首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   343篇
  免费   10篇
  国内免费   26篇
综合类   6篇
数学   140篇
物理学   19篇
综合类   214篇
  2023年   1篇
  2022年   10篇
  2021年   3篇
  2020年   6篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   4篇
  2015年   4篇
  2014年   16篇
  2013年   17篇
  2012年   20篇
  2011年   25篇
  2010年   13篇
  2009年   22篇
  2008年   23篇
  2007年   28篇
  2006年   32篇
  2005年   29篇
  2004年   14篇
  2003年   21篇
  2002年   10篇
  2001年   11篇
  2000年   5篇
  1999年   4篇
  1998年   2篇
  1997年   5篇
  1996年   4篇
  1995年   5篇
  1994年   8篇
  1993年   1篇
  1992年   6篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
排序方式: 共有379条查询结果,搜索用时 15 毫秒
1.
传统的门限RSA密码体制由于都是在环Zψ(n )上进行的,而会遇到固有的困难;Zψ(n )不是域且ψ(n)必须保密,提出了一个新的门限RSA密码体制,通过数学变换克服了以上的困难,并且对它的安全性进行了简要分析。  相似文献   
2.
We consider the following problem: given a set of points in the plane, each with a weight, and capacities of the four quadrants, assign each point to one of the quadrants such that the total weight of points assigned to a quadrant does not exceed its capacity, and the total distance is minimized.

This problem is most important in placement of VLSI circuits and is likely to have other applications. It is NP-hard, but the fractional relaxation always has an optimal solution which is “almost” integral. Hence for large instances, it suffices to solve the fractional relaxation. The main result of this paper is a linear-time algorithm for this relaxation. It is based on a structure theorem describing optimal solutions by so-called “American maps” and makes sophisticated use of binary search techniques and weighted median computations.

This algorithm is a main subroutine of a VLSI placement tool that is used for the design of many of the most complex chips.  相似文献   

3.
4.
大整数因子分解新算法及对RSA密码制的解密   总被引:1,自引:1,他引:0  
对一大类大整数的因子分解构造算法WZH,可在O(L(lnm)2)+O(lnm)3(L相似文献   
5.
We study a variation of the knapsack problem in which each item has a profit, a weight and a penalty; the sum of profits of the selected items minus the largest penalty associated with the selected items must be maximized. We present an ILP formulation and an exact optimization algorithm.  相似文献   
6.
First, this paper deals with lagrangean heuristics for the 0-1 bidimensional knapsack problem. A projected subgradient algorithm is performed for solving a lagrangean dual of the problem, to improve the convergence of the classical subgradient algorithm. Secondly, a local search is introduced to improve the lower bound on the value of the biknapsack produced by lagrangean heuristics. Thirdly, a variable fixing phase is embedded in the process. Finally, the sequence of 0-1 one-dimensional knapsack instances obtained from the algorithm are solved by using reoptimization techniques in order to reduce the total computational time effort. Computational results are presented.  相似文献   
7.
公开密钥体制与Euler-Fermat定理通俗证明   总被引:1,自引:0,他引:1  
随着计算机的广泛使用,文件加密解密已成为相当频繁的工作.本文叙述了公开密钥体制中的一种方法,并对其使用的数学工具给出一个通俗证明,以使加密解密工作更加方便、有效.  相似文献   
8.
Different classes of on-line algorithms are developed and analyzed for the solution of {0, 1} and relaxed stochastic knapsack problems, in which both profit and size coefficients are random variables. In particular, a linear time on-line algorithm is proposed for which the expected difference between the optimum and the approximate solution value isO(log3/2 n). An(1) lower bound on the expected difference between the optimum and the solution found by any on-line algorithm is also shown to hold.Corresponding author.Partially supported by the Basic Research Action of the European Communities under Contract 3075 (Alcom).Partially supported by research project Models and Algorithms for Optimization of the Italian Ministry of University and Scientific and Technological Research (MURST 40%).  相似文献   
9.
While it is well-known that the RSA public-key cryptosystem can be broken if its modulusN can be factored, it is not known whether there are other ways of breaking RSA. This paper presents a public-key scheme which necessarily requires knowledge of the factorization of its modulus in order to be broken. Rabin introduced the first system whose security is equivalent to the difficulty of factoring the modulus. His scheme is based on squaring (cubing) for encryption and extracting square (cube) roots for decryption. This introduces a 14 (19) ambiguity in the decryption. Various schemes which overcome this problem have been introduced for both the quadratic and cubic case. We generalize the ideas of Williams' cubic system to larger prime exponents. The cases of higher prime order introduce a number of problems not encountered in the quadratic and cubic cases, namely the existence of fundamental units in the underlying cyclotomic field, the evaluation of higher power residue symbols, and the increased difficulty of Euclidean division in the field.  相似文献   
10.
指出Cao-Li公钥密码系统会由于某些参数选择而导致系统的安全问题;利用背包系统对Cao—Li系统的改进进行改进,解决原有系统的参数依赖性问题.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号