首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   800篇
  免费   19篇
  819篇
  2021年   15篇
  2019年   20篇
  2018年   11篇
  2017年   18篇
  2016年   15篇
  2015年   21篇
  2014年   10篇
  2013年   139篇
  2010年   8篇
  2008年   7篇
  2007年   10篇
  2006年   11篇
  2005年   14篇
  2004年   9篇
  2003年   7篇
  2002年   7篇
  2001年   10篇
  2000年   12篇
  1999年   10篇
  1998年   11篇
  1997年   17篇
  1996年   17篇
  1995年   10篇
  1994年   17篇
  1993年   13篇
  1992年   14篇
  1991年   22篇
  1990年   9篇
  1989年   19篇
  1988年   19篇
  1987年   16篇
  1986年   23篇
  1985年   18篇
  1984年   11篇
  1983年   11篇
  1982年   9篇
  1981年   14篇
  1980年   13篇
  1979年   15篇
  1978年   15篇
  1977年   13篇
  1976年   10篇
  1975年   14篇
  1974年   18篇
  1973年   13篇
  1972年   15篇
  1971年   16篇
  1970年   7篇
  1969年   10篇
  1968年   8篇
排序方式: 共有819条查询结果,搜索用时 0 毫秒
41.
Many Markov chain models have very large state spaces, making the computation of stationary probabilities very difficult. Often the structure and numerical properties of the Markov chain allows for more efficient computation through state aggregation and disaggregation. In this article we develop an efficient exact single pass aggregation/disaggregation algorithm which exploits structural properties of large finite irreducible mandatory set decomposable Markov chains. The required property of being of mandatory set decomposable structure is a generalization of several other Markov chain structures for which exact aggregation/disaggregation algorithms exist. © 1995 John Wiley & Sons, Inc.  相似文献   
42.
We consider the problem of optimizing assortments in a multi‐item retail inventory system. In addition to the usual holding and stockout costs, there is a fixed cost for including any item in the assortment. Customers' preferences for items include both probabilistic substitution patterns and the desire to purchase sets of complementary items. We develop a demand model to capture this behavior, and derive tractable approximations that allow us to formulate the optimization problem as a 0–1 mixed integer linear program. Numerical examples are solved to illustrate key insights into how both complementary and substitute items affect the optimal assortment and the expected profit. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 793–822, 2003.  相似文献   
43.
Egypt plays a pivotal role in the security of the Middle East as the doorway to Europe and its military expenditure reflects its involvement in the machinations of such an unstable region, showing considerable variation over the last 40?years. These characteristics make it a particularly interesting case study of the determinants of military spending. This paper specifies and estimates an econometric model of the Egyptian demand for military spending, taking into account important strategic and political factors. Both economic and strategic factors are found to play a role in determining military burden/spending, with clear positive effects of lagged military burden, suggesting some sort of institutional inertia, plus negative output and net exports effects. The strategic effect as a result of the impact of Israel’s military burden is mostly positive and significant, though its impact is reduced when the impact of important strategic events are taken into account. The military spending of Egypt’s allies Jordan and Syria generally seems to have had no effect on Egypt’s spending. These results are consistent over a range of econometric techniques.  相似文献   
44.
We introduce a formulation and an exact solution method for a nonpreemptive resource constrained project scheduling problem in which the duration/cost of an activity is determined by the mode selection and the duration reduction (crashing) within the mode. This problem is a natural combination of the time/cost tradeoff problem and the resource constrained project scheduling problem. It involves the determination, for each activity, of its resource requirements, the extent of crashing, and its start time so that the total project cost is minimized. We present a branch and bound procedure and report computational results with a set of 160 problems. Computational results demonstrate the effectiveness of our procedure. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 107–127, 2001  相似文献   
45.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
46.
We model a two-echelon multi-indentured repairable-item inventory system where each “base” has a maximum number of identical online machines, and each machine consists of several module types. Machine failures are due to module failures and occur according to an exponential distribution. When a machine fails, the failed module is replaced by an identical spare module if one is available. Otherwise, the module is backordered. All failed modules go to a single “depot” repair facility which consists of a finite number of identical repairmen who are able to repair any module type in an exponentially distributed time, although the repair rates for different module types may differ. The principal contribution of this article is an approximation algorithm for calculating the steady-state characteristics of the system. In comparison with simulation results, the algorithm is quite accurate and computationally efficient. © 1993 John Wiley & Sons, Inc.  相似文献   
47.
This article analyzes a one-to-one ordering perishable inventory model with renewal demands and exponential lifetimes. The leadtimes are independently and exponentially distributed and the demands that occur during stock out periods are lost. Although the items are assumed to decay at a constant rate, the output process is not renewal and the Markov renewal techniques are successfully employed to obtain the operating characteristics. The problem of minimizing the long run expected cost rate is discussed and numerical values of optimal stock level are also provided. © 1996 John Wiley & Sons, Inc.  相似文献   
48.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
49.
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号