首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   569篇
  免费   22篇
  国内免费   1篇
  2021年   7篇
  2019年   12篇
  2018年   8篇
  2017年   12篇
  2016年   12篇
  2015年   10篇
  2014年   7篇
  2013年   113篇
  2012年   6篇
  2011年   8篇
  2010年   6篇
  2009年   9篇
  2008年   7篇
  2007年   6篇
  2006年   9篇
  2005年   9篇
  2004年   9篇
  2003年   7篇
  2000年   6篇
  1999年   6篇
  1997年   7篇
  1996年   14篇
  1995年   5篇
  1994年   12篇
  1993年   12篇
  1992年   11篇
  1991年   17篇
  1989年   10篇
  1988年   8篇
  1987年   10篇
  1986年   14篇
  1985年   19篇
  1984年   8篇
  1983年   7篇
  1982年   6篇
  1981年   5篇
  1980年   10篇
  1979年   10篇
  1978年   11篇
  1977年   6篇
  1976年   11篇
  1975年   11篇
  1974年   9篇
  1973年   10篇
  1972年   13篇
  1971年   9篇
  1970年   12篇
  1969年   6篇
  1968年   9篇
  1967年   7篇
排序方式: 共有592条查询结果,搜索用时 46 毫秒
31.
The existing literature concentrates on determining sharp upper bounds for EVPI in stochastic programming problems. This seems to be a problem without an application. Lower bounds, which we view as having an important application, are only the incidental subject of study and in the few instances that are available are obtained at an extremely high cost. In order to suggest a rethinking of the course of this research, we analyze the need for bounds on EVPI in the context of its significance in decision problems.  相似文献   
32.
The fixed charge problem is a mixed integer mathematical programming problem which has proved difficult to solve in the past. In this paper we look at a special case of that problem and show that this case can be solved by formulating it as a set-covering problem. We then use a branch-and-bound integer programming code to solve test fixed charge problems using the setcovering formulation. Even without a special purpose set-covering algorithm, the results from this solution procedure are dramatically better than those obtained using other solution procedures.  相似文献   
33.
The bounded interval generalized assignment model is a “many-for-one” assignment model. Each task must be assigned to exactly one agent; however, each agent can be assigned multiple tasks as long as the agent resource consumed by performing the assigned tasks falls within a specified interval. The bounded interval generalized assignment model is formulated, and an algorithm for its solution is developed. Algorithms for the bounded interval versions of the semiassignment model and sources-to-uses transportation model are also discussed.  相似文献   
34.
This paper discusses a class of queueing models in which the service time of a customer al a single server facility is dependent on the queue size at the onset of its service. The Laplace transform for the wait in queue distribution is derived and the utilization of the server is given when the arrival is a homogeneous Poisson process.  相似文献   
35.
This paper reconsiders the classical model for selling an asset in which offers come in daily and a decision must then be made as to whether or not to sell. For each day the item remains unsold a continuation (or maintenance cost) c is incurred. The successive offers are assumed to be independent and identically distributed random variables having an unknown distribution F. The model is considered both in the case where once an offer is rejected it may not be recalled at a later time and in the case where such recall of previous offers is allowed.  相似文献   
36.
The problem considered here is the optimal selection of the inventory of spares for a system built from two kinds of modules, the larger of which can be connected so it performs the role of the smaller one. The optimal inventory is the least costly one which achieves a specified probability that the spares will not be exhausted over the design lifetime. For some costs and failure rates it is most economical to use the larger module for both roles, due to the resulting increase in flexibility in the deployment of a single type of spare module. Both analytical and simulation methods have been used to study this problem.  相似文献   
37.
The problem is to protect a set of t targets by n perfect interceptors against an attack by m perfect weapons. If the defender solves for an optimal preallocated preferential defense and associated game value assuming m1 attackers, and the attacker knows the assumption of the defender and utilizes m2 attackers, he may be able to achieve significantly more damage than had the defender assumed that there would be m2 attackers. The article treats the robustness of preallocated preferential defense to assumptions about the size of the attack and presents results of an alternative approach.  相似文献   
38.
39.
40.
Particularly in African operations, United Nations (UN) peacekeeping forces have faced significant problems in restoring stability. In at least a few situations, unilateral national military interventions have been launched in the same countries. In the cases of Sierra Leone and Côte d’Ivoire, the British and French interventions respectively played a significant role in re-establishing stability. Lessons from these operations suggest that if effective coordination and liaison channels are established, such hybrid unilateral-UN missions can in fact be more successful than “pure” peace operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号