首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   345篇
  免费   13篇
  国内免费   1篇
  2021年   5篇
  2020年   3篇
  2019年   15篇
  2018年   9篇
  2017年   8篇
  2016年   5篇
  2015年   3篇
  2014年   6篇
  2013年   56篇
  2012年   3篇
  2011年   3篇
  2010年   7篇
  2009年   3篇
  2007年   7篇
  2005年   7篇
  2004年   6篇
  2002年   9篇
  2000年   3篇
  1999年   7篇
  1998年   9篇
  1997年   7篇
  1996年   4篇
  1995年   4篇
  1994年   8篇
  1993年   11篇
  1992年   6篇
  1991年   10篇
  1990年   7篇
  1989年   9篇
  1988年   6篇
  1987年   8篇
  1986年   8篇
  1985年   7篇
  1984年   6篇
  1982年   6篇
  1981年   7篇
  1980年   4篇
  1979年   5篇
  1978年   5篇
  1977年   3篇
  1976年   6篇
  1975年   4篇
  1974年   5篇
  1973年   4篇
  1972年   4篇
  1969年   4篇
  1968年   5篇
  1967年   3篇
  1966年   4篇
  1948年   2篇
排序方式: 共有359条查询结果,搜索用时 31 毫秒
131.
In this article, a quality-control design framework that employs information for the supplier-buyer system is modeled. Significant operational savings may be obtained by using the integrated plans developed under this framework. This is especially true when the cost of a defective is high, and the variable sampling and rework costs are low. Analysis of the interaction of defective, rework, and variable sampling costs reveals that the savings are the result of a shift of control effort from the process-control to the lot-acceptance stage, which is the consequence of tradeoffs involving both stages. The managerial impact of adopting integrated plans is discussed.  相似文献   
132.
This article is a theoretic study of the following problem in verification: Mobile units under control of an agent, whom we call the HIDER, travel on a known transportation network and must at the conclusion of their itinerary report locations at fixed time intervals to a monitoring authority, whom we call the SEEKER. The purpose of this reporting requirement is to verify that illegal units do not infiltrate the network from sources under the control of the HIDER. We assume that the SEEKER has an independent intelligence-gathering capability which gives sightings of both legal and illegal units. The purpose of this article is to quantify the advantage of frequent over infrequent reporting. © 1992 John Wiley & Sons, Inc.  相似文献   
133.
This article shows how to determine the stationary distribution of the virtual wait in M/G/1 queues with either one-at-a-time or exhaustive server vacations, depending on either service times or accrued workload. For the first type of dependence, each vacation time is a function of the immediately preceding service time or of whether the server finds the system empty after returning from vacation. In this way, it is possible to model situations such as long service times followed by short vacations, and vice versa. For the second type of dependence, the vacation time assigned to an arrival to follow its service is a function of the level of virtual wait reached. By this device, we can model situations in which vacations may be shortened whenever virtual delays have gotten excessive. The method of analysis employs level-crossing theory, and examples are given for various cases of service and vacation-time distributions. A closing discussion relates the new model class to standard M/G/1 queues where the service time is a sum of variables having complex dependencies. © 1992 John Wiley & Sons, Inc.  相似文献   
134.
In a variety of industrial situations experimental outcomes are only record-breaking observations. The data available may be represented as X1, K1., X2, K2,…, where X1, X2,… are the successive minima and K1, K2, … are the number of trials needed to obtain new records. Samaniego and Whitaker [11, 12] discussed the problem of estimating the survival function in both parametric and nonparametric setups when the data consisted of record-breaking observations. In this article we derive nonparametric Bayes and empirical Bayes estimators of the survival function for such data under a Dirichlet process prior and squared error loss. Furthermore, under the assumptions that the process of observing random records can be replicated, the weak convergence of the Bayes estimator is studied as the number of replications grows large. The calculations involved are illustrated by adopting Proschan's [9] data on successive failure times of air conditioning units on Boeing aircraft, for our purpose. The nonparametric maximum likelihood estimators of the survival function for different choices of the prior are displayed for comparison purposes.  相似文献   
135.
In this article, we study a two‐level lot‐sizing problem with supplier selection (LSS), which is an NP‐hard problem arising in different production planning and supply chain management applications. After presenting various formulations for LSS, and computationally comparing their strengths, we explore the polyhedral structure of one of these formulations. For this formulation, we derive several families of strong valid inequalities, and provide conditions under which they are facet‐defining. We show numerically that incorporating these valid inequalities within a branch‐and‐cut framework leads to significant improvements in computation. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 647–666, 2017  相似文献   
136.
Rather than win hearts and minds, authoritarian counterinsurgency is said to rely heavily on coercion. It has a reputation for effectiveness, if also for its amorality. Still, the research into authoritarian counterinsurgency is surprisingly lacking. By distilling common features from key cases, this article concludes that this approach goes beyond the indiscriminate violence that typically captures the imagination. Like their democratic counterparts but differently, authoritarian regimes also engage in mobilisation, create narratives, and turn military advantage into political gain. The analysis explains how these tasks are undertaken and, by contradistinction, sheds light on more liberal approaches as well.  相似文献   
137.
This article develops a methodology for testing constant exchange risk properties and identifying an appropriate form for a decision maker's utility function. These risk properties characterize six different utility functions which are sums of products of polynomials and exponential functions. Such functional forms are commonly used in decision analysis applications. The practical advantage of this methodology is that these constant exchange risk properties eliminate the usual arbitrariness in the selection of a parametric utility function and often reduce the data requirements for subsequent estimation. The procedure is straightforward to apply. The decision maker need only provide certainty equivalents for two-outcome gambles and determine the more-preferred gamble in paired comparisons. The technical details of the procedure can be handled by interactive computer software.  相似文献   
138.
Empirical Bayes' methods had been used by Brier, Zacks, and Marlow [1] for estimating performance characteristic vectors of success probabilities. The problem is that of estimating k-dimensional success probabilities of dependent binomial random variables, which are highly correlated. The present study reinforces the results of the previous one by showing, via simulations, that the relative efficiency of the empirical Bayes estimators, compared to the Stein-type and to the maximum-likelihood ones, is very high. This holds even if the success proportions are based on a small number of trials. We study the case of equicorrelation structure with positive correlations.  相似文献   
139.
The existence of ordinal criteria is a factor that complicates multiple criteria problems. In this article we develop an approach for the problem of choosing among discrete alternatives assuming that criteria are ordinal. The approach requires pairwise comparisons of alternatives by the decision maker. Based on these comparisons, presumably inferior alternatives are eliminated. Experience on randomly generated problems indicates that the approach usually chooses one of the most preferred alternatives and requires a small number of pairwise comparisons.  相似文献   
140.
A double-ended queue with a Poisson arrival pattern is examined in a situation where the rates depend (in a restricted sense) on both the time and the state of the system. Under some circumstances, the rates can be controlled. This article studies the distribution of the difference in queue sizes for each member of a large class of control strategies and introduces the problem of determining the optimal times at which the control should be in effect in order to maximize certain objective functions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号