首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   3篇
  255篇
  2021年   3篇
  2019年   3篇
  2017年   4篇
  2016年   3篇
  2015年   4篇
  2014年   2篇
  2013年   62篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   2篇
  2005年   4篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   5篇
  1994年   6篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   5篇
  1988年   6篇
  1987年   5篇
  1986年   7篇
  1985年   6篇
  1984年   2篇
  1983年   3篇
  1982年   9篇
  1980年   5篇
  1979年   3篇
  1978年   3篇
  1977年   4篇
  1976年   2篇
  1975年   5篇
  1974年   6篇
  1973年   6篇
  1972年   5篇
  1971年   8篇
  1970年   3篇
  1969年   5篇
  1968年   5篇
  1967年   2篇
  1966年   3篇
  1948年   3篇
排序方式: 共有255条查询结果,搜索用时 15 毫秒
51.
Several approximate procedures are available in the literature for obtaining confidence intervals for the parameter A of an exponential distribution based on time truncated samples. This paper contains the results of an empirical study comparing three of these procedures.  相似文献   
52.
53.
We demonstrate here how recent advances in the study of discrete-event stochastic systems provide fruitful results for the modeling, analysis, and design of manufacturing systems. We consider a multistage make-to-stock system where outputs from the final stage are used to satisfy customer demands. We address the problem of finding the appropriate trade-off between reduced order waiting time and increased process speeds. Using the idea of infinitesimal perturbation analysis (IPA), we establish a simple procedure where sample-path derivatives can be obtained along an arbitrary sample path. Under suitable conditions, we demonstrate that these derivative estimators are unbiased and strongly consistent and can be used in a classical stochastic optimization scheme to solve the problem. The role of continuity and convexity on the validity of the estimator is also addressed. Although the focus of this article is not to solve for the optimal solution, we provide a theoretical justification for such a pursuit. The approach is appealing as it is numerically stable, easy to implement, and can be extended to other system performance measures. © 1994 John Wiley & Sons, Inc.  相似文献   
54.
We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP‐hard and develop a heuristic algorithm based on formulating the problem as an assignment problem. The effectiveness of the heuristic is analyzed from both worst‐case and computational points of view. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 363–385, 2001  相似文献   
55.
56.
History teaches that counterinsurgency and counterterrorism campaigns have never been won through purely military action. Defeating an opponent who avoids open battle, but who uses force to reach his goals, including terrorist action, requires a combination of police, administrative, economic and military measures. As a counterinsurgency campaign should pursue a comprehensive political objective, it requires high levels of civil–military cooperation. However, current NATO doctrine for Civil–Military Cooperation (CIMIC) as it emerged from the 1990s is founded in conventional war-fighting and outdated peacekeeping doctrine. CIMIC's focus is on supporting military objectives rather than enabling the military to make a coherent contribution to political objectives. This makes CIMIC unfit for the Alliance's main operational challenges that have expanded from peace operations on the Balkans to countering insurgent terrorism in Afghanistan. When developing CIMIC, the Alliance obviously neglected the historical lessons from counterinsurgency campaigns.  相似文献   
57.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
58.
This paper presents a quantitative index of the level of risk assumed by a contractor in various contract type situations. The definition includes expression of real world uncertainty and contractor's utility for money. Examples are given for the major contract types and special applications are discussed.  相似文献   
59.
This paper presents a new methodology to solve the cyclic preference scheduling problem for hourly workers. The focus is on nurse rostering but is applicable to any organization in which the midterm scheduling decision must take into account a complex of legal, institutional, and preferential constraints. The objective is to strike a balance between satisfying individual preferences and minimizing personnel costs. The common practice is to consider each planning period independently and to generate new rosters at the beginning of each. To reduce some of the instability in the process, there is a growing trend toward cyclic schedules, which are easier to manage and are generally perceived to be more equitable. To address this problem, a new integer programming model is presented that combines the elements of both cyclic and preference scheduling. To find solutions, a branch‐and‐price algorithm is developed that makes use of several branching rules and an extremely effective rounding heuristic. A unique feature of the formulation is that the master problem contains integer rather than binary variables. Computational results are reported for problem instances with up to 200 nurses. Most were solved within 10 minutes and many within 3 minutes when a double aggregation approach was applicable. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号