全文获取类型
收费全文 | 947篇 |
免费 | 123篇 |
国内免费 | 83篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 14篇 |
2020年 | 7篇 |
2019年 | 25篇 |
2018年 | 27篇 |
2017年 | 55篇 |
2016年 | 56篇 |
2015年 | 41篇 |
2014年 | 57篇 |
2013年 | 130篇 |
2012年 | 64篇 |
2011年 | 72篇 |
2010年 | 36篇 |
2009年 | 60篇 |
2008年 | 44篇 |
2007年 | 76篇 |
2006年 | 92篇 |
2005年 | 66篇 |
2004年 | 53篇 |
2003年 | 38篇 |
2002年 | 33篇 |
2001年 | 35篇 |
2000年 | 25篇 |
1999年 | 20篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1995年 | 2篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有1153条查询结果,搜索用时 31 毫秒
1.
Ryusuke Hohzaki 《海军后勤学研究》2008,55(1):76-90
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008 相似文献
2.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
3.
4.
5.
6.
Fernando M. M. Ruiz Florent Hainaut Nathalie Schiffino 《Defence and Peace Economics》2016,27(6):774-793
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure. 相似文献
7.
8.
9.
论防空火力配系的评价问题 总被引:3,自引:2,他引:1
本文提出了对弹炮结合防空火力配系的定量化评价的思路,并探讨了火力配系指标的应用方法。 相似文献
10.