首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   3篇
  2021年   3篇
  2019年   3篇
  2017年   4篇
  2016年   3篇
  2015年   4篇
  2014年   2篇
  2013年   62篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   2篇
  2005年   4篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   5篇
  1994年   6篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   5篇
  1988年   6篇
  1987年   5篇
  1986年   7篇
  1985年   6篇
  1984年   2篇
  1983年   3篇
  1982年   9篇
  1980年   5篇
  1979年   3篇
  1978年   3篇
  1977年   4篇
  1976年   2篇
  1975年   5篇
  1974年   6篇
  1973年   6篇
  1972年   5篇
  1971年   8篇
  1970年   3篇
  1969年   5篇
  1968年   5篇
  1967年   2篇
  1966年   3篇
  1948年   3篇
排序方式: 共有255条查询结果,搜索用时 15 毫秒
121.
In a recent paper in this journal, Wijewerra and Webb study the connection between military spending and gross domestic product (GDP) in a group of five South Asian countries, finding a small but statistically significant positive relationship between military spending and GDP. This paper reviews their approach and proposes an alternative which tries to deal with the problems of omitted variables and variable construction. It finds, in contrast, that a higher share of military spending in GDP is associated with lower growth of GDP per capita.  相似文献   
122.
123.
124.
125.
In interval scheduling, not only the processing times of the jobs but also their starting times are given. This article surveys the area of interval scheduling and presents proofs of results that have been known within the community for some time. We first review the complexity and approximability of different variants of interval scheduling problems. Next, we motivate the relevance of interval scheduling problems by providing an overview of applications that have appeared in literature. Finally, we focus on algorithmic results for two important variants of interval scheduling problems. In one variant we deal with nonidentical machines: instead of each machine being continuously available, there is a given interval for each machine in which it is available. In another variant, the machines are continuously available but they are ordered, and each job has a given “maximal” machine on which it can be processed. We investigate the complexity of these problems and describe algorithms for their solution. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
126.
127.
128.
129.
Modeling R&D as standard sequential search, we consider a monopolist who can implement a sequence of technological discoveries during the technology search process: he earns revenue on his installed technology while he engages in R&D to find improved technology. What is not standard is that he has a finite number of opportunities to introduce improved technology. We show that his optimal policy is characterized by thresholds ξi(x): introduce the newly found technology if and only if it exceeds ξi(x) when x is the state of the currently installed technology and i is the number of remaining introductions allowed. We also analyze a nonstationary learning‐by‐doing model in which the monopolist's experience in implementing new technologies imparts increased capability in generating new technologies. Because this nonstationary model is not in the class of monotone stopping problems, a number of surprising results hold and several seemingly obvious properties of the stationary model no longer hold. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
130.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号