全文获取类型
收费全文 | 800篇 |
免费 | 19篇 |
专业分类
819篇 |
出版年
2021年 | 15篇 |
2019年 | 20篇 |
2018年 | 11篇 |
2017年 | 18篇 |
2016年 | 15篇 |
2015年 | 21篇 |
2014年 | 10篇 |
2013年 | 139篇 |
2010年 | 8篇 |
2008年 | 7篇 |
2007年 | 10篇 |
2006年 | 11篇 |
2005年 | 14篇 |
2004年 | 9篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 10篇 |
2000年 | 12篇 |
1999年 | 10篇 |
1998年 | 11篇 |
1997年 | 17篇 |
1996年 | 17篇 |
1995年 | 10篇 |
1994年 | 17篇 |
1993年 | 13篇 |
1992年 | 14篇 |
1991年 | 22篇 |
1990年 | 9篇 |
1989年 | 19篇 |
1988年 | 19篇 |
1987年 | 16篇 |
1986年 | 23篇 |
1985年 | 18篇 |
1984年 | 11篇 |
1983年 | 11篇 |
1982年 | 9篇 |
1981年 | 14篇 |
1980年 | 13篇 |
1979年 | 15篇 |
1978年 | 15篇 |
1977年 | 13篇 |
1976年 | 10篇 |
1975年 | 14篇 |
1974年 | 18篇 |
1973年 | 13篇 |
1972年 | 15篇 |
1971年 | 16篇 |
1970年 | 7篇 |
1969年 | 10篇 |
1968年 | 8篇 |
排序方式: 共有819条查询结果,搜索用时 0 毫秒
41.
Many Markov chain models have very large state spaces, making the computation of stationary probabilities very difficult. Often the structure and numerical properties of the Markov chain allows for more efficient computation through state aggregation and disaggregation. In this article we develop an efficient exact single pass aggregation/disaggregation algorithm which exploits structural properties of large finite irreducible mandatory set decomposable Markov chains. The required property of being of mandatory set decomposable structure is a generalization of several other Markov chain structures for which exact aggregation/disaggregation algorithms exist. © 1995 John Wiley & Sons, Inc. 相似文献
42.
We consider the problem of optimizing assortments in a multi‐item retail inventory system. In addition to the usual holding and stockout costs, there is a fixed cost for including any item in the assortment. Customers' preferences for items include both probabilistic substitution patterns and the desire to purchase sets of complementary items. We develop a demand model to capture this behavior, and derive tractable approximations that allow us to formulate the optimization problem as a 0–1 mixed integer linear program. Numerical examples are solved to illustrate key insights into how both complementary and substitute items affect the optimal assortment and the expected profit. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 793–822, 2003. 相似文献
43.
Yasmine M. Abdelfattah Aamer S. Abu-Qarn Shadwa Zaher 《Defence and Peace Economics》2014,25(3):231-245
Egypt plays a pivotal role in the security of the Middle East as the doorway to Europe and its military expenditure reflects its involvement in the machinations of such an unstable region, showing considerable variation over the last 40?years. These characteristics make it a particularly interesting case study of the determinants of military spending. This paper specifies and estimates an econometric model of the Egyptian demand for military spending, taking into account important strategic and political factors. Both economic and strategic factors are found to play a role in determining military burden/spending, with clear positive effects of lagged military burden, suggesting some sort of institutional inertia, plus negative output and net exports effects. The strategic effect as a result of the impact of Israel’s military burden is mostly positive and significant, though its impact is reduced when the impact of important strategic events are taken into account. The military spending of Egypt’s allies Jordan and Syria generally seems to have had no effect on Egypt’s spending. These results are consistent over a range of econometric techniques. 相似文献
44.
We introduce a formulation and an exact solution method for a nonpreemptive resource constrained project scheduling problem in which the duration/cost of an activity is determined by the mode selection and the duration reduction (crashing) within the mode. This problem is a natural combination of the time/cost tradeoff problem and the resource constrained project scheduling problem. It involves the determination, for each activity, of its resource requirements, the extent of crashing, and its start time so that the total project cost is minimized. We present a branch and bound procedure and report computational results with a set of 160 problems. Computational results demonstrate the effectiveness of our procedure. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 107–127, 2001 相似文献
45.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
46.
We model a two-echelon multi-indentured repairable-item inventory system where each “base” has a maximum number of identical online machines, and each machine consists of several module types. Machine failures are due to module failures and occur according to an exponential distribution. When a machine fails, the failed module is replaced by an identical spare module if one is available. Otherwise, the module is backordered. All failed modules go to a single “depot” repair facility which consists of a finite number of identical repairmen who are able to repair any module type in an exponentially distributed time, although the repair rates for different module types may differ. The principal contribution of this article is an approximation algorithm for calculating the steady-state characteristics of the system. In comparison with simulation results, the algorithm is quite accurate and computationally efficient. © 1993 John Wiley & Sons, Inc. 相似文献
47.
This article analyzes a one-to-one ordering perishable inventory model with renewal demands and exponential lifetimes. The leadtimes are independently and exponentially distributed and the demands that occur during stock out periods are lost. Although the items are assumed to decay at a constant rate, the output process is not renewal and the Markov renewal techniques are successfully employed to obtain the operating characteristics. The problem of minimizing the long run expected cost rate is discussed and numerical values of optimal stock level are also provided. © 1996 John Wiley & Sons, Inc. 相似文献
48.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
49.
50.