全文获取类型
收费全文 | 8615篇 |
免费 | 707篇 |
国内免费 | 148篇 |
专业分类
系统科学 | 1165篇 |
丛书文集 | 62篇 |
教育与普及 | 67篇 |
理论与方法论 | 285篇 |
现状及发展 | 911篇 |
研究方法 | 27篇 |
综合类 | 6953篇 |
出版年
2024年 | 3篇 |
2023年 | 24篇 |
2022年 | 37篇 |
2021年 | 44篇 |
2020年 | 28篇 |
2019年 | 7篇 |
2018年 | 740篇 |
2017年 | 750篇 |
2016年 | 455篇 |
2015年 | 78篇 |
2014年 | 73篇 |
2013年 | 74篇 |
2012年 | 337篇 |
2011年 | 1048篇 |
2010年 | 891篇 |
2009年 | 557篇 |
2008年 | 624篇 |
2007年 | 885篇 |
2006年 | 105篇 |
2005年 | 149篇 |
2004年 | 226篇 |
2003年 | 218篇 |
2002年 | 144篇 |
2001年 | 98篇 |
2000年 | 112篇 |
1999年 | 197篇 |
1998年 | 175篇 |
1997年 | 182篇 |
1996年 | 172篇 |
1995年 | 169篇 |
1994年 | 158篇 |
1993年 | 132篇 |
1992年 | 114篇 |
1991年 | 100篇 |
1990年 | 79篇 |
1989年 | 92篇 |
1988年 | 67篇 |
1987年 | 54篇 |
1986年 | 30篇 |
1985年 | 8篇 |
1984年 | 3篇 |
1979年 | 4篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1969年 | 2篇 |
1968年 | 3篇 |
1967年 | 3篇 |
排序方式: 共有9470条查询结果,搜索用时 46 毫秒
991.
Bernard BERCU 《系统科学与复杂性》2007,20(2):243-250
A wide range of literature concerning classical asymptotic properties for linear models with adaptive control is available, such as strong laws of large numbers or central limit theorems. Unfortunately, in contrast with the situation without control, it appears to be impossible to find sharp asymptotic or nonasymptotic properties such as large deviation principles or exponential inequalities. Our purpose is to provide a first step towards that direction by proving a very simple exponential inequality for the standard least squares estimator of the unknown parameter of Gaussian autoregressive process in adaptive tracking. 相似文献
992.
993.
SU Yong ZHOU Jingli YU Shengsheng JIANG Minghua LIU Gang 《武汉大学学报:自然科学英文版》2007,12(2):249-254
This paper introduces agent-based methodology to build a distributed autonomic storage system infrastructure, and an effectively negotiation mechanism based on agent is applied for data location. We present Availability-based Data Allocation (ADA) algorithm as a data placement strategy to achieve high efficient utilization of storage resources by employing multiple distributed storage resources. We use Bloom filter in each storage device to track the location of data. We present the data lookup strategy that small size of read request is handled directly, and large size of read request is handled by cooperation with storage devices.The performance evaluation shows that the data location mechanism is high available and can work well for heterogeneous autonomic storage systems. 相似文献
994.
995.
This paper further investigates cluster synchronization in a complex dynamical network with two-cluster. Each cluster contains a number of identical dynamical systems, however, the subsystems composing the two clusters can be different, i.e., the individual dynamical system in one cluster can differ from that in the other cluster. Complete synchronization within each cluster is possible only if each node from one cluster receives the same input from nodes in other cluster. In this case, the stability condition of one-cluster synchronization is known to contain two terms: the first accounts for the contribution of the inner-cluster coupling structure while the second is simply an extra linear term, which can be deduced by the "same-input" condition. Applying the connection graph stability method, the authors obtain an upper bound of input strength for one cluster if the first account is known, by which the synchronizability of cluster can be scaled. For different clusters, there are different upper bound of input strength by virtue of different dynamics and the corresponding cluster structure. Moreover, two illustrative examples are presented and the numerical simulations coincide with the theoretical analysis. 相似文献
996.
LI Weifeng DU Jinyuan 《武汉大学学报:自然科学英文版》2007,12(6):985-991
We discuss the linear conjugate boundary value problems on the unit circle and the real axis. We obtain some Fredholm integral equations. Using thess equations we discuss the solvable conditions on these problems and we also give a direct method for the extension problems on the real axis. 相似文献
997.
Doug Walton 《Systemic Practice and Action Research》2007,20(5):369-386
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens
engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing
expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional
manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially
disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of
the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important
role. This article will explore the current challenges facing public discourse and outline that potential role. 相似文献
998.
XIA Yingqing TIAN Huamei DUAN Zhiguo WU Ling XU Penggen 《武汉大学学报:自然科学英文版》2007,12(3):481-484
This paper presents a method to analyze and calculate the angular glint of targets. By parting the target to very small size cells, using high-frequency approximation, the near-field radar cross section (RCS) is calculated based on the scattering from complex targets and environments (SCTE) system, and the angular glint is calculated by the phase grads. The results show that the angular glint can be calculated exactly in the SCTE system, and this method is correct and efficient. In the near-zone, the far-field theory is not applicable and the angular glint should be calculated by the near-field theory. 相似文献
999.
Benharrat BELAIDI 《系统科学与复杂性》2007,20(1):41-46
In this paper, we investigate the growth of meromorphic solutions of higher order linear differential equation f^(k) +Ak-1 (z)e^Pk-1^(z) f^(k-1) +…+A1 (z)e^P1(z) f′ +Ao(z)e^Po(z) f = 0 (k ≤ 2), where Pj(z) (j = 0, 1,..., k - 1) are nonconstant polynomials such that deg Pj = n (j = 0, 1,..., k - 1) and Aj(z)(≠ 0) (j = 0, 1,..., k - 1) are meromorphic functions with order p(Aj) 〈 n (j = 0, 1,..., k - 1). 相似文献
1000.
TAN Zuowen 《武汉大学学报:自然科学英文版》2008,13(6):680-684
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creation of a valid signature if fewer than t players take part in the signature protocol. In this paper, we proposed a new group-oriented (t, n) threshold signature schemes with traceable signers based on Schnorr signature. The proposed scheme is proved traceable, robust and unforgeable against the "static" adversary with the discrete logarithm assumption in the random oracle model and existence of broadcast channel. The proofs of the strongest security (existential unforgeability against adaptively chosen message attacks under the discrete logarithm assumption) are provided in the random oracle model. 相似文献