首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   731篇
  免费   17篇
  2021年   7篇
  2019年   17篇
  2018年   13篇
  2017年   17篇
  2016年   16篇
  2015年   15篇
  2013年   134篇
  2011年   9篇
  2010年   7篇
  2009年   10篇
  2008年   7篇
  2007年   8篇
  2006年   8篇
  2005年   16篇
  2004年   14篇
  2003年   9篇
  2000年   10篇
  1999年   9篇
  1998年   7篇
  1997年   11篇
  1996年   20篇
  1995年   6篇
  1994年   16篇
  1993年   9篇
  1992年   11篇
  1991年   24篇
  1990年   9篇
  1989年   17篇
  1988年   9篇
  1987年   17篇
  1986年   18篇
  1985年   22篇
  1984年   12篇
  1983年   9篇
  1982年   7篇
  1981年   9篇
  1980年   13篇
  1979年   10篇
  1978年   10篇
  1977年   13篇
  1976年   12篇
  1975年   7篇
  1974年   16篇
  1973年   10篇
  1972年   17篇
  1971年   17篇
  1970年   10篇
  1969年   10篇
  1968年   9篇
  1967年   8篇
排序方式: 共有748条查询结果,搜索用时 15 毫秒
581.
The following zero-sum game is considered. Red chooses in integer interval [1, n] two integer intervals consisting of k and m points where k + m < n, and Blue chooses an integer point in [1, n]. The payoff to Red equals 1 if the point chosen by Blue is at least in one of the intervals chosen by Red, and 0 otherwise. This work complements the results obtained by Ruckle, Baston and Bostock, and Lee. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 353–364, 1997  相似文献   
582.
Determination of the gunfire probability of kill against a target requires two parameters to be taken into consideration: the likelihood of hitting the target (susceptibility) and the conditional probability of kill given a hit (vulnerability). Two commonly used methods for calculating the latter probability are (1) treating each hit upon the target independently, and (2) setting an exact number of hits to obtain a target kill. Each of these methods contains an implicit assumption about the probability distribution of the number of hits‐to‐kill. Method (1) assumes that the most likely kill scenario occurs with exactly one hit, whereas (2) implies that achieving a precise number of hits always results in a kill. These methods can produce significant differences in the predicted gun effectiveness, even if the mean number of hits‐to‐kill for each distribution is the same. We therefore introduce a new modeling approach with a more general distribution for the number of hits‐to‐kill. The approach is configurable to various classes of damage mechanism and is able to match both methods (1) and (2) with a suitable choice of parameter. We use this new approach to explore the influence of various damage accumulation models on the predicted effectiveness of weapon‐target engagements.  相似文献   
583.
ABSTRACT

Attempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar.  相似文献   
584.
Economic freedom has increased living standards worldwide. Concurrent with such gains are rising concerns about potential human costs associated with free markets. This paper uses data on human trafficking and anti-trafficking policies, in conjunction with a measure of economic freedom, to examine whether free markets exacerbate or attenuate the incidence of human trafficking and policies designed to combat it. We do not find evidence suggesting that economic freedom is associated with human trafficking. In addition, our results suggest that economically free countries are more likely to enact and enforce policies to fight human trafficking.  相似文献   
585.
586.
为了解决武器平台多目标跟踪器分配问题,用数学表达式描述了问题和评价跟踪器分配方案的规则,分析了多目标跟踪器常用的几种分配算法的效率,包括穷举法、顺序法和全排列顺序法等几种算法.提出了一种新的基于综合分析的分配算法,算法利用上述问题描述和评价规则推导的结论简化了算法,对算法的空间复杂性和时间复杂性进行了分析,并对算法的正确性进行证明.  相似文献   
587.
This article provides conditions under which total‐cost and average‐cost Markov decision processes (MDPs) can be reduced to discounted ones. Results are given for transient total‐cost MDPs with transition rates whose values may be greater than one, as well as for average‐cost MDPs with transition probabilities satisfying the condition that there is a state such that the expected time to reach it is uniformly bounded for all initial states and stationary policies. In particular, these reductions imply sufficient conditions for the validity of optimality equations and the existence of stationary optimal policies for MDPs with undiscounted total cost and average‐cost criteria. When the state and action sets are finite, these reductions lead to linear programming formulations and complexity estimates for MDPs under the aforementioned criteria.© 2017 Wiley Periodicals, Inc. Naval Research Logistics 66:38–56, 2019  相似文献   
588.
We study an (R, s, S) inventory control policy with stochastic demand, lost sales, zero lead‐time and a target service level to be satisfied. The system is modeled as a discrete time Markov chain for which we present a novel approach to derive exact closed‐form solutions for the limiting distribution of the on‐hand inventory level at the end of a review period, given the reorder level (s) and order‐up‐to level (S). We then establish a relationship between the limiting distributions for adjacent values of the reorder point that is used in an efficient recursive algorithm to determine the optimal parameter values of the (R, s, S) replenishment policy. The algorithm is easy to implement and entails less effort than solving the steady‐state equations for the corresponding Markov model. Point‐of‐use hospital inventory systems share the essential characteristics of the inventory system we model, and a case study using real data from such a system shows that with our approach, optimal policies with significant savings in inventory management effort are easily obtained for a large family of items.  相似文献   
589.
We consider a problem of scheduling jobs on m parallel machines. The machines are dedicated, i.e., for each job the processing machine is known in advance. We mainly concentrate on the model in which at any time there is one unit of an additional resource. Any job may be assigned the resource and this reduces its processing time. A job that is given the resource uses it at each time of its processing. No two jobs are allowed to use the resource simultaneously. The objective is to minimize the makespan. We prove that the two‐machine problem is NP‐hard in the ordinary sense, describe a pseudopolynomial dynamic programming algorithm and convert it into an FPTAS. For the problem with an arbitrary number of machines we present an algorithm with a worst‐case ratio close to 3/2, and close to 3, if a job can be given several units of the resource. For the problem with a fixed number of machines we give a PTAS. Virtually all algorithms rely on a certain variant of the linear knapsack problem (maximization, minimization, multiple‐choice, bicriteria). © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
590.
The article considers a two-person competitive problem in which a traveller wishes to choose a path across a rectangle from left to right in such a way as to avoid being ambushed by his adversary who has placed obstacles within the rectangle. Our results supplement those that have already been obtained by Ruckle and they indicate that, under certain conditions, the players need to adopt rather sophisticated strategies if they are to act optimally. This suggests that a complete solution to the problem could be difficult.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号