首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6120篇
  免费   428篇
  国内免费   186篇
化学   1020篇
晶体学   9篇
力学   168篇
综合类   41篇
数学   3698篇
物理学   488篇
无线电   1310篇
  2024年   8篇
  2023年   32篇
  2022年   87篇
  2021年   119篇
  2020年   128篇
  2019年   252篇
  2018年   276篇
  2017年   135篇
  2016年   146篇
  2015年   195篇
  2014年   382篇
  2013年   416篇
  2012年   333篇
  2011年   532篇
  2010年   411篇
  2009年   463篇
  2008年   468篇
  2007年   514篇
  2006年   398篇
  2005年   238篇
  2004年   200篇
  2003年   209篇
  2002年   102篇
  2001年   54篇
  2000年   72篇
  1999年   76篇
  1998年   63篇
  1997年   55篇
  1996年   54篇
  1995年   41篇
  1994年   49篇
  1993年   36篇
  1992年   32篇
  1991年   19篇
  1990年   14篇
  1989年   16篇
  1988年   17篇
  1987年   19篇
  1986年   13篇
  1985年   19篇
  1984年   10篇
  1983年   7篇
  1982年   4篇
  1981年   2篇
  1980年   6篇
  1979年   5篇
  1978年   2篇
  1977年   2篇
  1975年   1篇
  1974年   1篇
排序方式: 共有6734条查询结果,搜索用时 218 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
In this paper, let (Mn,g,dμ) be n-dimensional noncompact metric measure space which satisfies Poincaré inequality with some Ricci curvature condition. We obtain a Liouville theorem for positive weak solutions to weighted p-Lichnerowicz equation
p,fv+cvσ=0,
where c0,m>n1,1<p<m?1+(m?1)(m+3)2,σp?1 are real constants.  相似文献   
3.
We relate the distribution characters and the wave front sets of unitary representation for real reductive dual pairs of type I in the stable range.  相似文献   
4.
基于击键动力学和口令的双因素用户验证   总被引:1,自引:0,他引:1  
提出基于击键动力学和口令的一种新的身份验证方法,该方法监视用户在输入口令时的用户击键特征的有关数据,通过采用监视键盘输入时一种新的三键持续时间的击键特征表示,用一种表示用户节奏的相对击键速度的距离衡量方式,在正常样本上建立用户模式,然后用新样本与用户模式的距离匹配情况来验证用户身份的合法性。实验表明该方法简单实用,识别效率高。  相似文献   
5.
6.
In this paper we give a realization of some symmetric space G/K as a closed submanifold P of G. We also give several equivalent representations of the submanifold P. Some properties of the set gKP are also discussed, where gK is a coset space in G.  相似文献   
7.
This study focuses on the constructions in terms of area and perimeter in equivalent triangles developed by students aged 12–15 years-old, using the tools provided by Cabri-Geometry II [Labore (1990). Cabri-Geometry (software), Université de Grenoble]. Twenty-five students participated in a learning experiment where they were asked to construct: (a) pairs of equivalent triangles “in as many ways as possible” and to study their area and their perimeter using any of the tools provided and (b) “any possible sequence of modifications of an original triangle into other equivalent ones”. As regards the concept of area and in contrast to a paper and pencil environment, Cabri provided students with different and potential opportunities in terms of: (a) means of construction, (b) control, (c) variety of representations and (d) linking representations, by exploiting its capability for continuous modifications. By exploiting these opportunities in the context of the given open tasks, students were helped by the tools provided to develop a broader view of the concept of area than the typical view they would construct in a typical paper and pencil environment.  相似文献   
8.
For X a metrizable space and (Y,ρ) a metric space, with Y pathwise connected, we compute the density of (C(X,(Y,ρ)),σ)—the space of all continuous functions from X to (Y,ρ), endowed with the supremum metric σ. Also, for (X,d) a metric space and (Y,‖⋅‖) a normed space, we compute the density of (UC((X,d),(Y,ρ)),σ) (the space of all uniformly continuous functions from (X,d) to (Y,ρ), where ρ is the metric induced on Y by ‖⋅‖). We also prove that the latter result extends only partially to the case where (Y,ρ) is an arbitrary pathwise connected metric space.To carry such an investigation out, the notions of generalized compact and generalized totally bounded metric space, introduced by the author and A. Barbati in a former paper, turn out to play a crucial rôle. Moreover, we show that the first-mentioned concept provides a precise characterization of those metrizable spaces which attain their extent.  相似文献   
9.
Given a graph Γ, we construct a simple, convex polytope, dubbed graph-associahedra, whose face poset is based on the connected subgraphs of Γ. This provides a natural generalization of the Stasheff associahedron and the Bott-Taubes cyclohedron. Moreover, we show that for any simplicial Coxeter system, the minimal blow-ups of its associated Coxeter complex has a tiling by graph-associahedra. The geometric and combinatorial properties of the complex as well as of the polyhedra are given. These spaces are natural generalizations of the Deligne-Knudsen-Mumford compactification of the real moduli space of curves.  相似文献   
10.
We introduce the notion of a partially selective ultrafilter and prove that (a) if G is an extremally disconnected topological group and p is a converging nonprincipal ultrafilter on G containing a countable discrete subset, then p is partially selective, and (b) the existence of a nonprincipal partially selective ultrafilter on a countable set implies the existence of a P-point in ω. Thus it is consistent with ZFC that there is no extremally disconnected topological group containing a countable discrete nonclosed subset.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号