首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   410篇
  免费   15篇
  2021年   4篇
  2020年   4篇
  2019年   6篇
  2017年   8篇
  2016年   7篇
  2015年   8篇
  2014年   6篇
  2013年   71篇
  2011年   4篇
  2009年   4篇
  2007年   6篇
  2005年   4篇
  2004年   7篇
  2003年   4篇
  2002年   6篇
  2001年   7篇
  2000年   4篇
  1999年   7篇
  1998年   8篇
  1997年   10篇
  1996年   6篇
  1995年   11篇
  1994年   13篇
  1993年   11篇
  1992年   11篇
  1991年   12篇
  1990年   7篇
  1989年   6篇
  1988年   8篇
  1987年   9篇
  1986年   3篇
  1985年   10篇
  1984年   9篇
  1983年   6篇
  1982年   6篇
  1981年   10篇
  1980年   6篇
  1979年   12篇
  1978年   7篇
  1977年   5篇
  1976年   6篇
  1975年   8篇
  1974年   9篇
  1973年   6篇
  1972年   10篇
  1971年   6篇
  1970年   3篇
  1969年   3篇
  1968年   5篇
  1967年   4篇
排序方式: 共有425条查询结果,搜索用时 15 毫秒
31.
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046  相似文献   
32.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   
33.
34.
35.
36.
A new algorithm is presented for finding maximal and maximum value flows in directed single-commodity networks. Commonly algorithms developed for this problem find a maximal flow by gradually augmenting (increasing) a feasible flow to a maximal flow. In the presented algorithm, at the beginning of each step or iteration, the flow on arcs is assigned to flow capacity. This may lead to an infeasible flow violating flow conservation at some nodes. During two passes of a MAIN step, consisting of a forward pass and a backward pass, the flow is reduced on some arcs to regain feasibility. The network is then pruned by omitting saturated arcs, and the process is repeated. The parallel implementation of the algorithm applies the two main steps at the same time to the same network. The outputs of the two steps are compared and the processing continues with the higher feasible flow. The algorithm is simple, intuitive, and efficient. © 1993 John Wiley & Sons, Inc.  相似文献   
37.
In this article we investigate situations where the buyer is offered discounted price schedules from alternative vendors. Given various discount schedules, the buyer must make the best buying decision under a variety of constraints, such as limited storage space and restricted inventory budgets. Solutions to this problem can be utilized by the buyer to improve profitability. EOQ models for multiple products with all-units discounts are readily solvable in the absence of constraints spanning the products. However, constrained discounted EOQ models lack convenient mathematical properties. Relaxing the product-spanning constraints produces a dual problem that is separable, but lack of convexity and smoothness opens the door for duality gaps. In this research we present a set of algorithms that collectively find the optimal order vector. Finally, we present numerical examples using actual data. to illustrate the application of the algorithms. © 1993 John Wiley & Sons, Inc.  相似文献   
38.
We develop approximations to estimate the expected backorders in a multiechelon system in which lateral supply actions between bases are allowed when a backorder occurs. These approximations are easy to compute, and the average absolute error over a wide range of parameter values is less than 4% when items are depot repairable, even when bases are dissimilar. With lateral supply, backorder reductions of 30-50% are not uncommon, and a 72% reduction was observed in two cases. Lateral supply becomes more important with low demand rates. A similar approach was unsuccessful for base-repairable items. However, lateral supply has a beneficial effect only when the lateral supply time is very short, 1/4 or less of the average base repair time. Even in such cases lateral supply is unlikely to be important in an actual application, because base management can expedite repair of critical items.  相似文献   
39.
We show that the deterministic nonpreemptive scheduling problem with earliness and tardiness penalties can be solved in polynomial time for certain forms of an objective function provided that a certain optimization problem can be solved. We give instances where this problem has a solution and show that this generalizes several results from the literature. These results do not require symmetric penalization and the penalty functions need only be lower semicontinuous.  相似文献   
40.
We study a class of replacement models for systems subject to deterioration. The objective is to determine an optimal replacement policy that minimizes the average operating costs of the system. We use a parametric analysis to establish sufficient conditions for the optimality of control limit policies. This work generalizes several existing results for optimal replacement models in the literature. © 1992 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号