首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   491篇
  免费   97篇
  国内免费   9篇
  2022年   4篇
  2021年   18篇
  2020年   3篇
  2019年   13篇
  2018年   13篇
  2017年   8篇
  2016年   12篇
  2015年   13篇
  2014年   17篇
  2013年   83篇
  2012年   5篇
  2011年   18篇
  2010年   21篇
  2009年   29篇
  2008年   13篇
  2007年   21篇
  2006年   15篇
  2005年   20篇
  2004年   4篇
  2003年   4篇
  2002年   5篇
  2001年   8篇
  2000年   5篇
  1999年   36篇
  1998年   27篇
  1997年   16篇
  1996年   24篇
  1995年   16篇
  1994年   16篇
  1993年   16篇
  1992年   13篇
  1991年   9篇
  1990年   14篇
  1989年   8篇
  1988年   7篇
  1987年   5篇
  1985年   5篇
  1983年   3篇
  1982年   2篇
  1979年   2篇
  1975年   2篇
  1974年   1篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
  1970年   3篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有597条查询结果,搜索用时 15 毫秒
171.
The assignment of personnel to teams is a fundamental managerial function typically involving several objectives and a variety of idiosyncratic practical constraints. Despite the prevalence of this task in practice, the process is seldom approached as an optimization problem over the reported preferences of all agents. This is due in part to the underlying computational complexity that occurs when intra-team interpersonal interactions are taken into consideration, and also due to game-theoretic considerations, when those taking part in the process are self-interested agents. Variants of this fundamental decision problem arise in a number of settings, including, for example, human resources and project management, military platooning, ride sharing, data clustering, and in assigning students to group projects. In this article, we study an analytical approach to “team formation” focused on the interplay between two of the most common objectives considered in the related literature: economic efficiency (i.e., the maximization of social welfare) and game-theoretic stability (e.g., finding a core solution when one exists). With a weighted objective across these two goals, the problem is modeled as a bi-level binary optimization problem, and transformed into a single-level, exponentially sized binary integer program. We then devise a branch-cut-and-price algorithm and demonstrate its efficacy through an extensive set of simulations, with favorable comparisons to other algorithms from the literature.  相似文献   
172.
In September 1878 the British Museum received a donation of a folded metal plate which had been embossed and gilded. Restoration of the object revealed that the folded plate was in fact the outer casing of a Roman copper alloy cavalry sports type helmet which dates to the late second or third century AD. The story of what became known as the Guisborough helmet began 14 years earlier in what was then the North Riding of Yorkshire when workers employed by the Cleveland Railway Company discovered a ‘very curious plate of metal’ during road construction. It appears that the helmet was deliberately prepared for deposition and buried at a depth of c30 cm close to a stream. Examination by the authors suggests that this was a high value item that had been repaired many times. Experimental evidence suggests that the decoration alone required approximately 16 h to fashion.  相似文献   
173.
为研究PID调节下H桥式逆变器的非线性行为,选取逆变器输入电压为分岔参数,利用频闪映射法推导出PID调节下H桥式逆变器的离散数学模型.使用Matlab编程得到系统输出电流随输入电压变化的动态分岔图,通过数值仿真验证了离散数学模型的正确性.仿真结果表明频闪映射法适用于建立H桥式逆变器的离散数学模型;PID调节下H桥式逆变器存在分岔行为.研究结果可为建立PID调节下H桥式逆变器的离散数学模型提供参考.  相似文献   
174.
Whose preferences determine the tradeoff between security and civilian output in deciding upon budget allocations to defence? This paper considers the role that consumer preferences might play in influencing military spending. We propose normative criteria to judge the economic or political efficiency of defence provision at a given time, and test them using Australian survey‐based micro‐data. Our results suggest that the political system has not delivered a simple social‐choice translation of individual preferences into collective outcomes, nor has it delivered results consistent with simple majority‐voting median preferences.  相似文献   
175.
Using tests of a single equation model and cointegration techniques, this paper finds no evidence of a long run trade‐off, and some evidence of a short‐run trade‐off, between military spending and investment in post‐World War II United States data. The short‐run trade‐off is confined to the 1949–1971 period, and may be the result of the sharp expansion and contraction of military outlays in connection with the Korean and Vietnam Wars. In addition, cointegration techniques are used to identify a possible long‐run trade‐off between military spending and consumption.  相似文献   
176.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
177.
178.
摘要:针对存储器的特点,介绍了存储器简化的功能故障模型.基于一种既可以测试静态简化故障又可以测试动态简化故障的MarchSS算法,提出了一种改进的存储器测试算法MarchSSI算法.该算法不仅能测出MarchSS算法测试的所有功能故障,而且能够覆盖MarchSS算法遗漏的故障,使算法故障覆盖率有了一定的提高.通过仿真,验证了算法的可行性.  相似文献   
179.
ABSTRACT

In March 2015, the South Australian state government established a royal commission to investigate the financial, social, technical, diplomatic, and nonproliferation benefits and risks of expanding its nuclear industry, including activities related to uranium mining; enriching, reprocessing, and fabricating nuclear fuels for both domestic use and export; producing nuclear power; and storing radiological waste, including foreign spent reactor fuel. Given its enormous uranium reserves and current mining activities, some Australians have argued that Australia could benefit financially by expanding the mining sector and by adding value to its uranium exports by enriching the material and fabricating it into reactor fuel assemblies. Others have maintained that Australia can realize significant economic benefits by recycling and storing foreign spent fuel and producing carbon-free nuclear power. In the end, the commission recommended that Australia consider opening up a high-level waste repository to take in foreign spent fuel. It did not recommend any other nuclear activities at this time. The following viewpoint is based on testimony I delivered to the commission on the nuclear weapon proliferation implications of the proposed activities. If Australia wants to avoid the temptation of selling nuclear goods to states that might use these goods to make bombs, it should only consider new nuclear activities that can be entirely financed by the private sector and turn a profit without having to resort to foreign sales. This policy would also enable Australia to set an important, new international nonproliferation standard.  相似文献   
180.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号