首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   224篇
  免费   40篇
  国内免费   11篇
  2023年   2篇
  2022年   3篇
  2021年   1篇
  2020年   5篇
  2019年   5篇
  2018年   3篇
  2017年   4篇
  2016年   8篇
  2015年   8篇
  2014年   17篇
  2013年   10篇
  2012年   17篇
  2011年   10篇
  2010年   16篇
  2009年   17篇
  2008年   18篇
  2007年   25篇
  2006年   18篇
  2005年   10篇
  2004年   19篇
  2003年   8篇
  2002年   6篇
  2001年   7篇
  2000年   7篇
  1999年   6篇
  1998年   2篇
  1997年   1篇
  1996年   6篇
  1995年   5篇
  1994年   2篇
  1992年   2篇
  1991年   2篇
  1990年   3篇
  1989年   2篇
排序方式: 共有275条查询结果,搜索用时 15 毫秒
81.
大空间钢结构建筑发生火灾时,火焰及火灾产生的高温羽流可能对钢构件构成一定威胁。采用经验公式计算和FDS模拟分析两种方法计算火灾环境中大空间建筑钢构件的温度,评估钢构件是否达到或超过其失效温度。  相似文献   
82.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
83.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
84.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
85.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
86.
全球信息栅格的产生和实现技术研究   总被引:1,自引:0,他引:1  
介绍了全球信息栅格的概念与定义,详细论述了全球信息栅格产生与发展的动因、实现技术的研究现状.介绍了研究与实现全球信息栅格的关键技术、基础理论,重点论述了实现全球信息栅格总体架构的有关内容.  相似文献   
87.
课堂是学员语言学习实践的重要场所,无论科技怎样发展,教学如何改革,英语课堂教学仍有不可替代的作用。通过调查研究和教学实践发现,武警初级院校的大学英语课堂活力不足,学员学习热情不高。针对这一现象进行原因分析和探究,找到了激活英语课堂气氛的应对策略,便于指导教学实践。  相似文献   
88.
在科学研究与工程计算中对插值的分析与方法理论已有很重要的应用,而对于ENO插值的方法与理论在大多教科书中却很少涉及,本文介绍ENO插值的应用及算法,为大学生们学习数值分析中的插值计算提供参考。  相似文献   
89.
证明了二次型极小化问题带误差的迭代算法的有效性,所得结果推广了关于二次型极小化问题迭代的收敛性。  相似文献   
90.
中继卫星调度问题的CSP模型   总被引:11,自引:2,他引:9       下载免费PDF全文
中继卫星在地球同步静止轨道上运行,既能直视中、低轨道用户航天器,又能直视地面站,是沟通用户航天器与地面站的桥梁。中继卫星调度问题是一类非常重要的调度问题。基于约束满足理论,通过分析中继卫星调度问题的特点与约束条件,建立了中继卫星调度问题的CSP模型。利用卫星工具箱STK进行模拟仿真,对CSP模型进行了求解。结果表明,所建立的CSP模型是合理的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号