首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300篇
  免费   0篇
  300篇
  2021年   5篇
  2019年   4篇
  2018年   2篇
  2017年   5篇
  2016年   6篇
  2015年   4篇
  2014年   3篇
  2013年   77篇
  2011年   2篇
  2010年   2篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   7篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   8篇
  1987年   6篇
  1986年   8篇
  1985年   7篇
  1983年   3篇
  1982年   9篇
  1981年   1篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   5篇
  1976年   2篇
  1975年   5篇
  1974年   5篇
  1973年   8篇
  1972年   6篇
  1971年   8篇
  1970年   5篇
  1969年   5篇
  1968年   6篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有300条查询结果,搜索用时 0 毫秒
71.
Empirical Bayes' methods had been used by Brier, Zacks, and Marlow [1] for estimating performance characteristic vectors of success probabilities. The problem is that of estimating k-dimensional success probabilities of dependent binomial random variables, which are highly correlated. The present study reinforces the results of the previous one by showing, via simulations, that the relative efficiency of the empirical Bayes estimators, compared to the Stein-type and to the maximum-likelihood ones, is very high. This holds even if the success proportions are based on a small number of trials. We study the case of equicorrelation structure with positive correlations.  相似文献   
72.
    
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
73.
    
ABSTRACT

What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions.  相似文献   
74.
    
In this paper a very versatile game model is developed for use in the long range planning of our strategic force posture. This highly aggregate model yields optimal force mixes for the triad (land- and sea-based missile systems and bombers) under a variety of constraints. The model described here is a survivability model; however, it is shown how the model can still be used as a measure of overall system effectiveness. Constraints imposed on the problem include both SALT and budget limitations.  相似文献   
75.
76.
    
History teaches that counterinsurgency and counterterrorism campaigns have never been won through purely military action. Defeating an opponent who avoids open battle, but who uses force to reach his goals, including terrorist action, requires a combination of police, administrative, economic and military measures. As a counterinsurgency campaign should pursue a comprehensive political objective, it requires high levels of civil–military cooperation. However, current NATO doctrine for Civil–Military Cooperation (CIMIC) as it emerged from the 1990s is founded in conventional war-fighting and outdated peacekeeping doctrine. CIMIC's focus is on supporting military objectives rather than enabling the military to make a coherent contribution to political objectives. This makes CIMIC unfit for the Alliance's main operational challenges that have expanded from peace operations on the Balkans to countering insurgent terrorism in Afghanistan. When developing CIMIC, the Alliance obviously neglected the historical lessons from counterinsurgency campaigns.  相似文献   
77.
We consider a generalization of the well‐known generalized assignment problem (GAP) over discrete time periods encompassed within a finite planning horizon. The resulting model, MultiGAP, addresses the assignment of tasks to agents within each time period, with the attendant single‐period assignment costs and agent‐capacity constraint requirements, in conjunction with transition costs arising between any two consecutive periods in which a task is reassigned to a different agent. As is the case for its single‐period antecedent, MultiGAP offers a robust tool for modeling a wide range of capacity planning problems occurring within supply chain management. We provide two formulations for MultiGAP and establish that the second (alternative) formulation provides a tighter bound. We define a Lagrangian relaxation‐based heuristic as well as a branch‐and‐bound algorithm for MultiGAP. Computational experience with the heuristic and branch‐and‐bound algorithm on over 2500 test problems is reported. The Lagrangian heuristic consistently generates high‐quality and in many cases near‐optimal solutions. The branch‐and‐bound algorithm is also seen to constitute an effective means for solving to optimality MultiGAP problems of reasonable size. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
78.
We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP‐hard and develop a heuristic algorithm based on formulating the problem as an assignment problem. The effectiveness of the heuristic is analyzed from both worst‐case and computational points of view. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 363–385, 2001  相似文献   
79.
In this article we deal with the shortest queue model with jockeying. We assume that the arrivals are Poisson, each of the exponential servers has his own queue, and jockeying among the queues is permitted. Explicit solutions of the equilibrium probabilities, the expected customers, and the expected waiting time of a customer in the system are given, which only depend on the traffic intensity. Numerical results can be easily obtained from our solutions. Several examples are provided in the article.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号