首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   95篇
  免费   11篇
  2021年   6篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   18篇
  2012年   9篇
  2011年   6篇
  2010年   3篇
  2009年   5篇
  2008年   1篇
  2007年   1篇
  2006年   4篇
  2005年   3篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1991年   3篇
  1990年   1篇
  1989年   4篇
  1988年   1篇
  1986年   1篇
  1983年   2篇
  1982年   1篇
  1978年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   2篇
  1972年   2篇
  1970年   3篇
排序方式: 共有106条查询结果,搜索用时 31 毫秒
31.
The problem of searching for randomly moving targets such as children and submarines is known to be fundamentally difficult, but finding efficient methods for generating optimal or near optimal solutions is nonetheless an important practical problem. This paper investigates the efficiency of Branch and Bound methods, with emphasis on the tradeoff between the accuracy of the bound employed and the time required to compute it. A variety of bounds are investigated, some of which are new. In most cases the best bounds turn out to be imprecise, but very easy to compute. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 243–257, 1998  相似文献   
32.
Polling systems are used to model a wide variety of real-world applications, for example, telecommunication and material handling systems. Consequently, there is continued interest in developing efficient algorithms to analyze the performance of polling systems. Recent interest in the optimization of these systems has brought up the need for developing very efficient techniques for analyzing their waiting times. This article presents the Individual Station technique for cyclic polling systems. The technique possesses the following features: (a) it allows the user to compute the mean waiting time at a selected station independent of the mean waiting time computations at other stations, and (b) its complexity is low and independent of the system utilization. In addition the technique provides explicit closed-form expressions for (i) the mean waiting times in a system with 3 stations, and (ii) the second moment of the waiting times in a system with 2 stations, for an exhaustive service system. © 1996 John Wiley & Sons, Inc.  相似文献   
33.
A pursuer (P) pursues an evader(E), with each party choosing a speed in ignorance of the other's choice. Going extremely fast is not wise for either party because doing so would quickly exhaust available energy. The situation is modeled as a two-person zero-sum game. The game may or may not have a saddle point, depending on the energy ratio and tactical parameters. © 1994 John Wiley & Sons, Inc.  相似文献   
34.
This article defines a class of univariate functions termed composite unimodal, and shows how their minimization admits an effective search procedure, albeit one not as efficient as is Fibonacci search for unimodal functions. An approximate Lagrangian approach to an important real-world logistics problem is seen to yield a surrogate problem whose objective function is composite unimodal. The mathematical form of this objective function is likely to be encountered in solving future real-world problems. © 1993 John Wiley & Sons, Inc.  相似文献   
35.
36.
Abstract

Smart power is comprised of two elements: the quest for building society among states and between states and non-state actors; as well as the desire for cleaner forms of power projection. This special issue explores how states continue to fumble over achieving the optimum mix of hard and soft power across several country cases and themed articles. This set of contributions suggests that smart power is not unlike a ‘Swiss Army Knife’ analogy: multifunctional and challenging to choose the right combination of ideational and material tools.  相似文献   
37.
The insurrection in the Vendée combined open warfare with the methods of petite guerre, ambushing French republican soldiers and cutting their supply lines to Paris. These tactics, when combined with the hatreds generated by a civil war, go far to explain to the cruelty of the conflict in the west and the depth of the hatreds it engendered. In republican eyes the use of guerrilla tactics was unjust and illegitimate, and they denounced their adversaries as common criminals and brigands, portraying them as backward, superstitious, even as subhuman, and in the process justified the savage repression they unleashed against them.  相似文献   
38.
Several studies have investigated whether the terrorist attacks of September 11, 2001, have had an ongoing or merely transitory effect on US trade in tourism. All conclude in favor of the latter. However, limitations in either the data and/or methodology employed by these studies give cause to query their findings. The present study avoids these limitations and finds strong evidence that, once other factors are held constant, real US exports and imports of tourism have both remained significantly below their pre‐2001 level.  相似文献   
39.
40.
针对面向无人化陆战的智能指挥控制系统开展研究,并分析其智能化运用方式.从作战样式、作战任务、装备编配4个方面对未来无人化陆战的特征进行分析.从情报数据挖掘、态势融合共享、指挥自主决策等方面,分析了指挥控制系统智能化发展能力需求,建立智能指挥控制系统能力型谱.最后,构建了包含基础层和决策层的智能指挥控制系统架构,在此基础上提出了遵循OODA的智能指挥控制系统模型,并以作战活动视图对智能指挥控制系统的作战活动过程进行描述.通过对智能指挥控制系统能力需求、系统架构以及智能化运用方式的分析研究,可为指挥控制系统智能化发展提供参考和借鉴,为智能指挥控制系统在未来陆战场的合理应用指明了方向与突破口.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号