首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   308篇
  免费   5篇
  313篇
  2021年   4篇
  2019年   9篇
  2018年   5篇
  2017年   4篇
  2015年   3篇
  2014年   4篇
  2013年   49篇
  2010年   4篇
  2009年   3篇
  2008年   6篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   4篇
  2002年   3篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   4篇
  1994年   2篇
  1993年   5篇
  1992年   6篇
  1991年   9篇
  1990年   6篇
  1989年   8篇
  1988年   8篇
  1987年   8篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   5篇
  1978年   6篇
  1977年   6篇
  1976年   7篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   3篇
  1971年   9篇
  1970年   5篇
  1969年   4篇
  1968年   5篇
  1967年   7篇
  1966年   6篇
排序方式: 共有313条查询结果,搜索用时 15 毫秒
241.
Irrespective our views on the rationality of our opponent's continuing to conduct operations against us, unless utterly extirpated, he retains a vote on when and how conflict will end. This is because war is about power — compelling another actor to do something he would not otherwise do, or to cease doing something he would otherwise prefer to do. In planning for conflict termination we should account for the peculiarities of opponents who may decide not to quit when we have beat them fair and square. We do not desire that they cease conventional fighting, but that they cease fighting altogether.  相似文献   
242.
The article examines Stalin's intelligence on the capitalist world, including materials from military archives, diplomatic archives, and Stalin's private papers. It explores how these materials were collected, interpreted and shaped by Stalin's prejudices. It concludes that, from the end of the Civil War to the Nazi invasion, Stalin and the Soviet leadership believed that the Soviet Union was under a nearly constant threat of invasion from shifting coalitions of capitalist powers. No such threat existed until the late 1930s, but Stalin's perceptions have important implications for our understanding of Soviet foreign and domestic politics in the interwar period.  相似文献   
243.
This article borrows from the work of Clausewitz to posit two general approaches to the pursuit of limitation in war, one being political and the other technical. The political approach seeks to control escalation via consensual arrangements with the adversary, while the technical approach seeks to forestall escalation by peremptorily destroying the enemy's military capability. It is argued that the 'Revolution in Military Affairs' (RMA) instantiates the second, technical, approach to war limitation. By exploiting advanced technology, the US armed forces hope to limit the costs of war by defeating their adversaries in a rapid, decisive manner. The problems associated with this approach are discussed in relation to the nature of the conflicts that the US is likely to face in the foreseeable future. The article concludes by suggesting that such conflicts will require that more attention be paid to the political sources of limitation in war.  相似文献   
244.
This paper investigates a class of two-person zero-sum multiple payoff games in which each component is deterministic. The problem of minimizing a player's total underachievement of a fixed set of goals is shown to reduce to a linear programming problem. Applications are discussed and illustrative examples are presented.  相似文献   
245.
Least absolute value (LAV) regression has become a widely accepted alternative to least squares regression. This has come about as the result of advancements in statistical theory and computational procedures to obtain LAV estimates. Computer codes are currently available to solve a wide range of LAV problems including the best subset regression. The purpose of this article is to study the use of penalty calculations and other branching rules in developing the solution tree for the best subset LAV regression.  相似文献   
246.
In this paper marginal investment costs are assumed known for two kinds of equipment stocks employed to supply telecommunications services: trunks and switching facilities. A network hierarchy is defined which includes important cases occurring in the field and also appearing in the literature. A different use of the classical concept of the marginal capacity of an additional trunk at prescribed blocking probability leads to a linear programming supply model which can be used to compute the sizes of all the high usage trunk groups. The sizes of the remaining trunk groups are approximated by the linear programming models, but can be determined more accurately by alternate methods once all high usage group sizes are computed. The approach applies to larger scale networks than previously reported in the literature and permits direct application of the duality theory of linear programming and its sensitivity analyses to the study and design of switched probabilistic communications networks with multiple busy hours during the day. Numerical results are presented for two examples based on field data, one of which having been designed by the multi-hour engineering method.  相似文献   
247.
This paper analyses the E/M/c queueing system and shows how to calculate the expected number in the system, both at a random epoch and immediately preceding an arrival. These expectations are expressed in terms of certain initial probabilities which are determined by linear equations. The advantages and disadvantages of this method are also discussed.  相似文献   
248.
For a linear fractional programming problem, Sharma and Swarup have constructed a dual problem, also a linear fractional program, in which the objective functions of both primal and dual problems are the same. Craven and Mond have extended this result to a nonlinear fractional programming problem with linear constraints, and a dual problem for which the objective function is the same as that of the primal. This theorem is now further extended from linear to differentiable convex constraints.  相似文献   
249.
250.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号