全文获取类型
收费全文 | 684篇 |
免费 | 12篇 |
出版年
2021年 | 8篇 |
2019年 | 15篇 |
2018年 | 10篇 |
2017年 | 15篇 |
2016年 | 12篇 |
2015年 | 13篇 |
2013年 | 134篇 |
2011年 | 6篇 |
2010年 | 8篇 |
2008年 | 6篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 15篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 16篇 |
1995年 | 9篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 10篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 14篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 14篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1974年 | 15篇 |
1973年 | 13篇 |
1972年 | 14篇 |
1971年 | 19篇 |
1970年 | 6篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 5篇 |
1948年 | 5篇 |
排序方式: 共有696条查询结果,搜索用时 15 毫秒
221.
Practitioners of maintenance scheduling sometimes use a simple analytic formula, derived based on inspection scheduling, as a heuristic to determine the length of the preventive maintenance period. The sensitivity of this heuristic solution is analyzed and the cost penalties are calculated compared to the exact solution that utilizes the lifetime distribution in the derivation of the optimal preventive maintenance period. A simple extension of the heuristic is suggested to improve the approximation with a slightly increased computational effort. The sensitivity and cost analysis of the improved heuristic are discussed as well. © 1994 John Wiley & Sons, Inc. 相似文献
222.
Emad-Eldin A. A. Aly 《海军后勤学研究》1993,40(5):633-642
We consider the problem of testing for the decreasing mean residual life ordering introduced in Kochar and Wiens [14]. We treat both the one-sample and two-sample problems. The limiting distributions of the proposed test statistics are derived. © 1993 John Wiley & Sons, Inc. 相似文献
223.
The system under study is a single item, two‐echelon production‐inventory system consisting of a capacitated production facility, a central warehouse, and M regional distribution centers that satisfy stochastic demand. Our objective is to determine a system base‐stock level which minimizes the long run average system cost per period. Central to the approach are (1) an inventory allocation model and associated convex cost function designed to allocate a given amount of system inventory across locations, and (2) a characterization of the amount of available system inventory using the inventory shortfall random variable. An exact model must consider the possibility that inventories may be imbalanced in a given period. By assuming inventory imbalances cannot occur, we develop an approximation model from which we obtain a lower bound on the per period expected cost. Through an extensive simulation study, we analyze the quality of our approximation, which on average performed within 0.50% of the lower bound. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 377–398, 2000 相似文献
224.
Elie Bouri Riza Demirer Rangan Gupta Hardik A. Marfatia 《Defence and Peace Economics》2019,30(3):367-379
This study applies a non-parametric causality-in-quantiles test to examine the causal effect of geopolitical risks on return and volatility dynamics of Islamic equity and bond markets. Geopolitical risks are generally found to impact Islamic equity market volatility measures, rather than returns. However, geopolitical risks tend to predict both returns and volatility measures of Islamic bonds. Interestingly, causality, when it exists for returns and/or volatility of Islamic equities and bonds, is found to hold over entire conditional distributions of returns and volatilities, barring the extreme ends of the same. 相似文献
225.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information. 相似文献
226.
We consider server scheduling on parallel dedicated machines to minimize the makespan. Each job has a loading operation and a processing operation. The loading operation requires a server that serves all the jobs. Each machine has a given set of jobs to process, and the processing sequence is known and fixed. We design a polynomial‐time algorithm to solve the two‐machine case of the problem. When the number of machines is arbitrary, the problem becomes strongly NP‐hard even if all the jobs have the same processing length or all the loading operations require a unit time. We design two heuristic algorithms to treat the case where all the loading times are unit and analyze their performance. 相似文献
227.
Shanna A. Kirschner 《Civil Wars》2018,20(1):45-65
How does cultural policy affect violence? While cultural discrimination is frequently cited as a potential grievance motivating political violence, the relationship remains under-theorised and largely untested. I weave theoretical literatures with interviews and secondary sources on the experience of Kurds in Turkey to understand the socio-economic and psychological pathways through which cultural policies impact intrastate conflict. I then analyse cross-national data on political violence, demonstrating that cultural grievances increase support for violence, raise the chance and severity of conflict and prolong violent conflicts. In short, policy matters: cultural restrictions exacerbate violence through multiple pathways. 相似文献
228.
Marjolein B.A. van Asselt 《Contemporary Security Policy》2018,39(4):590-600
While security points to a deliberate harming of humans and/or the environment, safety refers to unintended damage. In this view point, I will analyse how the distinction between safety and security matters in the practice of accident investigation and I will argue that the division between the fields is problematic for the assessment of security-related safety risks. Drawing on the case of the our accident investigation into the downing of flight MH17 above Ukraine in 2014, I highlight key dilemmas the Dutch Safety Board dealt with. 相似文献
229.
In planar location problems with barriers one considers regions which are forbidden for the siting of new facilities as well as for trespassing. These problems are important since they model various actual applications. The resulting mathematical models have a nonconvex objective function and are therefore difficult to tackle using standard methods of location theory even in the case of simple barrier shapes and distance functions. For the case of center objectives with barrier distances obtained from the rectilinear or Manhattan metric, it is shown that the problem can be solved in polynomial time by identifying a dominating set. The resulting genuinely polynomial algorithm can be combined with bound computations which are derived from solving closely connected restricted location and network location problems. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 647–665, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10038 相似文献
230.
What has been causing cost overruns and schedule slippages in Army major weapon-system R&D programs during the past ten years? This article addresses this question with emphasis on the effectiveness of an Army acquisition strategy entitled Total Risk Assessing Cost Estimating (TRACE). An empirical study employed a questionnaire and interviews with key personnel from all of the major Army Program Management Offices involved with R&D. The major research question was the following: What explanatory variables have been affecting R&D cost overruns and development time? This includes an evaluation of TRACE as a potential explanatory variable. Data was collected and analyzed using an error components multiple regression model. The major explanatory variables that appeared to explain cost overruns were technological risk of the program, education and experience of key program management office personnel, and the degree of “buy in” by the prime contractor. Strong statistical results indicate that TRACE is having little or no effect on cost overruns. In the case of development time, the major explanatory variables were seen to be technological risk of the program, testing, TRACE, education, and length of the R&D contract. 相似文献