首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   447篇
  免费   16篇
  2021年   5篇
  2020年   5篇
  2019年   17篇
  2018年   14篇
  2017年   9篇
  2016年   12篇
  2015年   7篇
  2014年   11篇
  2013年   105篇
  2011年   10篇
  2010年   5篇
  2009年   7篇
  2008年   7篇
  2007年   8篇
  2006年   5篇
  2005年   8篇
  2004年   5篇
  2003年   5篇
  2002年   10篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1997年   8篇
  1996年   5篇
  1995年   5篇
  1994年   9篇
  1993年   10篇
  1992年   7篇
  1991年   7篇
  1990年   4篇
  1989年   7篇
  1988年   14篇
  1987年   7篇
  1986年   7篇
  1985年   11篇
  1984年   9篇
  1983年   5篇
  1980年   5篇
  1979年   6篇
  1978年   5篇
  1977年   6篇
  1976年   3篇
  1974年   7篇
  1973年   4篇
  1972年   5篇
  1971年   8篇
  1970年   6篇
  1969年   5篇
  1968年   3篇
  1967年   3篇
排序方式: 共有463条查询结果,搜索用时 15 毫秒
221.
222.
Consider a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. An attack takes a random amount of time to complete. The patroller takes one time unit to move to and inspect an adjacent node, and will detect an ongoing attack with some probability. If an attack completes before it is detected, a cost is incurred. The attack time distribution, the cost due to a successful attack, and the detection probability all depend on the attack node. The patroller seeks a patrol policy that minimizes the expected cost incurred when, and if, an attack eventually happens. We consider two cases. A random attacker chooses where to attack according to predetermined probabilities, while a strategic attacker chooses where to attack to incur the maximal expected cost. In each case, computing the optimal solution, although possible, quickly becomes intractable for problems of practical sizes. Our main contribution is to develop efficient index policies—based on Lagrangian relaxation methodology, and also on approximate dynamic programming—which typically achieve within 1% of optimality with computation time orders of magnitude less than what is required to compute the optimal policy for problems of practical sizes. © 2014 Wiley Periodicals, Inc. Naval Research Logistics, 61: 557–576, 2014  相似文献   
223.
The Western interventions in Iraq and Afghanistan have produced a heated polemic concerning the merits and demerits of counterinsurgency – the operational approach underpinning both campaigns. The two books reviewed here provide a good summation of the arguments against counterinsurgency: it is not a strategy and will fail when mistaken as such; its theory does not make intervention and war significantly easier; and even the most successful counterinsurgency campaigns have been bloody, violent, and protracted. Yet as this review highlights, beyond these central points, criticism of counterinsurgency is too often off the mark in its approach and totalizing in its pretentions. There is much to criticize and an urgent need to learn from past campaigns, yet bold claims and broad generalizations can mislead rather than enlighten. The analysis is particularly unhelpful when the definition of the central issue at hand – counterinsurgency – is being unwittingly or deliberately distorted. In the end, these two books form a poor basis for the debate that must now take place, because they are too ideological in tone, too undisciplined in approach, and therefore too unqualified in what they finally say.  相似文献   
224.
The construction of convex and concave envelopes of real‐valued functions has been of interest in mathematical programming for over 3 decades. Much of this interest stems from the fact that convex and concave envelopes can play important roles in algorithms for solving various discrete and continuous global optimization problems. In this article, we use a simplicial subdivision tool to present and validate the formula for the concave envelope of a monomial function over a rectangle. Potential algorithmic applications of this formula are briefly indicated. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
225.
We analyze the moments of the random time required for a vehicle to traverse a transportation network link of arbitrary length when its speed is governed by a random environment. The problem is motivated by stochastic transportation network applications in which the estimation of travel time moments is of great importance. We analyze this random time in a transient and asymptotic sense by employing results from the field of fluid queues. The results are demonstrated on two example problems. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
226.
In this paper, we discuss two‐dimensional failure modeling for a system where degradation is due to age and usage. We extend the concept of minimal repair for the one‐dimensional case to the two‐dimensional case and characterize the failures over a two‐dimensional region under minimal repair. An application of this important result to a manufacturer's servicing costs for a two‐dimensional warranty policy is given and we compare the minimal repair strategy with the strategy of replacement of failure. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
227.
228.
Problems in counterterrorism and corporate competition have prompted research that attempts to combine statistical risk analysis with game theory in ways that support practical decision making. This article applies these methods of adversarial risk analysis to the problem of selecting a route through a network in which an opponent chooses vertices for ambush. The motivating application is convoy routing across a road network when there may be improvised explosive devices and imperfect intelligence about their locations. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
229.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
230.
This article studies the optimal control of a periodic‐review make‐to‐stock system with limited production capacity and multiple demand classes. In this system, a single product is produced to fulfill several classes of demands. The manager has to make the production and inventory allocation decisions. His objective is to minimize the expected total discounted cost. The production decision is made at the beginning of each period and determines the amount of products to be produced. The inventory allocation decision is made after receiving the random demands and determines the amount of demands to be satisfied. A modified base stock policy is shown to be optimal for production, and a multi‐level rationing policy is shown to be optimal for inventory allocation. Then a heuristic algorithm is proposed to approximate the optimal policy. The numerical studies show that the heuristic algorithm is very effective. © 2011 Wiley Periodicals, Inc. Naval Research Logistics 58: 43–58, 2011  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号