全文获取类型
收费全文 | 234篇 |
免费 | 7篇 |
国内免费 | 1篇 |
出版年
2021年 | 2篇 |
2019年 | 10篇 |
2018年 | 7篇 |
2017年 | 5篇 |
2016年 | 4篇 |
2014年 | 6篇 |
2013年 | 42篇 |
2012年 | 3篇 |
2010年 | 6篇 |
2007年 | 6篇 |
2006年 | 2篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 1篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1973年 | 4篇 |
1972年 | 3篇 |
1971年 | 1篇 |
1969年 | 2篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 3篇 |
1949年 | 1篇 |
1948年 | 2篇 |
排序方式: 共有242条查询结果,搜索用时 15 毫秒
81.
This article shows how to determine the stationary distribution of the virtual wait in M/G/1 queues with either one-at-a-time or exhaustive server vacations, depending on either service times or accrued workload. For the first type of dependence, each vacation time is a function of the immediately preceding service time or of whether the server finds the system empty after returning from vacation. In this way, it is possible to model situations such as long service times followed by short vacations, and vice versa. For the second type of dependence, the vacation time assigned to an arrival to follow its service is a function of the level of virtual wait reached. By this device, we can model situations in which vacations may be shortened whenever virtual delays have gotten excessive. The method of analysis employs level-crossing theory, and examples are given for various cases of service and vacation-time distributions. A closing discussion relates the new model class to standard M/G/1 queues where the service time is a sum of variables having complex dependencies. © 1992 John Wiley & Sons, Inc. 相似文献
82.
William H. Ruckle 《海军后勤学研究》1992,39(7):893-903
This article is a theoretic study of the following problem in verification: Mobile units under control of an agent, whom we call the HIDER, travel on a known transportation network and must at the conclusion of their itinerary report locations at fixed time intervals to a monitoring authority, whom we call the SEEKER. The purpose of this reporting requirement is to verify that illegal units do not infiltrate the network from sources under the control of the HIDER. We assume that the SEEKER has an independent intelligence-gathering capability which gives sightings of both legal and illegal units. The purpose of this article is to quantify the advantage of frequent over infrequent reporting. © 1992 John Wiley & Sons, Inc. 相似文献
83.
In this article, a quality-control design framework that employs information for the supplier-buyer system is modeled. Significant operational savings may be obtained by using the integrated plans developed under this framework. This is especially true when the cost of a defective is high, and the variable sampling and rework costs are low. Analysis of the interaction of defective, rework, and variable sampling costs reveals that the savings are the result of a shift of control effort from the process-control to the lot-acceptance stage, which is the consequence of tradeoffs involving both stages. The managerial impact of adopting integrated plans is discussed. 相似文献
84.
In a previous paper, the authors have introduced a class of multivariate lifetimes (MIFRA) which generalize the univariate lifetimes with increasing failure rate average (IFRA). They have also shown that this class satisfies many fundamental properties. In this paper it is shown that other concepts of multivariate IFRA do not satisfy all of these properties. Relationships between MIFRA and these other concepts are given. Finally, positive dependence implications with respect to these classes are also discussed. 相似文献
85.
Military Helicopters. By E. J. Everett‐Heath, G. M. Moss, A. W. Mowat and K. E. Reid. Brassey's, London (1990), ISBN 0–08–037341–0 (hardcover), ISBN 0–08–036716‐X (flexicover), £22.50 (hardcover), £12.95 (flexicover)
The Killing Ground: the British Army, the Western Front and the Emergence of Modern Warfare 1900–1918. By Tim Travers. Unwin‐Hyman, London (1990), ISBN 0–04–4457367, £11.95
The Influence of S. L. A. Marshall on the United States Army. By Major F. D. G. Williams. TRADOC Historical Monograph Series, Fort Monroe, VA (1990) 相似文献
86.
Lower confidence limits are derived for the impact probability within a circle of fixed radius. The bivariate normal distribution with zero means, unequal variances, and zero correlation is the probability model for impacts. A new representation of the impact probability function is offered. This presentation is valid also for the dependent case, where the eigenvalues of the covariance matrix replace the variances. When the ratio of variances is known the lower confidence limits are uniformly most accurate (UMA). A few alternative approaches are compared by simulation when the ratio of variances is unknown. 相似文献
87.
In this paper, we consider the problem of minimizing the mean flow time of jobs to be processed on two machines. The jobs have a predetermined order, perhaps reflecting the order of arrival, and each job has a known processing time. We wish to assign the jobs to machines so as to minimize the mean flow time, with the constraint that the original order must be preserved within the subset of jobs assigned to each machine. An efficient algorithm based on dynamic programming is developed. 相似文献
88.
James H. Patterson 《海军后勤学研究》1973,20(4):767-784
The applicability of critical path scheduling is limited by the inability of the algorithm to cope with conflicting resource demands. This paper is an assessment of the effectiveness of many of the heuristic extensions to the critical path method which resolve the conflicts that develop between the resources demanded by an activity and those available. These heuristic rules are evaluated on their ability to solve a large multiproject scheduling problem. 相似文献
89.
In this paper we investigate a form of rational behavior in response to an oligopoly pricing problem where only one buyer is involved. We investigate the problem from the standpoint of the seller who wants to maximize his gain from the transaction. In particular, we deal with the problem of one seller's response to an invitation to submit a sealed (i. e., noncooperative) bid to a government or other dominant purchasing agency for supplying a specified bundle of goods and services for which either (1) no other demand exists, or (2) the terms or quantities involved cannot, at least in the short run, be obtained from another source. Although treated from a normative standpoint, i. e., what bid the supplier should make, the paper also has implications for the buyer's behavior and oligopoly-monopsony pricing in a more general sense. 相似文献
90.
A deterministic resource allocation model is developed to optimize defense effectiveness subject to budget, manpower, and risk constraints. The model consists of two major submodels connected by a heuristic. The first is a mathematical program which optimizes the multiperiod weapon mix subject to the constraint set. The second is a manpower supply model based on a transition matrix in which individual transitions are functions of personnel related budgets and historical transition rates. The heuristic marries the submodels through an iterative process leading to improved solutions. An example is provided which demonstrates how systems are undercosted and overprocured if manpower supply is not properly reflected relative to manpower demand. 相似文献