首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   286篇
  免费   8篇
  2021年   2篇
  2020年   3篇
  2019年   5篇
  2018年   4篇
  2017年   7篇
  2016年   7篇
  2015年   6篇
  2013年   58篇
  2011年   4篇
  2009年   6篇
  2008年   4篇
  2007年   2篇
  2006年   3篇
  2005年   7篇
  2004年   7篇
  2003年   4篇
  2002年   2篇
  2000年   3篇
  1999年   4篇
  1998年   2篇
  1997年   2篇
  1996年   8篇
  1995年   3篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   12篇
  1989年   5篇
  1988年   3篇
  1987年   7篇
  1986年   9篇
  1985年   12篇
  1984年   3篇
  1983年   3篇
  1980年   3篇
  1979年   3篇
  1978年   3篇
  1977年   5篇
  1976年   4篇
  1974年   5篇
  1973年   2篇
  1972年   8篇
  1971年   5篇
  1970年   8篇
  1969年   4篇
  1968年   4篇
  1967年   5篇
  1966年   3篇
  1949年   1篇
  1948年   1篇
排序方式: 共有294条查询结果,搜索用时 62 毫秒
51.
The threat posed by the proliferation of weapons of mass destruction is real and urgent. Combating this threat requires a new and comprehensive approach by the federal government. It requires sustained leadership at the top and an organizational structure that can set policies and objectives for combating proliferation; develop integrated, government‐wide plans to implement those policies and objectives, including plans for acquiring necessary technology; make appropriate decisions regarding how resources should be allocated to carry out those plans; and regularly evaluate the effectiveness of our policies, programs, and operations. There is no such comprehensive approach today.  相似文献   
52.
53.
This article proposes two dual‐ascent algorithms and uses each in combination with a primal drop heuristic embedded within a branch and bound framework to solve the uncapacitated production assembly distribution system (i.e., supply chain) design problem, which is formulated as a mixed integer program. Computational results indicate that one approach, which combines primal drop and dual‐ascent heuristics, can solve instances within reasonable time and prescribes solutions with gaps between the primal and dual solution values that are less than 0.15%, an efficacy suiting it for actual large‐scale applications. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
54.
The insurgency in southern Thailand has proven to be intractable over the last few years. The insurgents, who comprise several different groups, have largely retained the initiative in a series of relatively unsophisticated operations. Although involving ethnic Malay Muslims – and marked by an increasingly strong Islamist ideology – the insurgency has been predominantly ethnic rather than religious. External jihadist involvement has been minimal at best. The recent coup in Thailand may improve the odds of reaching some form of accommodation with the southern insurgents; but it is likely that the south will remain a continuing security problem for Bangkok.  相似文献   
55.
Multiple ethnic insurgencies have existed in Myanmar since independence. The military junta's response has been extremely brutal at the tactical level, but has shown some political astuteness at the strategic level, with a series of ceasefires with most of the ethnic groups. Despite these ceasefires – most of which have resulted in the continued existence of quasi-independent armed groups – other ethnic movements have continued their armed operations. The overall strategic picture is one of stalemate, with the ethnic movements continuing to exist, but with few realistic prospects of expanding their operations.  相似文献   
56.
The northeast states of India have faced a series of insurgencies almost since independence. Most insurgent groups have been based on the competing demands of various ethnic groups, with conflicts not only between the insurgents and the government, but also between groups. The combination of anti-government and intercommunal violence shows little sign of ending. Although the Indian government has made progress in dealing with the largest groups, the continued existence of several dozen insurgent movements represents a significant security threat to internal stability in India.  相似文献   
57.
This article examines the problem of optimally selecting from several unknown rewards when there are given alternative, costly sources of information. The optimal rule, indicating the information to be purchased and the reward to be selected, is specified as a function of the decision maker's prior probabilities regarding the value of each alternative. The rule is surprisingly complex, balancing prior beliefs, the “informativeness” of the relevant information system, and the cost of acquiring information.  相似文献   
58.
An alternating renewal process starts at time zero and visits states 1,2,…,r, 1,2, …,r 1,2, …,r, … in sucession. The time spent in state i during any cycle has cumulative distribution function Fi, and the sojourn times in each state are mutually independent, positive and nondegenerate random variables. In the fixed time interval [0,T], let Ui(T) denote the total amount of time spent in state i. In this note, a central limit theorem is proved for the random vector (Ui(T), 1 ≤ ir) (properly normed and centered) as T → ∞.  相似文献   
59.
We consider the optimal replacement problem for a fault tolerant system comprised of N components. The components are distingushable, and the state of the system is given by knowing exactly which components are operationl and which have failed. The individual component failure rates depend on the state of the entire system. We assume that the rate at which the system produces income decreases as the system deteriorates and the system replacement cost rises. Individual components cannot be replaced. We give a greedy-type algorithm that produces the replacement policy that maximizes the long-run net system income per unit time.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号