首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   564篇
  免费   13篇
  2021年   6篇
  2019年   13篇
  2018年   9篇
  2017年   11篇
  2016年   9篇
  2015年   9篇
  2014年   5篇
  2013年   104篇
  2010年   5篇
  2009年   9篇
  2008年   10篇
  2006年   5篇
  2005年   8篇
  2004年   12篇
  2003年   8篇
  2002年   5篇
  2001年   5篇
  2000年   7篇
  1998年   7篇
  1997年   6篇
  1996年   17篇
  1995年   7篇
  1994年   9篇
  1993年   7篇
  1992年   10篇
  1991年   18篇
  1990年   6篇
  1989年   12篇
  1988年   11篇
  1987年   14篇
  1986年   16篇
  1985年   18篇
  1984年   9篇
  1983年   5篇
  1982年   5篇
  1981年   6篇
  1980年   12篇
  1979年   6篇
  1978年   9篇
  1977年   8篇
  1976年   9篇
  1975年   7篇
  1974年   8篇
  1972年   11篇
  1971年   12篇
  1970年   11篇
  1969年   8篇
  1968年   9篇
  1967年   9篇
  1966年   9篇
排序方式: 共有577条查询结果,搜索用时 15 毫秒
541.
542.
543.
In this article an algorithm for computing upper and lower ? approximations of a (implicitly or explicitly) given convex function h defined on an interval of length T is developed. The approximations can be obtained under weak assumptions on h (in particular, no differentiability), and the error decreases quadratically with the number of iterations. To reach an absolute accuracy of ? the number of iterations is bounded by

  相似文献   

544.
545.
546.
One goal of experimentation is to identify which design parameters most significantly influence the mean performance of a system. Another goal is to obtain good parameter estimates for a response model that quantifies how the mean performance depends on influential parameters. Most experimental design techniques focus on one goal at a time. This paper proposes a new entropy‐based design criterion for follow‐up experiments that jointly identifies the important parameters and reduces the variance of parameter estimates. We simplify computations for the normal linear model by identifying an approximation that leads to a closed form solution. The criterion is applied to an example from the experimental design literature, to a known model and to a critical care facility simulation experiment. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
547.
In a multifunction radar, the maximum number of targets that can be managed or tracked is an important performance measure. Interleaving algorithms developed to operate radars exploit the dead‐times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. The problem of interleaving N targets involves a search among N! possibilities, and suboptimal solutions are usually employed to satisfy the real‐time constraints of the radar system. In this paper, we present new tight 0–1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
548.
549.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   
550.
This article challenges the conventional wisdom that Neville Chamberlain rejected the British tradition of balance of power in the 1930s. In contrast to balance of power and balance of threat theories, states do not balance against aggregate or net shifts in power. Instead, leaders define threats based on particular elements of a foreign state's power. The import is that different components of power of a foreign state are more or less threatening and aggregate shifts in power alone may not provoke counterbalancing behavior. In the 1930s, Britain balanced against the most threatening components of power: the German Luftwaffe and the threat of a knock-out air assault against the homeland, Japan's Imperial Navy and its threat to Britain's commercial trade routes and the Dominions in East Asia, and the Italian Navy and the threat to Britain's line of communication through the Mediterranean Sea to India and Asia. Given Britain's difficult financial circumstances, all other components of power, such as the army and the land components of power of Germany, Japan, and Italy were ranked as secondary in terms of its rearmament priorities. Thus, London was able to narrow the gap with Berlin in specific components of power of strategic importance such as aircraft production or to exceed Germany in other areas such as the Royal Navy and its battlefleet.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号