首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   314篇
  免费   3篇
  317篇
  2021年   3篇
  2019年   4篇
  2017年   4篇
  2016年   4篇
  2015年   5篇
  2014年   5篇
  2013年   80篇
  2011年   2篇
  2010年   4篇
  2009年   2篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   4篇
  2004年   3篇
  2003年   4篇
  2002年   4篇
  2000年   2篇
  1999年   3篇
  1996年   6篇
  1995年   6篇
  1994年   9篇
  1993年   4篇
  1992年   4篇
  1991年   5篇
  1990年   2篇
  1989年   6篇
  1988年   10篇
  1987年   5篇
  1986年   11篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   8篇
  1980年   6篇
  1979年   3篇
  1978年   3篇
  1977年   5篇
  1976年   3篇
  1975年   7篇
  1974年   5篇
  1973年   8篇
  1972年   6篇
  1971年   8篇
  1970年   3篇
  1969年   6篇
  1968年   6篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有317条查询结果,搜索用时 0 毫秒
181.
In a recent article we demonstrated that implicit optimal modeling for shift scheduling (P2) has inherent size and execution time advantages over the general set-covering formulation for shift scheduling (P1) [11, 13]. We postulated that the absence of extraordinary overlap (EO) was a requirement for the equivalence of P1 and P2. We have defined EO as the condition in which the earliest and latest starts for a break in one shift are earlier and later than the earliest and latest starts for a break in any other shift(s). In this article, we prove that our earlier postulate was accurate. Additionally, we discuss research extensions and note other scheduling problems for which implicit modeling may be appropriate. © 1996 John Wiley & Sons, Inc.  相似文献   
182.
183.
184.
185.
Strategies that seek to assure other states about their security have the potential to reduce international conflict and dissuade states from seeking nuclear weapons. Yet, relative to other tools of statecraft such as deterrence, assurance remains understudied. To facilitate further empirical research on assurance strategies, this article identifies variations in the terminology scholars and policymakers have used to refer to such strategies and describes the concept of assurance associated with each variant. It seeks to clarify and standardize usage and show that there is a general, overarching concept of assurance that links the different variants. It also summarizes existing bodies of empirical research that are relevant to assessing the utility of different forms of assurance.  相似文献   
186.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here.  相似文献   
187.
188.
189.
190.
Problems having the mathematical structure of a quadratic assignment problem are found in a diversity of contexts: by the economist in assigning a number of plants or indivisible operations to a number of different geographical locations; by the architect or indusatrial engineer in laying out activities, offices, or departments in a building; by the human engineer in arranging the indicators and controls in an operators control room; by the electronics engineer in laying out components on a backboard; by the computer systems engineer in arranging information in drum and disc storage; by the production scheduler in sequencing work through a production facility; and so on. In this paper we discuss several types of algorithms for solving such problems, presenting a unifying framework for some of the existing algorithms, and dcscribing some new algorithms. All of the algorithms discussed proceed first to a feasible solution and then to better and better feasible solutions, until ultimately one is discovered which is shown to be optimal.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号