全文获取类型
收费全文 | 308篇 |
免费 | 5篇 |
出版年
2021年 | 4篇 |
2019年 | 9篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 49篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2008年 | 6篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 9篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1992年 | 6篇 |
1991年 | 9篇 |
1990年 | 6篇 |
1989年 | 8篇 |
1988年 | 8篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 10篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1975年 | 6篇 |
1974年 | 4篇 |
1973年 | 2篇 |
1972年 | 3篇 |
1971年 | 9篇 |
1970年 | 5篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 7篇 |
1966年 | 6篇 |
排序方式: 共有313条查询结果,搜索用时 0 毫秒
191.
A single server is faced with a collection of jobs of varying duration and urgency. Each job has a random lifetime during which it is available for nonpreemptive service. Should a job's lifetime expire before its service begins then it is lost from the system unserved. The goal is to schedule the jobs for service to maximize the expected number served to completion. Two heuristics have been proposed in the literature. One (labeled πS) operates a static priority among the job classes and works well in a “no premature job loss” limit, whereas the second (πM) is a myopic heuristic which works well when lifetimes are short. Both can exhibit poor performance for problems at some distance from the regimes for which they were designed. We develop a robustly good heuristic by an approximative approach to the application of a policy improvement step to the asymptotically optimal heuristic πS, in which we use a fluid model to obtain an approximation for the value function of πS. The performance of the proposed heuristic is investigated in an extensive numerical study. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 2010 相似文献
192.
Donald P. Gaver Patricia A. Jacobs Gennady Samorodnitsky Kevin D. Glazebrook 《海军后勤学研究》2006,53(6):588-599
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006. 相似文献
193.
The anthrax attacks of 2001 energized research directed toward reducing health consequences from airborne contaminants by augmenting current heating ventilation and air-conditioning (HVAC) systems. Even during peacetime, interest will continue in improving HVAC components to reduce biocontaminants associated with sick building syndrome. Current HVAC design uses numerical simulation methods of ordinary differential equations to predict approximate performance. The authors show that state-space Laplace Transform calculations actually solve the underlying differential equations and yield algebraic expressions that provide new insight. To sharpen the arguments in favor of this methodology, attention is restricted to improving existing HVAC systems to increase protection from an external release of hazardous particulates. By nearly eliminating the need for dynamical simulation, the resulting methods can be applied to far more complex HVAC designs with little additional computational effort. The new methods reduce the time required for computation by three orders of magnitude. These algebraic methods also can be extended to disparate technical problems including internal particulate release, gas masks, and designing new protective buildings. 相似文献
194.
Irrespective our views on the rationality of our opponent's continuing to conduct operations against us, unless utterly extirpated, he retains a vote on when and how conflict will end. This is because war is about power — compelling another actor to do something he would not otherwise do, or to cease doing something he would otherwise prefer to do. In planning for conflict termination we should account for the peculiarities of opponents who may decide not to quit when we have beat them fair and square. We do not desire that they cease conventional fighting, but that they cease fighting altogether. 相似文献
195.
James Harris 《战略研究杂志》2013,36(3):513-545
The article examines Stalin's intelligence on the capitalist world, including materials from military archives, diplomatic archives, and Stalin's private papers. It explores how these materials were collected, interpreted and shaped by Stalin's prejudices. It concludes that, from the end of the Civil War to the Nazi invasion, Stalin and the Soviet leadership believed that the Soviet Union was under a nearly constant threat of invasion from shifting coalitions of capitalist powers. No such threat existed until the late 1930s, but Stalin's perceptions have important implications for our understanding of Soviet foreign and domestic politics in the interwar period. 相似文献
196.
Allan D. English 《战略研究杂志》2013,36(3):408-431
This article borrows from the work of Clausewitz to posit two general approaches to the pursuit of limitation in war, one being political and the other technical. The political approach seeks to control escalation via consensual arrangements with the adversary, while the technical approach seeks to forestall escalation by peremptorily destroying the enemy's military capability. It is argued that the 'Revolution in Military Affairs' (RMA) instantiates the second, technical, approach to war limitation. By exploiting advanced technology, the US armed forces hope to limit the costs of war by defeating their adversaries in a rapid, decisive manner. The problems associated with this approach are discussed in relation to the nature of the conflicts that the US is likely to face in the foreseeable future. The article concludes by suggesting that such conflicts will require that more attention be paid to the political sources of limitation in war. 相似文献
197.
198.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon. 相似文献
199.
200.