首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   498篇
  免费   10篇
  508篇
  2021年   5篇
  2019年   13篇
  2018年   9篇
  2017年   11篇
  2016年   9篇
  2015年   10篇
  2013年   85篇
  2011年   5篇
  2010年   6篇
  2009年   4篇
  2007年   6篇
  2006年   7篇
  2005年   11篇
  2004年   8篇
  2003年   5篇
  2001年   5篇
  2000年   9篇
  1999年   6篇
  1998年   5篇
  1997年   10篇
  1996年   12篇
  1995年   4篇
  1994年   11篇
  1993年   7篇
  1992年   7篇
  1991年   15篇
  1990年   9篇
  1989年   14篇
  1988年   7篇
  1987年   13篇
  1986年   9篇
  1985年   14篇
  1984年   9篇
  1983年   7篇
  1982年   7篇
  1981年   9篇
  1980年   10篇
  1979年   8篇
  1978年   8篇
  1977年   8篇
  1976年   9篇
  1975年   6篇
  1974年   13篇
  1973年   8篇
  1972年   11篇
  1971年   13篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
排序方式: 共有508条查询结果,搜索用时 0 毫秒
101.
This article presents a branch and bound method for solving the problem of minimizing a separable concave function over a convex polyhedral set where the variables are restricted to be integer valued. Computational results are reported.  相似文献   
102.
Structured finite action-finite state space discounted Markovian decision problems are analyzed. Any problem of a general class is shown to be equivalent to a “separated” problem with decomposable problem structure. A modified policy iteration approach is developed for this decomposable reformulation. Both analytic and computer evaluations of the decomposition algorithm's effectiveness are presented.  相似文献   
103.
A general algorithm is developed for minimizing a well defined concave function over a convex polyhedron. The algorithm is basically a branch and bound technique which utilizes a special cutting plane procedure to' identify the global minimum extreme point of the convex polyhedron. The indicated cutting plane method is based on Glover's general theory for constructing legitimate cuts to identify certain points in a given convex polyhedron. It is shown that the crux of the algorithm is the development of a linear undrestimator for the constrained concave objective function. Applications of the algorithm to the fixed-charge problem, the separable concave programming problem, the quadratic problem, and the 0-1 mixed integer problem are discussed. Computer results for the fixed-charge problem are also presented.  相似文献   
104.
105.
Suppose x1, x2, … are independently distributed random variables with Pr (xi = 1) = Pr(xi = ?1) = 1/2, and let sn =

  相似文献   

106.
107.
Let us assume that observations are obtained at random and sequentially from a population with density function In this paper we consider a sequential rule for estimating μ when σ is unknown corresponding to the following class of cost functions In this paper we consider a sequential rule for estimating μ when σ is unknown corresponding to the following class of cost functions Where δ(XI,…,XN) is a suitable estimator of μ based on the random sample (X1,…, XN), N is a stopping variable, and A and p are given constants. To study the performance of the rule it is compared with corresponding “optimum fixed sample procedures” with known σ by comparing expected sample sizes and expected costs. It is shown that the rule is “asymptotically efficient” when absolute loss (p=-1) is used whereas the one based on squared error (p = 2) is not. A table is provided to show that in small samples similar conclusions are also true.  相似文献   
108.
The class of functions expressed as linear (not necessarily convex) combinations of negative exponential functions is dense in the set of all square integrable functions on the nonnegative reals. Because of this and resultant mathematical properties, linear combinations of exponential densities have excellent potential for wide application in stochastic modeling. This work documents the development and testing of a practical procedure for maximum-likelihood estimation for these generalized exponential mixtures. The algorithm offered for the problem is of the Jacobi type and guarantees that the result will provide a legitimate probability function of the prescribed type. Extensive testing has been performed and results are very favorable: convergence is rapid and the use of computer resources rather limited.  相似文献   
109.
Although industry is expected to design hardware to fit into a general support system and to be capable of arguing life-cycle system costs, adequate information has not been available on the support system in terms of policies and operating decision rules. Policies and operating decisions by users dominate engineering design decisions in determining life-cycle support costs. The relative effect of each of these decision areas on support costs has yet to be resolved empirically. Without an understanding of the sensitivity of support costs to alternative designs, capability is limited in design improvement and support of end items. Life-cycle costing of analysis under cost-effectiveness and the maintainability of integrated logistics support is open to question.  相似文献   
110.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号