首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   291篇
  免费   4篇
  295篇
  2021年   4篇
  2019年   3篇
  2017年   4篇
  2016年   4篇
  2015年   5篇
  2014年   3篇
  2013年   69篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   3篇
  2005年   4篇
  2004年   2篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  2000年   3篇
  1999年   4篇
  1996年   5篇
  1995年   6篇
  1994年   7篇
  1993年   5篇
  1992年   3篇
  1991年   7篇
  1990年   3篇
  1989年   9篇
  1988年   7篇
  1987年   5篇
  1986年   8篇
  1985年   5篇
  1983年   4篇
  1982年   9篇
  1980年   5篇
  1979年   3篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1975年   6篇
  1974年   6篇
  1973年   8篇
  1972年   7篇
  1971年   8篇
  1970年   5篇
  1969年   5篇
  1968年   5篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有295条查询结果,搜索用时 15 毫秒
131.
Technologically advanced aircraft rely on robust and responsive logistics systems to ensure a high state of operational readiness. This paper fills a critical gap in the literature for combat models by closely relating effectiveness of the logistics system to determinants of success in combat. We present a stochastic diffusion model of an aerial battle between Blue and Red forces. The number of aircraft of Blue forces aloft and ready to be aloft on combat missions is limited by the maximum number of assigned aircraft, the reliability of aircraft subsystems, and the logistic system's ability to repair and replenish those subsystems. Our parsimonious model can illustrate important trade‐offs between logistics decision variables and operational success.  相似文献   
132.
We study a service design problem in diagnostic service centers, call centers that provide medical advice to patients over the phone about what the appropriate course of action is, based on the caller's symptoms. Due to the tension between increased diagnostic accuracy and the increase in waiting times more in‐depth service requires, managers face a difficult decision in determining the optimal service depth to guide the diagnostic process. The specific problem we consider models the situation when the capacity (staffing level) at the center is fixed, and when the callers have both congestion‐ and noncongestion‐related costs relating to their call. We develop a queueing model incorporating these features and find that the optimal service depth can take one of two different structures, depending on factors such as the nurses' skill level and the maximum potential demand. Sensitivity analyses of the two optimal structures show that they are quite different. In some situations, it may (or may not) be optimal for the manager to try to expand the demand at the center, and increasing skill level may (or may not) increase congestion. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
133.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
134.
On the surface of a sphere, we take as inputs two points, neither of them contained in any of a number of spherical polygon obstacles, and quickly find the shortest route connecting these two points while avoiding any obstacle. The WetRoute method presented here has been adopted by the US Navy for several applications. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 374–385, 2016  相似文献   
135.
136.
Preliminary design of an experimental world-circling spaceship RM001 RAND Corporation, Santa Monica, Calif. (1946)  相似文献   
137.
The kitting problem in multiechelon assembly systems is to allocate on-hand stock and anticipated future deliveries to kits so that cost is minimized. This article structures the kitting problem and describes several preprocessing methods that are effective in refining the formulation. The model is resolved using an optimizing approach based on Lagrangian relaxation, which yields a separable problem that decomposes into a subproblem for each job. The resulting subproblems are resolved using a specialized dynamic programming algorithm, and computational efficiency is enhanced by dominance properties devised for that purpose. The Lagrangian problem is resolved effectively using subgradient optimization and a specialized branching method incorporated in the branch-and-bound procedure. Computational experience demonstrates that the specialized approach outperforms the general-purpose optimizer OSL. The new solution approach facilitates time-managed flow control, prescribing kitting decisions that promote cost-effective performance to schedule. © 1994 John Wiley & Sons. Inc.  相似文献   
138.
139.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
140.
A counterexample is given to demonstrate that previously proposed necessary conditions for the bilevel programming problem are not correct. An interpretation of the difficulty is given by appealing to a “theorem of alternative” result presented in the original work.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号