全文获取类型
收费全文 | 823篇 |
免费 | 22篇 |
出版年
2021年 | 9篇 |
2019年 | 18篇 |
2018年 | 12篇 |
2017年 | 17篇 |
2016年 | 16篇 |
2015年 | 17篇 |
2014年 | 8篇 |
2013年 | 140篇 |
2011年 | 8篇 |
2010年 | 8篇 |
2009年 | 8篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 14篇 |
2004年 | 15篇 |
2003年 | 9篇 |
2001年 | 11篇 |
2000年 | 12篇 |
1999年 | 12篇 |
1998年 | 13篇 |
1997年 | 18篇 |
1996年 | 18篇 |
1995年 | 15篇 |
1994年 | 21篇 |
1993年 | 15篇 |
1992年 | 18篇 |
1991年 | 24篇 |
1990年 | 13篇 |
1989年 | 15篇 |
1988年 | 13篇 |
1987年 | 17篇 |
1986年 | 11篇 |
1985年 | 17篇 |
1984年 | 16篇 |
1983年 | 13篇 |
1982年 | 11篇 |
1981年 | 16篇 |
1980年 | 16篇 |
1979年 | 17篇 |
1978年 | 13篇 |
1977年 | 12篇 |
1976年 | 14篇 |
1975年 | 14篇 |
1974年 | 17篇 |
1973年 | 13篇 |
1972年 | 17篇 |
1971年 | 17篇 |
1969年 | 8篇 |
1968年 | 10篇 |
1967年 | 7篇 |
排序方式: 共有845条查询结果,搜索用时 375 毫秒
51.
In this note we analyze the fractional interval programming problem (FIP) and find, explicitly, all its optimal solutions. Though our results are essentially the same as those in Charnes and Cooper [4], the proofs and analysis we provide here are considerably simpler. 相似文献
52.
The ordered matrix flow shop problem with no passing of jobs is considered. In an earlier paper, the authors have considered a special case of the problem and have proposed a simple and efficient algorithm that finds a sequence with minimum makespan for a special problem. This paper considers a more general case. This technique is shown to be considerably more efficient than are existing methods for the conventional flow shop problems. 相似文献
53.
A Linear Fractional Interval Programming problem (FIP) is the problem of extremizing a linear fractional function subject to two-sided linear inequality constraints. In this paper we develop an algorithm for solving (FIP) problems. We first apply the Charnes and Cooper transformation on (FIP) and then, by exploiting the special structure of the pair of (LP) problems derived, the algorithm produces an optimal solution to (FIP) in a finite number of iterations. 相似文献
54.
The problem is to protect a set of t targets by n perfect interceptors against an attack by m perfect weapons. If the defender solves for an optimal preallocated preferential defense and associated game value assuming m1 attackers, and the attacker knows the assumption of the defender and utilizes m2 attackers, he may be able to achieve significantly more damage than had the defender assumed that there would be m2 attackers. The article treats the robustness of preallocated preferential defense to assumptions about the size of the attack and presents results of an alternative approach. 相似文献
55.
Calculations for large Markovian finite source, finite repair capacity two-echelon repairable item inventory models are shown to be feasible using the randomization technique and a truncated state space approach. More complex models (involving transportation pipelines, multiple-item types and additional echelon levels) are also considered. 相似文献
56.
57.
Timothy C. Barkdoll Donald P. Gaver Kevin D. Glazebrook Patricia A. Jacobs Sergio Posadas 《海军后勤学研究》2002,49(8):723-742
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046 相似文献
58.
William C. Spracher 《Low Intensity Conflict & Law Enforcement》2002,11(1):29-54
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced. 相似文献
59.
60.
Modern technology is producing high reliability products. Life testing for such products under normal use condition takes a lot of time to obtain a reasonable number of failures. In this situation a step‐stress procedure is preferred for accelerated life testing. In this paper we assume a Weibull and Lognormal model whose scale parameter depends upon the present level as well as the age at the entry in the present stress level. On the basis of that we propose a parametric model to the life distribution for step‐stress testing and suggest a suitable design to estimate the parameters involved in the model. A simulation study has been done by the proposed model based on maximum likelihood estimation. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献