全文获取类型
收费全文 | 710篇 |
免费 | 18篇 |
出版年
2019年 | 17篇 |
2018年 | 12篇 |
2017年 | 20篇 |
2016年 | 13篇 |
2015年 | 17篇 |
2014年 | 20篇 |
2013年 | 136篇 |
2012年 | 7篇 |
2010年 | 9篇 |
2009年 | 14篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 9篇 |
2004年 | 13篇 |
2003年 | 10篇 |
2002年 | 11篇 |
2001年 | 6篇 |
2000年 | 11篇 |
1999年 | 7篇 |
1998年 | 13篇 |
1997年 | 7篇 |
1996年 | 9篇 |
1995年 | 6篇 |
1994年 | 17篇 |
1993年 | 18篇 |
1992年 | 10篇 |
1991年 | 17篇 |
1990年 | 12篇 |
1989年 | 18篇 |
1988年 | 20篇 |
1987年 | 18篇 |
1986年 | 20篇 |
1985年 | 14篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 13篇 |
1976年 | 9篇 |
1975年 | 8篇 |
1974年 | 13篇 |
1973年 | 9篇 |
1972年 | 10篇 |
1971年 | 7篇 |
1970年 | 12篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 6篇 |
排序方式: 共有728条查询结果,搜索用时 15 毫秒
451.
452.
453.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014 相似文献
454.
Austin J. Lemoine 《海军后勤学研究》1986,33(3):431-443
A network model incorporating stochastic features is considered. The model represents a complex sequential process where an object or system moves through a succession of states (nodes) and operating modes (classes) in the course of carrying out its function (fulfilling its purpose). Transitions between states and operating modes occur in a possibly random manner and require (consume) some resource in randomly varying amounts. We discuss the routing behavior and resource requirements of a typical object as it moves through (and eventually out of) the network. We then shift our focus from a single object and its odyssey to the network as a whole, where time is the resource and many objects are entering the network according to a possibly nonhomogeneous Poisson pattern; in this vein, we discuss the evolution of the network over time. Finally, we consider some applications of the formulation, and results. 相似文献
455.
Consider an experiment in which only record-breaking values (e.g., values smaller than all previous ones) are observed. The data available may be represented as X1,K1,X2,K2, …, where X1,X2, … are successive minima and K1,K2, … are the numbers of trials needed to obtain new records. We treat the problem of estimating the mean of an underlying exponential distribution, and we consider both fixed sample size problems and inverse sampling schemes. Under inverse sampling, we demonstrate certain global optimality properties of an estimator based on the “total time on test” statistic. Under random sampling, it is shown than an analogous estimator is consistent, but can be improved for any fixed sample size. 相似文献
456.
Minimum cardinality set covering problems (MCSCP) tend to be more difficult to solve than weighted set covering problems because the cost or weight associated with each variable is the same. Since MCSCP is NP-complete, large problem instances are commonly solved using some form of a greedy heuristic. In this paper hybrid algorithms are developed and tested against two common forms of the greedy heuristic. Although all the algorithms tested have the same worst case bounds provided by Ho [7], empirical results for 60 large randomly generated problems indicate that one algorithm performed better than the others. 相似文献
457.
458.
459.
460.