首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   241篇
  免费   8篇
  2021年   4篇
  2020年   3篇
  2019年   8篇
  2018年   6篇
  2017年   7篇
  2016年   7篇
  2015年   2篇
  2014年   5篇
  2013年   37篇
  2011年   2篇
  2010年   3篇
  2009年   4篇
  2008年   3篇
  2007年   2篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2003年   2篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   4篇
  1997年   5篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   9篇
  1992年   3篇
  1991年   6篇
  1989年   3篇
  1988年   10篇
  1987年   3篇
  1986年   7篇
  1985年   10篇
  1984年   8篇
  1983年   2篇
  1982年   2篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   2篇
  1974年   6篇
  1972年   2篇
  1971年   7篇
  1970年   4篇
  1969年   4篇
  1967年   2篇
  1966年   1篇
排序方式: 共有249条查询结果,搜索用时 15 毫秒
121.
Consider a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. An attack takes a random amount of time to complete. The patroller takes one time unit to move to and inspect an adjacent node, and will detect an ongoing attack with some probability. If an attack completes before it is detected, a cost is incurred. The attack time distribution, the cost due to a successful attack, and the detection probability all depend on the attack node. The patroller seeks a patrol policy that minimizes the expected cost incurred when, and if, an attack eventually happens. We consider two cases. A random attacker chooses where to attack according to predetermined probabilities, while a strategic attacker chooses where to attack to incur the maximal expected cost. In each case, computing the optimal solution, although possible, quickly becomes intractable for problems of practical sizes. Our main contribution is to develop efficient index policies—based on Lagrangian relaxation methodology, and also on approximate dynamic programming—which typically achieve within 1% of optimality with computation time orders of magnitude less than what is required to compute the optimal policy for problems of practical sizes. © 2014 Wiley Periodicals, Inc. Naval Research Logistics, 61: 557–576, 2014  相似文献   
122.
The construction of convex and concave envelopes of real‐valued functions has been of interest in mathematical programming for over 3 decades. Much of this interest stems from the fact that convex and concave envelopes can play important roles in algorithms for solving various discrete and continuous global optimization problems. In this article, we use a simplicial subdivision tool to present and validate the formula for the concave envelope of a monomial function over a rectangle. Potential algorithmic applications of this formula are briefly indicated. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
123.
We analyze the moments of the random time required for a vehicle to traverse a transportation network link of arbitrary length when its speed is governed by a random environment. The problem is motivated by stochastic transportation network applications in which the estimation of travel time moments is of great importance. We analyze this random time in a transient and asymptotic sense by employing results from the field of fluid queues. The results are demonstrated on two example problems. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
124.
In this paper, we discuss two‐dimensional failure modeling for a system where degradation is due to age and usage. We extend the concept of minimal repair for the one‐dimensional case to the two‐dimensional case and characterize the failures over a two‐dimensional region under minimal repair. An application of this important result to a manufacturer's servicing costs for a two‐dimensional warranty policy is given and we compare the minimal repair strategy with the strategy of replacement of failure. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
125.
126.
Since 2012, China’s assertion of its sovereignty claim to the contested Senkaku/Diaoyu Islands has significantly raised the risk of a potentially escalatory political-military crisis with Japan. As circumstances worsen, Japanese Prime Minister Shinzo Abe has championed major institutional reforms aimed at centralizing Japanese security policy decision-making and vastly improving crisis management. This article assesses these reforms’ significance for ameliorating Japan’s long-standing internal crisis management weaknesses, and enhancing its ability to communicate with Beijing promptly under challenging conditions. While significant issues remain, recent developments – especially the establishment of Japan’s first-ever National Security Council – demonstrate significant progress. Bilaterally, however, important firebreaks remain conspicuously absent.  相似文献   
127.
The military effectiveness literature has largely dismissed the role of material preponderance in favor of strategic interaction theories. The study of counterinsurgency, in which incumbent victory is increasingly rare despite material superiority, has also turned to other strategic dynamics explanations like force employment, leadership, and insurgent/adversary attributes. Challenging these two trends, this paper contends that even in cases of counterinsurgency, material preponderance remains an essential—and at times the most important—factor in explaining battlefield outcomes and effectiveness. To test this, the paper turns to the case of the Sri Lankan state’s fight against the Tamil Tiger insurgency, a conflict which offers rich variation over time across six periods and over 25 years. Drawing on evidence from historical and journalistic accounts, interviews, memoirs, and field research, the paper demonstrates that material preponderance accounts for variation in military effectiveness and campaign outcomes (including military victory in the final campaign) better than strategic explanations. Additionally, a new quantitative data-set assembled on annual loss-exchange ratios demonstrates the superiority of materialist explanations above those of skill, human capital, and regime type.  相似文献   
128.
The well‐known generalized assignment problem (GAP) involves the identification of a minimum‐cost assignment of tasks to agents when each agent is constrained by a resource in limited supply. The multi‐resource generalized assignment problem (MRGAP) is the generalization of the GAP in which there are a number of different potentially constraining resources associated with each agent. This paper explores heuristic procedures for the MRGAP. We first define a three‐phase heuristic which seeks to construct a feasible solution to MRGAP and then systematically attempts to improve the solution. We then propose a modification of the heuristic for the MRGAP defined previously by Gavish and Pirkul. The third procedure is a hybrid heuristic that combines the first two heuristics, thus capturing their relative strengths. We discuss extensive computational experience with the heuristics. The hybrid procedure is seen to be extremely effective in solving MRGAPs, generating feasible solutions to more than 99% of the test problems and consistently producing near‐optimal solutions. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 468–483, 2001  相似文献   
129.
Under various operational conditions, in particular in operations other than war (OOTW) or peacekeeping, an intervening force, here Blue, must occasionally engage in attrition warfare with an opposing force, here Red, that is intermingled with noncombatants. Desirably, Red armed actives are targeted, and not the unarmed noncombatants. This article describes some simple Lanchesterian attrition models that reflect a certain capacity of Blue to discriminate noncombatants from armed and active Red opponents. An explicit extension of the Lanchester square law results: Blue's abstinence concerning the indiscriminate shooting of civilians mixed with Red's is essentially reflected in a lower Blue rate of fire and less advantageous exchange rate. The model applies to other situations involving decoys, and reflects the value of a discrimination capability. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44 : 507–514, 1997  相似文献   
130.
A new piece of equipment has been purchased in a lot of size m. Some of the items can be used in destructive testing before the item is put into use. Testing uncovers faults which can be removed from the remaining pieces of equipment in the lot. If t < m pieces of equipment are tested, then those that remain, m1 = mt, have reduced fault incidence and are more reliable than initially, but m1 may be too small to be useful, or than is desirable. In this paper models are studied to address this question: given the lot size m, how to optimize by choice of t the effectiveness of the pieces of equipment remaining after the test. The models used are simplistic and illustrative; they can be straightforwardly improved. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 623–637, 1997  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号