首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   463篇
  免费   109篇
  国内免费   9篇
  2023年   4篇
  2022年   2篇
  2021年   3篇
  2020年   8篇
  2019年   18篇
  2018年   5篇
  2017年   26篇
  2016年   22篇
  2015年   24篇
  2014年   22篇
  2013年   83篇
  2012年   26篇
  2011年   27篇
  2010年   27篇
  2009年   25篇
  2008年   28篇
  2007年   40篇
  2006年   33篇
  2005年   22篇
  2004年   25篇
  2003年   20篇
  2002年   17篇
  2001年   18篇
  2000年   16篇
  1999年   7篇
  1998年   2篇
  1997年   5篇
  1996年   2篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1992年   7篇
  1991年   3篇
  1990年   4篇
  1989年   5篇
排序方式: 共有581条查询结果,搜索用时 15 毫秒
1.
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
2.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
3.
机载武器控制系统算法研究   总被引:4,自引:1,他引:3  
机载武器控制系统的算法是其软件部分的核心,算法的最终目的是保证在一定的条件下实现最有利的武器运用方案。将机载武器控制系统的算法分为四个不同的子算法,对每一子算法的建立方法进行了描述,最后得到形成执行命令的算法,即武器运用方案执行命令分配及形成的算法。  相似文献   
4.
5.
本文介绍了一个基于数据库文件的报表生成器的原理与实现,该生成器具有两种制表机制,它不但能快速简单地生成二维格式通用报表,而且能生成任意格式报表、空表、固定表等,从而为用户提供了一个简便、实用、高效的制表软件开发工具.本生成器采用TURBO C语言在长城系列微机上实现,生成DBASEIII报表打印源程度。  相似文献   
6.
组合回转壳体在工程结构系统中大量存在,对它们进行动力分析是十分必要的。介绍了混合界面法的主要原理和在组合回转壳体结构系统动力分析中的应用,并用两个例题作了分析和计算,证明是成功的。该方法可推广到其它复杂系统结构的动力分析。  相似文献   
7.
本文给出了多处理机环境对系统程序的要求,阐述了系统程序并行化研制过程中遇到的问题和解决办法,给出了实现临界段互斥的三种处理方法及其性能评价。  相似文献   
8.
We seek dynamic server assignment policies in finite‐capacity queueing systems with flexible and collaborative servers, which involve an assembly and/or a disassembly operation. The objective is to maximize the steady‐state throughput. We completely characterize the optimal policy for a Markovian system with two servers, two feeder stations, and instantaneous assembly and disassembly operations. This optimal policy allocates one server per station unless one of the stations is blocked, in which case both servers work at the unblocked station. For Markovian systems with three stations and instantaneous assembly and/or disassembly operations, we consider similar policies that move a server away from his/her “primary” station only when that station is blocked or starving. We determine the optimal assignment of each server whose primary station is blocked or starving in systems with three stations and zero buffers, by formulating the problem as a Markov decision process. Using this optimal assignment, we develop heuristic policies for systems with three or more stations and positive buffers, and show by means of a numerical study that these policies provide near‐optimal throughput. Furthermore, our numerical study shows that these policies developed for assembly‐type systems also work well in tandem systems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
9.
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020  相似文献   
10.
从HDL设计描述中提取电路在VLSI设计验证、低功耗分析、测试生成等方面有广泛的应用需求。提出了一种采用程序切片技术实现的新的电路提取方法,并深入论述了基于程序切片技术从Verilog描述中进行电路提取的理论基础。该方法可以为每一个感兴趣的信号获取其"链接切片"。与以前的方法相比,该方法的优点是细粒度的、不受书写格式的限制,并且能处理更多Verilog的语法元素。该方法已经被集成到现有设计流程中,实验结果表明其方便、高效,有良好的通用性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号