全文获取类型
收费全文 | 569篇 |
免费 | 22篇 |
国内免费 | 1篇 |
出版年
2021年 | 7篇 |
2019年 | 12篇 |
2018年 | 8篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 10篇 |
2014年 | 7篇 |
2013年 | 113篇 |
2012年 | 6篇 |
2011年 | 8篇 |
2010年 | 6篇 |
2009年 | 9篇 |
2008年 | 7篇 |
2007年 | 6篇 |
2006年 | 9篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 7篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1997年 | 7篇 |
1996年 | 14篇 |
1995年 | 5篇 |
1994年 | 12篇 |
1993年 | 12篇 |
1992年 | 11篇 |
1991年 | 17篇 |
1989年 | 10篇 |
1988年 | 8篇 |
1987年 | 10篇 |
1986年 | 14篇 |
1985年 | 19篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 5篇 |
1980年 | 10篇 |
1979年 | 10篇 |
1978年 | 11篇 |
1977年 | 6篇 |
1976年 | 11篇 |
1975年 | 11篇 |
1974年 | 9篇 |
1973年 | 10篇 |
1972年 | 13篇 |
1971年 | 9篇 |
1970年 | 12篇 |
1969年 | 6篇 |
1968年 | 9篇 |
1967年 | 7篇 |
排序方式: 共有592条查询结果,搜索用时 15 毫秒
341.
For more than a decade, multiattribute utility/value theory and multiobjective mathematical programming have offered different approaches to similar problems. Unfortunately, the two areas have developed with little interaction in spite of their common aims. We consider the use of utility/value functions in a mathematical programming framework, and demonstrate that these functions often possess desirable properties from an optimization point of view. We conclude that a hybridization of approaches is more viable than is perhaps commonly assumed. 相似文献
342.
The problem is to protect a set of T identical targets that may come under attack by A identical weapons. The targets are to be defended by D identical interceptors, which must be preallocated to defend selected targets. The attacker is aware of the number of interceptors, but is ignorant of their allocation. The size of the attack is chosen by the attacker from within a specified range. The robust strategies developed in this article do not require the defender to assume an attack size. Rather, the defender chooses a strategy which is good over a wide range of attack sizes, though not necessarily best for any particular attack size. The attacker, knowing that the defender is adopting a robust strategy, chooses the optimal attack strategy for the number of weapons he chooses to expend. The expected number of survivors is a function of the robust defense strategy and optimal attack strategy against this robust defense. 相似文献
343.
Wilbert E. Wilhelm 《海军后勤学研究》1987,34(5):721-738
This article develops a structure by which the computational complexity of sequencing problems in assembly cells attended by one or two robots may be evaluated. A taxonomy of cell features that affect complexity is developed, polynomial-time algorithms are presented for certain problems, and borderline designs at which complexity changes dramatically are identified. Results will aid cell designers by indicating classes of designs for which task sequence may be optimized and other classes for which this cannot be done. Designs which entail features that lead to intractable sequencing problems may be modified to maximize cell productivity. 相似文献
344.
Max G. Manwaring 《Low Intensity Conflict & Law Enforcement》2002,11(2):190-209
If one could look through the familiar artificial political lines and colors of a current world map into the twenty-first century strategic reality, one could see a complex new security arena. A deeper look into that picture would provide magical snapshots that show several types of ambiguous and asymmetric conflicts, and state failure - and their causes and consequences. Then, with some additional adjustments of focus, one can discern a number of issues that cannot be shown in two-dimensional space. They are briefly discussed as follows. First and importantly, one can get a better idea of the complex threat situation and the ultimate threat - state failure. Second, an even deeper examination of the vision of contemporary wars reveals the shadows of things that have been and of those that will be on the road ahead. Third, a closer look at the familiar and troubling world map exposes some signposts on the road ahead that indicate the most significant changes in the landscape. Finally, our magical microscope reveals a short list of the basic challenges and tasks that can help discerning civilian and military leaders negotiate the road through the new global security environment. 相似文献
345.
Mark E. Ferguson 《海军后勤学研究》2003,50(8):917-936
Negotiations between an end product manufacturer and a parts supplier often revolve around two main issues: the supplier's price and the length of time the manufacturer is contractually held to its order quantity, commonly termed the “commitment time frame.” Because actual demand is unknown, the specification of the commitment time frame determines how the demand risk is shared among the members of the supply chain. Casual observation indicates that most manufacturers prefer to delay commitments as long as possible while suppliers prefer early commitments. In this paper, we investigate whether these goals are always in the firm's best interest. In particular, we find that the manufacturer may sometimes be better off with a contract that requires an early commitment to its order quantity, before the supplier commits resources and the supplier may sometimes be better off with a delayed commitment. We also find that the preferred commitment time frame depends upon which member of the supply chain has the power to set their exchange price. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
346.
We develop and estimate optimal age replacement policies for devices whose age is measured in two time scales. For example, the age of a jet engine can be measured in the number of flight hours and the number of landings. Under a single‐scale age replacement policy, a device is replaced at age τ or upon failure, whichever occurs first. We show that a natural generalization to two scales is to replace nonfailed devices when their usage path crosses the boundary of a two‐dimensional region M, where M is a lower set with respect to the matrix partial order. For lifetimes measured in two scales, we consider devices that age along linear usage paths. We generalize the single‐scale long‐run average cost, estimate optimal two‐scale policies, and give an example. We note that these policies are strongly consistent estimators of the true optimal policies under mild conditions, and study small‐sample behavior using simulation. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 592–613, 2003. 相似文献
347.
In this paper, confidence intervals are given for two quantities of importance related to renewal processes. For each quantity, two confidence intervals are discussed. One confidence interval is given for general, all‐purpose use. Another confidence interval is given which is easier to compute, but not of general use. The case where data are subject to right censorship is also considered. Some numerical comparisons are made. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 638–649, 2003. 相似文献
348.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
349.
350.
We present transient and asymptotic reliability indices for a single‐unit system that is subject to Markov‐modulated shocks and wear. The transient results are derived from the (transform) solution of an integro‐differential equation describing the joint distribution of the cumulative degradation process and the state of the modulating process. Additionally, we prove the asymptotic normality of a properly centered and time‐scaled version of the cumulative degradation at time t. This asymptotic result leads to a simple normal approximation for a properly centered and space‐scaled version of the systes lifetime distribution. Two numerical examples illustrate the quality of the normal approximation. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献