首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9893篇
  免费   801篇
  国内免费   241篇
系统科学   1315篇
丛书文集   117篇
教育与普及   104篇
理论与方法论   294篇
现状及发展   889篇
研究方法   7篇
综合类   8209篇
  2024年   30篇
  2023年   59篇
  2022年   149篇
  2021年   144篇
  2020年   102篇
  2019年   58篇
  2018年   793篇
  2017年   832篇
  2016年   541篇
  2015年   225篇
  2014年   258篇
  2013年   237篇
  2012年   490篇
  2011年   1207篇
  2010年   1064篇
  2009年   691篇
  2008年   742篇
  2007年   979篇
  2006年   188篇
  2005年   192篇
  2004年   260篇
  2003年   259篇
  2002年   191篇
  2001年   122篇
  2000年   99篇
  1999年   146篇
  1998年   118篇
  1997年   128篇
  1996年   128篇
  1995年   95篇
  1994年   102篇
  1993年   64篇
  1992年   52篇
  1991年   48篇
  1990年   44篇
  1989年   42篇
  1988年   25篇
  1987年   11篇
  1986年   10篇
  1985年   5篇
  1982年   1篇
  1977年   2篇
  1967年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
A wide range of literature concerning classical asymptotic properties for linear models with adaptive control is available, such as strong laws of large numbers or central limit theorems. Unfortunately, in contrast with the situation without control, it appears to be impossible to find sharp asymptotic or nonasymptotic properties such as large deviation principles or exponential inequalities. Our purpose is to provide a first step towards that direction by proving a very simple exponential inequality for the standard least squares estimator of the unknown parameter of Gaussian autoregressive process in adaptive tracking.  相似文献   
962.
963.
This paper introduces agent-based methodology to build a distributed autonomic storage system infrastructure, and an effectively negotiation mechanism based on agent is applied for data location. We present Availability-based Data Allocation (ADA) algorithm as a data placement strategy to achieve high efficient utilization of storage resources by employing multiple distributed storage resources. We use Bloom filter in each storage device to track the location of data. We present the data lookup strategy that small size of read request is handled directly, and large size of read request is handled by cooperation with storage devices.The performance evaluation shows that the data location mechanism is high available and can work well for heterogeneous autonomic storage systems.  相似文献   
964.
主要针对MTBE装置 ,通过适当调整工艺 ,取消泵P2 0 2冷却水的过程进行阐述 ,说明在炼油化工装置中 ,调整工艺、取消部分机泵的冷却水是可行的节能途径之一  相似文献   
965.
研究了二叉树生成算法及利用生成的二叉树输出字符串组的问题,对于给出的不同字符,可根据要求输出由这些字符生成的字符串组。此算法因为采用二叉树及栈的数据构造,可以节省计算机的存储单元,提高输出速度,作为一个实际应用,实现了阿拉伯语的构词分析.  相似文献   
966.
We discuss the linear conjugate boundary value problems on the unit circle and the real axis. We obtain some Fredholm integral equations. Using thess equations we discuss the solvable conditions on these problems and we also give a direct method for the extension problems on the real axis.  相似文献   
967.
本文导出了一个简化的流量率公式,并利用这个公式分析了流量率与齿形及齿廓参数的关系。并提出了一些提高流量率的方法。  相似文献   
968.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
969.
This paper presents a method to analyze and calculate the angular glint of targets. By parting the target to very small size cells, using high-frequency approximation, the near-field radar cross section (RCS) is calculated based on the scattering from complex targets and environments (SCTE) system, and the angular glint is calculated by the phase grads. The results show that the angular glint can be calculated exactly in the SCTE system, and this method is correct and efficient. In the near-zone, the far-field theory is not applicable and the angular glint should be calculated by the near-field theory.  相似文献   
970.
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creation of a valid signature if fewer than t players take part in the signature protocol. In this paper, we proposed a new group-oriented (t, n) threshold signature schemes with traceable signers based on Schnorr signature. The proposed scheme is proved traceable, robust and unforgeable against the "static" adversary with the discrete logarithm assumption in the random oracle model and existence of broadcast channel. The proofs of the strongest security (existential unforgeability against adaptively chosen message attacks under the discrete logarithm assumption) are provided in the random oracle model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号