首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   471篇
  免费   10篇
  481篇
  2021年   5篇
  2019年   13篇
  2018年   9篇
  2017年   11篇
  2016年   9篇
  2015年   10篇
  2013年   79篇
  2011年   5篇
  2010年   6篇
  2009年   4篇
  2007年   6篇
  2006年   7篇
  2005年   11篇
  2004年   8篇
  2003年   5篇
  2001年   4篇
  2000年   9篇
  1999年   6篇
  1998年   5篇
  1997年   9篇
  1996年   12篇
  1995年   4篇
  1994年   10篇
  1993年   6篇
  1992年   7篇
  1991年   14篇
  1990年   8篇
  1989年   12篇
  1988年   6篇
  1987年   11篇
  1986年   9篇
  1985年   11篇
  1984年   9篇
  1983年   7篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   7篇
  1978年   8篇
  1977年   8篇
  1976年   9篇
  1975年   6篇
  1974年   11篇
  1973年   8篇
  1972年   9篇
  1971年   13篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
排序方式: 共有481条查询结果,搜索用时 0 毫秒
61.
62.
The British provided unprecedented shelter, training and supplies that made possible the revival of a new and better Belgian Army after the crushing German victories in 1940. Starting in Wales in 1940 as a small and disunited group, the Belgians improved more than any of the Allied exile ground forces. By 1944, their independent brigade fought well in Normandy and Belgium, restoring national pride and proving the worth of British help. The parallel and interdependent processes between the British and their Continental guests allows this analysis of the Anglo‐Belgian experience to be useful in considering British Army interactions with the other exiles as well.  相似文献   
63.
Abstract

From the 1982 Maitatsine Uprising to the 2009 Kala Kato Riot, Nigeria has been bedevilled by ethno-religious uprisings with devastating human and material losses. In almost all these crises the police and the military have featured prominently as agencies tasked with the responsibility of maintaining law and order and suppressing insurrection. While it was not alleged that they precipitated some of these risings perhaps in their attempts to stem or nip them in the bud, they have been accused of escalating the conflict either by their slow and inadequate responses, their partisanship and their arbitrary responses, or by their slackness in managing the crises and their aftermath. However, but for their efforts the security basis of the Nigerian state would have been considerably compromised by religious fundamentalism given the level of preparedness of the groups involved, their resistance and, more importantly, the recurrent nature of the uprisings. This article reflects on the management of ethno-religious uprisings in Nigeria by the police and the military. It considers the nature of the security agencies' involvement in the crises and examines the factors both within the agencies and in the larger Nigerian society which have aided or hindered their effective management of the conflicts.  相似文献   
64.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
65.
This paper deals with a two searchers game and it investigates the problem of how the possibility of finding a hidden object simultaneously by players influences their behavior. Namely, we consider the following two‐sided allocation non‐zero‐sum game on an integer interval [1,n]. Two teams (Player 1 and 2) want to find an immobile object (say, a treasure) hidden at one of n points. Each point i ∈ [1,n] is characterized by a detection parameter λi (μi) for Player 1 (Player 2) such that pi(1 ? exp(?λixi)) (pi(1 ? exp(?μiyi))) is the probability that Player 1 (Player 2) discovers the hidden object with amount of search effort xi (yi) applied at point i where pi ∈ (0,1) is the probability that the object is hidden at point i. Player 1 (Player 2) undertakes the search by allocating the total amount of effort X(Y). The payoff for Player 1 (Player 2) is 1 if he detects the object but his opponent does not. If both players detect the object they can share it proportionally and even can pay some share to an umpire who takes care that the players do not cheat each other, namely Player 1 gets q1 and Player 2 gets q2 where q1 + q2 ≤ 1. The Nash equilibrium of this game is found and numerical examples are given. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
66.
This paper examines scheduling problems in which the setup phase of each operation needs to be attended by a single server, common for all jobs and different from the processing machines. The objective in each situation is to minimize the makespan. For the processing system consisting of two parallel dedicated machines we prove that the problem of finding an optimal schedule is N P‐hard in the strong sense even if all setup times are equal or if all processing times are equal. For the case of m parallel dedicated machines, a simple greedy algorithm is shown to create a schedule with the makespan that is at most twice the optimum value. For the two machine case, an improved heuristic guarantees a tight worst‐case ratio of 3/2. We also describe several polynomially solvable cases of the later problem. The two‐machine flow shop and the open shop problems with a single server are also shown to be N P‐hard in the strong sense. However, we reduce the two‐machine flow shop no‐wait problem with a single server to the Gilmore—Gomory traveling salesman problem and solve it in polynomial time. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 304–328, 2000  相似文献   
67.
This paper develops and applies a nonparametric bootstrap methodology for setting inventory reorder points and a simple inequality for identifying existing reorder points that are unreasonably high. We demonstrate that an empirically based bootstrap method is both feasible and calculable for large inventories by applying it to the 1st Marine Expeditionary Force General Account, an inventory consisting of $20–30 million of stock for 10–20,000 different types of items. Further, we show that the bootstrap methodology works significantly better than the existing methodology based on mean days of supply. In fact, we demonstrate performance equivalent to the existing system with a reduced inventory at one‐half to one‐third the cost; conversely, we demonstrate significant improvement in fill rates and other inventory performance measures for an inventory of the same cost. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 459–478, 2000  相似文献   
68.
Sufficient conditions under which the relevation of two probability distributions is (i) NBU, (ii) IFRA, (iii) IFR are derived. The result for case (iii) corrects an error in a previous article by Baxter.  相似文献   
69.
Capacity expansion models typically minimize the discounted cost of acquisition and operation over a given planning horizon. In this article we generalize this idea to one in which a capital supply curve replaces the usual discount rate. A capital supply curve is a means to model financial outlook, investment limits, and risk. We show that when such a curve is included in a capacity expansion model, it will, under certain conditions, provide a less capital intensive solution than one which incorporates a discount rate. In this article, we also provide an algorithm that solves capacity expansion models that incorporate a capital supply curve. The attractive feature of this algorithm is that it provides a means to utilize the “discount rate” models efficiently. Throughout, we give applications in power generation planning and computational experience for this application is also presented.  相似文献   
70.
Allocation of scarce common components to finished product orders is central to the performance of assembly systems. Analysis of these systems is complex, however, when the product master schedule is subject to uncertainty. In this paper, we analyze the cost—service performance of a component inventory system with correlated finished product demands, where component allocation is based on a fair shares method. Such issuing policies are used commonly in practice. We quantify the impact of component stocking policies on finished product delays due to component shortages and on product order completion rates. These results are used to determine optimal base stock levels for components, subject to constraints on finished product service (order completion rates). Our methodology can help managers of assembly systems to (1) understand the impact of their inventory management decisions on customer service, (2) achieve cost reductions by optimizing their inventory investments, and (3) evaluate supplier performance and negotiate contracts by quantifying the effect of delivery lead times on costs and customer service. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48:409–429, 2001  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号