首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   377篇
  免费   9篇
  2021年   7篇
  2020年   4篇
  2019年   13篇
  2018年   7篇
  2017年   7篇
  2015年   5篇
  2014年   4篇
  2013年   57篇
  2010年   5篇
  2009年   6篇
  2008年   7篇
  2007年   3篇
  2005年   3篇
  2004年   6篇
  2003年   4篇
  2002年   5篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   7篇
  1997年   4篇
  1996年   10篇
  1995年   6篇
  1994年   3篇
  1993年   6篇
  1992年   6篇
  1991年   11篇
  1990年   5篇
  1989年   14篇
  1988年   8篇
  1987年   11篇
  1986年   11篇
  1985年   6篇
  1984年   9篇
  1982年   5篇
  1981年   6篇
  1980年   11篇
  1979年   5篇
  1978年   7篇
  1977年   4篇
  1976年   7篇
  1975年   6篇
  1974年   6篇
  1972年   4篇
  1971年   8篇
  1970年   6篇
  1969年   6篇
  1968年   5篇
  1967年   5篇
  1966年   6篇
排序方式: 共有386条查询结果,搜索用时 15 毫秒
171.
Book reviews     
British Naval Policy and Norwegian Security: Maritime Power in Transition, 1951-60.. By Mats Berdal. Forsvarsstudier No. 2/92, Institutt For Forsvarsstudier (IFS) Oslo, Norway, 1992, ISSN 0333-3981.

The European Security Order Recast: Scenarios for the Post-Cold War Era.. By Barry Buzan, Morten Kelstrup, Pierre Lemaitre, Elzbieta Tromer and OLE Waever. Pinter, London (1990), ISBN 086187143X, £30.00.

Mates and Muchachos: Unit Cohesion in the Falklands War.. By Nora Kinzer Stewart. Brassey's (US), Washington DC (1991), ISBN 008-037-4395, $20.

The Declining Hegemon: The United States and European Defense, 1960-1990.. By Joseph Lepgold. Praeger, New York (1990), ISBN 0-275-93657-0, $15.95 pb.

Inventing Accuracy: A Historical Sociology of Nuclear Missile Guidance.. By Donald Mackenzie. MIT Press, Cambridge MA, and London, England (1990), ISBN 262-132-583, £19.95.  相似文献   
172.
This paper is a case study. We show how the powerful methods of time series analysis can be used to investigate the interrelationships between Alert Availability, a logistics performance variable, and Flying Hours, an operational requirement, in the presence of a major change in operating procedures and using contaminated data. The system considered is the fleet of C-141 aircraft of the U.S. Air Force. The major change in operating procedures was brought about by what is known as Reliability Centered Maintenance, and the contaminated data were due to anomalies in reporting procedures. The technique used is a combination of transfer function modeling and intervention analysis.  相似文献   
173.
It is shown that there is an optimal strategy for a class of stochastic scheduling problems which is nonpreemptive. The results which yield this conclusion are generalizations of previous ones due to Glazebrook and Gittins. These new results also lead to an evaluation of the performance of nonpreemptive strategies in a large class of problems of practical interest.  相似文献   
174.
A model is developed taking into consideration all the costs (namely cost of sampling, cost of not detecting a change in the process, cost of a false indication of change, and the cost of readjusting detected changes) incurred when a production process, using an unscheduled setup policy, utilizes fraction-defective control charts to control current production. The model is based on the concept of the expected time between detection of changes calling for setups. It is shown that the combination of unscheduled setups and control charts can be utilized in an optimal way if those combinations of sample size, sampling interval, and extent of control limits from process average are used that provide the minimum expected total cost per unit of time. The costs of a production process that uses unscheduled setups in conjunction with the appropriate optimal control charts are compared to the costs of a production process that uses scheduled setups at optimum intervals in conjunction with its appropriate control charts. This comparison indicates the criteria for selecting production processes with scheduled setups using optimal setup intervals over unscheduled setups. Suggestions are made to evaluate the optimal process setup strategy and the accompanying optimal decision parameters, for any specific cost data, by use of computer enumeration. A numerical example for assumed cost and process data is provided.  相似文献   
175.
This paper concerns the approximation of optimal allocations by δ allocations. δ allocations are obtained by fixing an increment δ of effort and deciding at each step upon a single cell in which to allocate the entire increment. It is shown that δ allocations may be used as a simple method of approximating optimal allocations of effort resulting from constrained separable optimization problems involving a finite number of cells. The results are applied to find δ allocations (called δ plans) which approximate optimal search plans. δ plans have the property that as δ → 0, the mean time to find the target using a δ plan approaches the mean time when using the optimal plan. δ plans have the advantage that. they are easily computed and more easily realized in practice than optimal plans which tend to be difficult to calculate and to call for spreading impractically small amounts of effort over large areas.  相似文献   
176.
In this paper, the mathematical model for the allocation of resources among a general mix of percentage vulnerable and of numerically vulnerable weapon systems is presented and solved. Percentage vulnerable systems consist of mobile weapons which are difficult to locate, but relatively easy to destroy once located; numerically vulnerable systems comprise easily located fixed base weapons which are difficult to destroy. The distinguishing feature of this analysis is the inclusion of development costs. The theory of max-min is extended as necessary to solve this problem. References are provided to a sequence of earlier versions of this problem.  相似文献   
177.
A population of items which break down at random times and require repair is studied (the classic “machine repair problem with spares”). It is desired to determine the number of repair channels and spares required over a multiyear planning horizon in which population size and component reliability varies, and a service level constraint is imposed. When an item fails, a spare (if available) is immediately dispatched to replace the failed item. The failed item is removed, transported to the repair depot, repaired, and then placed in the spares pool (which is constrained to be empty not more than 10% of the time) unless there is a backlog of requests for spares, in which case it is dispatched immediately. The first model considered treats removal, transportation, and repair as one service operation. The second model is a series queue which allows for the separate treatment of removal, transportation, and repair. Breakdowns are assumed Poisson and repair times exponential.  相似文献   
178.
The most vital link in a single commodity flow network is that are whose removal results in the greatest reduction in the value of the maximal flow in the network between a source node and a sink node. This paper develops an iterative labeling algorithm to determine the most vital link in the network. A necessary condition for an are to be the most vital link is established and is employed to decrease the number of ares which must be considered.  相似文献   
179.
In this paper we examine the one- and two-sided sampling plans for the exponential distribution. Solutions are provided for several situations arising out of the assumptions on the knowledge of the parameters of the distribution. The values of the constants are tabled in the special case of p1 = p2 for the two-sided plans.  相似文献   
180.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号