首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   632篇
  免费   19篇
  国内免费   1篇
  652篇
  2021年   11篇
  2019年   13篇
  2018年   7篇
  2017年   8篇
  2016年   12篇
  2015年   6篇
  2014年   11篇
  2013年   112篇
  2012年   8篇
  2011年   5篇
  2010年   6篇
  2009年   7篇
  2007年   14篇
  2006年   7篇
  2004年   5篇
  2003年   9篇
  2002年   9篇
  2000年   5篇
  1998年   9篇
  1997年   11篇
  1996年   13篇
  1995年   5篇
  1994年   11篇
  1993年   17篇
  1992年   12篇
  1991年   15篇
  1990年   11篇
  1989年   21篇
  1988年   18篇
  1987年   10篇
  1986年   19篇
  1985年   14篇
  1984年   9篇
  1983年   6篇
  1982年   14篇
  1981年   10篇
  1980年   15篇
  1979年   14篇
  1978年   15篇
  1977年   6篇
  1976年   10篇
  1975年   14篇
  1974年   14篇
  1973年   11篇
  1972年   8篇
  1971年   10篇
  1970年   9篇
  1969年   9篇
  1968年   6篇
  1967年   7篇
排序方式: 共有652条查询结果,搜索用时 0 毫秒
1.
Book reviews     
British Military History: a Supplement to Robin Higham's Guide to the Sources.. Edited by Gerald Jordan. Garland, New York (1988), xii + 586 pp., $75.00

Red Duster at War. By John Slader. William Kimber, London (1988), 352 pp., £15.50

Armed Services and Society. By Martin Edmonds. Leicester University Press, Leicester (1988), 226 pp., £25.00  相似文献   
2.
In this article, we examine the problem of producing a spanning Eulerian subgraph in an undirected graph. After the ?-completeness of the general problem is established, we present polynomial-time algorithms for both the maximization and minimization versions where instances are defined on a restricted class of graphs referred to as series-parallel. Some novelties in the minimization case are discussed, as are heuristic ideas.  相似文献   
3.
This paper presents an algorithm for determining where to place intercepting units in order to maximize the probability of preventing an opposing force from proceeding from one particular node in an undirected network to another. The usual gaming assumptions are invoked; namely, the strategy for placing the units is known to the opponent and he will choose a path through the network which, based on this knowledge, maximizes his probability of successful traverse. As given quantities, the model requires a list of the arcs and nodes of the network, the number of intercepting units available to stop the opposing force, and the probabilities for stopping the opposition at the arcs and nodes as functions of the number of intercepting units placed there. From these quantities, the algorithm calculates the probabilities for placing the unit at the arcs and nodes when one intercepting unit is available, and the expected numbers of units to place at the arcs and nodes when multiple intercepting units are available.  相似文献   
4.
5.
A transportation system has N vehicles with no capacity constraint which take passengers from a depot to various destinations and return to the depot. The trip times are considered to be independent and identically distributed random variables. The dispatch strategy at the depot is to dispatch immediately, or to hold any returning vehicles with the objective of minimizing the average wait per passenger at the depot, if passengers arrive at a uniform rate. Optimal control strategies and resulting waits are determined in the special case of exponentially distributed trip time for various N up to N = 15. For N ? 1, the nature of the solution is always to keep a reservoir of vehicles in the depot, and to decrease (increase) the time headway between dispatches as the size of the reservoir gets larger (smaller). For sufficiently large N, one can approximate the number of vehicles in the reservoir by a continuum and obtain analytic experession for the optimal dispatch rate as a function of the number of vehicles in the reservoir. For the optimal strategy, it is shown that the average number of vehicles in the depot is of order N1/3. These limit properties are expected to be quite insensitive to the actual trip time distribution, but the convergence of the exact properties to the continuum approximation as N → ∞ is very slow.  相似文献   
6.
This paper discusses a class of queueing models in which the service time of a customer al a single server facility is dependent on the queue size at the onset of its service. The Laplace transform for the wait in queue distribution is derived and the utilization of the server is given when the arrival is a homogeneous Poisson process.  相似文献   
7.
8.
We consider a one-machine scheduling problem with earliness and tardiness penalties. All jobs are assigned a common due date and the objective is to minimize the total penalty due to job earliness and tardiness. We are interested in finding the optimal combination of the common due-date value and the job sequence. Despite the fact that this problem in general is very hard to solve, we prove that there exists at least a common property for all optimal solutions: The first job in an optimal sequence is one of the longest jobs. We also prove that this property holds for a general class of unimodal penalty functions.  相似文献   
9.
Cumulative search-evasion games (CSEGs) are two-person zero-sum search-evasion games where play proceeds throughout some specified period without interim feedback to either of the two players. Each player moves according to a preselected plan. If (Xt, Yt,) are the positions of the two players at time t, then the game's payoff is the sum over t from 1 to T of A(Xt, Yt, t). Additionally, all paths must be “connected.” That is, the finite set of positions available for a player in any time period depends on the position selected by that player in the previous time period. One player attempts to select a mixed strategy over the feasible T-time period paths to maximize the expected payoff. The other minimizes. Two solution procedures are given. One uses the Brown-Robinson method of fictitious play and the other linear programming. An example problem is solved using both procedures.  相似文献   
10.
Boland, Proschan, and Tong [2] used the notion of criticality of nodes in a coherent system to study the optimal component arrangement of reliability structures. They also provided a sufficient minimal cut (path) based criterion for verifying the criticality ordering of two nodes. We develop a necessary and sufficient condition for two nodes to be comparable and provide specific examples illustrating our result's applicability. As a corollary, certain optimal arrangement properties of well-known systems are derived. © 1994 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号