首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3584篇
  免费   87篇
  国内免费   1篇
  2021年   38篇
  2019年   92篇
  2018年   57篇
  2017年   81篇
  2016年   82篇
  2015年   70篇
  2014年   73篇
  2013年   764篇
  2012年   46篇
  2011年   56篇
  2010年   57篇
  2009年   50篇
  2008年   71篇
  2007年   60篇
  2006年   46篇
  2005年   47篇
  2004年   56篇
  2003年   45篇
  2002年   59篇
  1999年   42篇
  1998年   47篇
  1997年   51篇
  1996年   63篇
  1995年   43篇
  1994年   62篇
  1993年   64篇
  1992年   59篇
  1991年   74篇
  1990年   40篇
  1989年   73篇
  1988年   80篇
  1987年   70篇
  1986年   71篇
  1985年   64篇
  1984年   37篇
  1983年   42篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   47篇
  1978年   49篇
  1977年   45篇
  1976年   46篇
  1975年   47篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1970年   41篇
  1969年   40篇
排序方式: 共有3672条查询结果,搜索用时 15 毫秒
221.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
222.
Particularly in African operations, United Nations (UN) peacekeeping forces have faced significant problems in restoring stability. In at least a few situations, unilateral national military interventions have been launched in the same countries. In the cases of Sierra Leone and Côte d’Ivoire, the British and French interventions respectively played a significant role in re-establishing stability. Lessons from these operations suggest that if effective coordination and liaison channels are established, such hybrid unilateral-UN missions can in fact be more successful than “pure” peace operations.  相似文献   
223.
224.
Whenever n demand points are located on a hemisphere, spherical location problems can be solved easily using geometrical methods or mathematical programming. A method based on a linear programming formulation with four constraints is presented to determine whether n demand points are on a hemisphere. The formulation is derived from a modified minimax spherical location problem whose Karush-Kuhn-Tucker conditions are the constraints of the linear program. © 1993 John Wiley & Sons, Inc.  相似文献   
225.
A new class of nonparametric reliability models is introduced and studied. A distribution is said to be better at age s than at age t (sBt) if the residual lifetime at age s is stochastically greater than or equal to the residual lifetime at age t. Applications to various forms of replacement policies, including the cannibalization of failed systems, are noted. For fixed s < t, the problem of estimating a survival curve assumed to belong to the sBt class is addressed using recursive methods. An sBt estimator is derived in closed form, and its uniform strong consistency at an optimal rate of convergence is demonstrated. A simulation study strongly supports the claim that the sBt estimator tends to outperform the empirical survivor function in small- and moderate-size samples. © 1993 John Wiley & Sons, Inc.  相似文献   
226.
Product support encompasses activities undertaken by durable goods producers to ensure their customers the continued use of the product. Examples of product support elements include after the sale activities such as providing repair services and warranty programs, as well as all the activities undertaken at the design and production stage to improve the reliability of products before they reach the market. The implications of incorporating customer costs while designing product support packages are the concern of this study. We study how the parameters of support package impact the costs incurred by customers and provide insights about selecting appropriate levels of product support. We show that the engineering orientation of maximizing the product's availability ignores market characteristics, and results in a mismatch between the corporation's support package and the customer's needs. The research is intended to be a step in understanding the interaction between design engineering parameters and customer's costs. © 1993 John Wiley & Sons, Inc.  相似文献   
227.
We model a two-echelon multi-indentured repairable-item inventory system where each “base” has a maximum number of identical online machines, and each machine consists of several module types. Machine failures are due to module failures and occur according to an exponential distribution. When a machine fails, the failed module is replaced by an identical spare module if one is available. Otherwise, the module is backordered. All failed modules go to a single “depot” repair facility which consists of a finite number of identical repairmen who are able to repair any module type in an exponentially distributed time, although the repair rates for different module types may differ. The principal contribution of this article is an approximation algorithm for calculating the steady-state characteristics of the system. In comparison with simulation results, the algorithm is quite accurate and computationally efficient. © 1993 John Wiley & Sons, Inc.  相似文献   
228.
229.
A new algorithm is presented for finding maximal and maximum value flows in directed single-commodity networks. Commonly algorithms developed for this problem find a maximal flow by gradually augmenting (increasing) a feasible flow to a maximal flow. In the presented algorithm, at the beginning of each step or iteration, the flow on arcs is assigned to flow capacity. This may lead to an infeasible flow violating flow conservation at some nodes. During two passes of a MAIN step, consisting of a forward pass and a backward pass, the flow is reduced on some arcs to regain feasibility. The network is then pruned by omitting saturated arcs, and the process is repeated. The parallel implementation of the algorithm applies the two main steps at the same time to the same network. The outputs of the two steps are compared and the processing continues with the higher feasible flow. The algorithm is simple, intuitive, and efficient. © 1993 John Wiley & Sons, Inc.  相似文献   
230.
In this article we consider a single-server system whose customers arrive by appointments only. Both static and dynamic scheduling problems are studied. In static scheduling problems, one considers scheduling a finite number of customer arrivals, assuming there is no scheduled customer arrival to the system. In dynamic scheduling problems, one considers scheduling one customer arrival only, assuming that there are a number of scheduled customers already. The expected delay time is recursively computed in terms of customer interarrival times for both cases. The objective is to minimize the weighted customer delay time and the server completion time. The problem is formulated as a set of nonlinear equations. Various numerical examples are illustrated. © 1993 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号