全文获取类型
收费全文 | 590篇 |
免费 | 15篇 |
出版年
2020年 | 5篇 |
2019年 | 14篇 |
2018年 | 7篇 |
2017年 | 20篇 |
2016年 | 11篇 |
2015年 | 15篇 |
2014年 | 17篇 |
2013年 | 121篇 |
2012年 | 5篇 |
2011年 | 5篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2007年 | 7篇 |
2006年 | 8篇 |
2005年 | 10篇 |
2004年 | 11篇 |
2003年 | 5篇 |
2002年 | 10篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1994年 | 15篇 |
1993年 | 14篇 |
1992年 | 8篇 |
1991年 | 14篇 |
1990年 | 8篇 |
1989年 | 14篇 |
1988年 | 15篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 12篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 8篇 |
1978年 | 12篇 |
1976年 | 7篇 |
1975年 | 6篇 |
1974年 | 8篇 |
1973年 | 7篇 |
1972年 | 9篇 |
1971年 | 4篇 |
1970年 | 9篇 |
1969年 | 6篇 |
1968年 | 4篇 |
1967年 | 6篇 |
排序方式: 共有605条查询结果,搜索用时 46 毫秒
221.
U. J. Nieminen 《海军后勤学研究》1974,21(3):557-561
The paper makes some remarks on the paper of Hakimi and Frank and shows a simplified way of applying the concept of alternating forest. An algorithm for finding a maximum internally stable set of an undirected graph is constructed and some examples are given. 相似文献
222.
J. R. Callahan 《海军后勤学研究》1973,20(2):321-324
Sufficient conditions are developed for the ergodicity of a single server, first-come-first-serve queue with waiting time dependent service times. 相似文献
223.
The problem of determining the optimal inspection epoch is studied for reliability systems in which N components operate in parallel. Lifetime distribution is arbitrary, but known. The optimization is carried with respect to two cost factors: the cost of inspecting a component and the cost of failure. The inspection epochs are determined so that the expected cost of the whole system per time unit per cycle will be minimized. The optimization process depends in the general case on the whole failure history of the system. This dependence is characterized. The cases of Weibull lifetime distributions are elaborated and illustrated numerically. The characteristics of the optimal inspection intervals are studied theoretically. 相似文献
224.
Frequently in warfare, a force is required to attack a perishable enemy target system - a target system where the targets are detected seemingly at random, and if not immediately attacked, will shortly escape from detection. A conflicting situation arises when an attack element detects a target of relatively low value and has to decide whether to expend his resources on that particular target or to wait for a more lucrative one, hoping one will be found. This paper provides a decision rule giving the least valued target that should be attacked as well as the resources that should be expended as a function of the attack element's remaining mission time. 相似文献
225.
Larry J. Leblanc 《海军后勤学研究》1976,23(4):597-602
We consider a class of network flow problems with pure quadratic costs and demonstrate that the conjugate gradient technique is highly effective for large-scale versions. It is shown that finding a saddle point for the Lagrangian of an m constraint, n variable network problem requires only the solution of an unconstrained quadratic programming problem with only m variables. It is demonstrated that the number of iterations for the conjugate gradient algorithm is substantially smaller than the number of variables or constraints in the (primal) network problem. Forty quadratic minimum-cost flow problems of various sizes up to 100 nodes are solved. Solution time for the largest problems (4,950 variables and 99 linear constraints) averaged 4 seconds on the CBC Cyber 70 Model 72 computer. 相似文献
226.
In an integrated telecommunications network, voice and data traffic compete for the same transmission facilities. Assuming Poisson arrivals and exponential service with different rates, analytic expressions are obtained for measures of performance such as blocking probability and average delay under the following operating rule: class 1 traffic behaves as a loss system while class 2 traffic is buffered when all channels are busy. In view of the inordinate amount of computational effort needed when the number of channels is large, simple approximations have been suggested. 相似文献
227.
This article presents the results of comparing the performance of several cannibalization policies using a simulation model of a maintenance system with spares, repair, and resource constraints. Although the presence of cannibalization has been incorporated into a number of maintenance system models reported in the literature, the questions of whether cannibalization should be done and what factors affect canibalization have received little attention. Policies tested include both no cannibalization and unlimited cannibalization as well as other based on the number of maintenance personnel available, the short-term machine failure rate at the time of cannibalization, and the relationship between the mean cannibalization and repair rates. The best policies found are those that allow cannibalization only when it can be done quickly relative to repair or when it can be done without delaying part repair actions. The policy of complete cannibalization (always cannibalize when it is possible) is found to perform poorly except when either average maintenance personnel utilization is very low or when mean cannibalization times are very short relative to mean repair times. The latter result casts doubts on the appropriateness of the assumption of complete cannibalization in many models in the literature. 相似文献
228.
229.
J. A. Muckstadt 《海军后勤学研究》1979,26(2):199-221
The main objective of this paper is to develop a mathematical model for a particular type of three-echelon inventory system. The proposed model is being used by the Air Force to evaluate inventory investment requirements for alternative logistic structures. The system we will model consists of a group of locations, called bases, and a central depot. The items of concern in our analysis are called recoverable items, that is, items that can be repaired when they fail. Furthermore, each item has a modular or hierarchical design. Briefly, the model is used to determine the stock levels at each location for each item so as to achieve optimum inventory-system performance for a given level of investment. An algorithm for the computation of stock levels for each item and location is developed and illustrated. Some of the ways the model can be used are illustrated with Air Force data. 相似文献
230.
In the study of complex queueing systems, analysis techniques aimed al providing exact solutions become ineffective. Approximation techniques provide an attractive alternative in such cases. This paper gives an overview of different types of approximation techniques available in the literature and points out their relative merits. Also, the need for proper validation procedures of approximation techniques is emphasized. 相似文献