全文获取类型
收费全文 | 463篇 |
免费 | 109篇 |
国内免费 | 9篇 |
出版年
2023年 | 4篇 |
2022年 | 2篇 |
2021年 | 3篇 |
2020年 | 8篇 |
2019年 | 18篇 |
2018年 | 5篇 |
2017年 | 26篇 |
2016年 | 22篇 |
2015年 | 24篇 |
2014年 | 22篇 |
2013年 | 83篇 |
2012年 | 26篇 |
2011年 | 27篇 |
2010年 | 27篇 |
2009年 | 25篇 |
2008年 | 28篇 |
2007年 | 40篇 |
2006年 | 33篇 |
2005年 | 22篇 |
2004年 | 25篇 |
2003年 | 20篇 |
2002年 | 17篇 |
2001年 | 18篇 |
2000年 | 16篇 |
1999年 | 7篇 |
1998年 | 2篇 |
1997年 | 5篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 7篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 5篇 |
排序方式: 共有581条查询结果,搜索用时 15 毫秒
1.
Ryusuke Hohzaki 《海军后勤学研究》2008,55(1):76-90
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008 相似文献
2.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
3.
4.
Barbara Slavin 《The Nonproliferation Review》2013,20(1):103-107
5.
本文介绍了一个基于数据库文件的报表生成器的原理与实现,该生成器具有两种制表机制,它不但能快速简单地生成二维格式通用报表,而且能生成任意格式报表、空表、固定表等,从而为用户提供了一个简便、实用、高效的制表软件开发工具.本生成器采用TURBO C语言在长城系列微机上实现,生成DBASEIII报表打印源程度。 相似文献
6.
组合回转壳体在工程结构系统中大量存在,对它们进行动力分析是十分必要的。介绍了混合界面法的主要原理和在组合回转壳体结构系统动力分析中的应用,并用两个例题作了分析和计算,证明是成功的。该方法可推广到其它复杂系统结构的动力分析。 相似文献
7.
本文给出了多处理机环境对系统程序的要求,阐述了系统程序并行化研制过程中遇到的问题和解决办法,给出了实现临界段互斥的三种处理方法及其性能评价。 相似文献
8.
We seek dynamic server assignment policies in finite‐capacity queueing systems with flexible and collaborative servers, which involve an assembly and/or a disassembly operation. The objective is to maximize the steady‐state throughput. We completely characterize the optimal policy for a Markovian system with two servers, two feeder stations, and instantaneous assembly and disassembly operations. This optimal policy allocates one server per station unless one of the stations is blocked, in which case both servers work at the unblocked station. For Markovian systems with three stations and instantaneous assembly and/or disassembly operations, we consider similar policies that move a server away from his/her “primary” station only when that station is blocked or starving. We determine the optimal assignment of each server whose primary station is blocked or starving in systems with three stations and zero buffers, by formulating the problem as a Markov decision process. Using this optimal assignment, we develop heuristic policies for systems with three or more stations and positive buffers, and show by means of a numerical study that these policies provide near‐optimal throughput. Furthermore, our numerical study shows that these policies developed for assembly‐type systems also work well in tandem systems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
9.
Joseph Y.‐T. Leung 《海军后勤学研究》2002,49(4):422-431
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020 相似文献
10.
从HDL设计描述中提取电路在VLSI设计验证、低功耗分析、测试生成等方面有广泛的应用需求。提出了一种采用程序切片技术实现的新的电路提取方法,并深入论述了基于程序切片技术从Verilog描述中进行电路提取的理论基础。该方法可以为每一个感兴趣的信号获取其"链接切片"。与以前的方法相比,该方法的优点是细粒度的、不受书写格式的限制,并且能处理更多Verilog的语法元素。该方法已经被集成到现有设计流程中,实验结果表明其方便、高效,有良好的通用性。 相似文献