商业秘密的问题。本文将对集成电路领域有关商业秘密类型案件的司法鉴定问题进行介绍和探讨。  相似文献   
6.
二层信用策略下部分延期付款的库存模型   总被引:1,自引:0,他引:1  
当前二层信用期相关文献考虑的都是零售商提供给其顾客相同的信用期,但现实中零售商往往会根据物品的种类不同提供给顾客不同的信用期.为研究此问题,建立了优化供货周期使零售商平均相关成本最小的库存模型,证明了最优供货周期的存在性,并给出实例加以说明.  相似文献   
7.
On the Contrast in Visual Cryptography Schemes   总被引:16,自引:0,他引:16  
A visual cryptography scheme is a method to encode a secret image SI into shadow images called shares such that certain qualified subsets of shares enable the ``visual' recovery of the secret image. The ``visual' recovery consists of xeroxing the shares onto transparencies, and then stacking them. The shares of a qualified set will reveal the secret image without any cryptographic computation. In this paper we analyze the contrast of the reconstructed image in k out of n visual cryptography schemes. (In such a scheme any k shares will reveal the image, but no set of k-1 shares gives any information about the image.) In the case of 2 out of n threshold schemes we give a complete characterization of schemes having optimal contrast and minimum pixel expansion in terms of certain balanced incomplete block designs. In the case of k out of n threshold schemes with we obtain upper and lower bounds on the optimal contrast. Received 27 September 1996 and revised 13 February 1998  相似文献   
8.
We consider project scheduling where the project manager’s objective is to minimize the time from when an adversary discovers the project until the completion of the project. We analyze the complexity of the problem identifying both polynomially solvable and NP-hard versions of the problem. The complexity of the problem is seen to be dependent on the nature of renewable resource constraints, precedence constraints, and the ability to crash activities in the project.  相似文献   
9.
In a supplier-retailer-buyer supply chain, the supplier frequently offers the retailer a trade credit of S periods, and the retailer in turn provides a trade credit of R periods to her/his buyer to stimulate sales and reduce inventory. From the seller’s perspective, granting trade credit increases sales and revenue but also increases opportunity cost (i.e., the capital opportunity loss during credit period) and default risk (i.e., the percentage that the buyer will not be able to pay off her/his debt obligations). Hence, how to determine credit period is increasingly recognized as an important strategy to increase seller’s profitability. Also, many products such as fruits, vegetables, high-tech products, pharmaceuticals, and volatile liquids not only deteriorate continuously due to evaporation, obsolescence and spoilage but also have their expiration dates. However, only a few researchers take the expiration date of a deteriorating item into consideration. This paper proposes an economic order quantity model for the retailer where: (a) the supplier provides an up-stream trade credit and the retailer also offers a down-stream trade credit, (b) the retailer’s down-stream trade credit to the buyer not only increases sales and revenue but also opportunity cost and default risk, and (c) deteriorating items not only deteriorate continuously but also have their expiration dates. We then show that the retailer’s optimal credit period and cycle time not only exist but also are unique. Furthermore, we discuss several special cases including for non-deteriorating items. Finally, we run some numerical examples to illustrate the problem and provide managerial insights.  相似文献   
10.
In 2014, Wang et al. (2014) extended the model of Lou and Wang (2012) to incorporate the credit period dependent demand and default risk for deteriorating items with maximum lifetime. However, the rates of demand, default risk and deterioration in the model of Wang et al. (2014) are assumed to be specific functions of credit period which limits the contributions. In this note, we first generalize the theoretical results of Wang et al. (2014) under some certain conditions. Furthermore, we also present some structural results instead of a numerical analysis on variation of optimal replenishment and trade credit strategies with respect to key parameters.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号