首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   619篇
  免费   51篇
  国内免费   4篇
  2021年   9篇
  2020年   9篇
  2019年   24篇
  2018年   17篇
  2017年   12篇
  2016年   12篇
  2015年   12篇
  2014年   16篇
  2013年   120篇
  2011年   12篇
  2010年   13篇
  2009年   10篇
  2008年   17篇
  2007年   14篇
  2006年   8篇
  2005年   12篇
  2004年   7篇
  2003年   8篇
  2002年   8篇
  2001年   9篇
  2000年   8篇
  1999年   13篇
  1998年   10篇
  1997年   13篇
  1996年   15篇
  1995年   13篇
  1994年   16篇
  1993年   9篇
  1992年   10篇
  1991年   14篇
  1990年   13篇
  1989年   13篇
  1988年   12篇
  1987年   10篇
  1986年   10篇
  1985年   9篇
  1984年   7篇
  1983年   6篇
  1981年   6篇
  1980年   10篇
  1979年   6篇
  1978年   7篇
  1976年   6篇
  1975年   8篇
  1972年   7篇
  1971年   10篇
  1970年   7篇
  1968年   7篇
  1967年   5篇
  1966年   7篇
排序方式: 共有674条查询结果,搜索用时 15 毫秒
71.
We consider a reader—writer system consisting of a single server and a fixed number of jobs (or customers) belonging to two classes. Class one jobs are called readers and any number of them can be processed simultaneously. Class two jobs are called writers and they have to be processed one at a time. When a writer is being processed no other writer or readers can be processed. A fixed number of readers and writers are ready for processing at time 0. Their processing times are independent random variables. Each reader and writer has a fixed waiting cost rate. We find optimal scheduling rules that minimize the expected total waiting cost (expected total weighted flowtime). We consider both nonpreemptive and preemptive scheduling. The optimal nonpreemptive schedule is derived by a variation of the usual interchange argument, while the optimal schedule in the preemptive case is given by a Gittins index policy. These index policies continue to be optimal for systems in which new writers enter the system in a Poisson fashion. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 483–495, 1998  相似文献   
72.
We develop a simple algorithm, which does not require convolutions, for computing the distribution of the residual life when the renewal process is discrete. We also analyze the algorithm for the particular case of lattice distributions, and we show how it can apply to an inventory problem. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 435–443, 1999  相似文献   
73.
74.
75.
This article deals with investigating the effect of cut-outs on the natural frequencies of magneto-electro-elastic (MEE) plates incorporating finite element methods based on higher order shear deformation theory (HSDT). In order to consider the influence of cut-out, the energy of the cut-out domain is sub-tracted from the total energy of the entire plate. The governing equations of motions are derived through incorporating Hamilton's principle and the solution is obtained using condensation technique. The proposed numerical formulation is verified with the results of previously published literature as well as the numerical software. In addition, this research focuses on evaluating the effect of geometrical skewness and boundary conditions on the frequency response. The influence of cut-outs on the degree of coupling between magnetic, electric and elasticfields is also investigated.  相似文献   
76.
In order to examine the possibility to improve its camouflage properties standard cotton fabric with camouflage print was impregnated with poly(vinyl butyral), PVB and fullerene-like nanoparticles of tungsten disulfide, PVB/IF-WS2. FTIR analysis excluded any possible chemical interaction of IF-WS2 with PVB and the fabric. The camouflage behavior of the impregnated fabric has been examined firstly in the VIS part of the spectrum. Diffuse reflection, specular gloss and color coordinates were measured for three different shades (black, brown and dark green). Thermal imaging was applied to examine the camouflage abilities of this impregnation in IR part of the spectrum. The obtained results show that PVB/IF-WS2 impregnation system induced enhacement of the materials camouflage properties, i.e. that IF-WS2 have a positive effect on spectrophotometric characteristics of the fabric.  相似文献   
77.
In nuclear nonproliferation negotiations, many governments pursue multiple objectives, and changes in policy can occur rapidly—and often unexpectedly. For these reasons, understanding nonproliferation requires empathy and imagination rather than just historical fact. This article considers one teaching tool to encourage such insight—simulations—and demonstrates how teaching and scholarship can interact to improve our understanding of the complex decisions and negotiations involved in nuclear nonproliferation. The article consists of five parts: first, it explains the benefits of simulations as both a policy development tool in Washington and as a teaching tool in universities; second, it describes the pedagogical strategy of the Stanford University simulation program; third, it shows how the simulations have identified and highlighted theoretical and substantive insights that are often neglected in scholarly studies of nonproliferation; and fourth, it describes how students are tested to enhance the learning experience from the simulation. Fifth and finally, the article provides concluding observations about how using simulations in the classroom can help scholars develop insights that improve their understanding of real-world nuclear negotiation dynamics and outcomes.  相似文献   
78.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
79.

The US Air Force is asking when to replace its aging aircraft. We develop a framework to identify economically optimal replacement strategies that recognizes cost trade-offs and incorporates age effects. We also preview a stochastic methodology. We use the framework to identify an optimal strategy, defined by the replacement age, for a generic fleet and conduct a sensitivity analysis. Quantitative illustrations show that the range of strategies that provides close-to-optimal outcomes widens as the operating and support (O&S) cost growth rate decreases and the ratio of the acquisition price to the initial O&S cost increases. A wider range implies more decision-making leeway.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号