首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   417篇
  免费   15篇
  2021年   10篇
  2019年   9篇
  2018年   4篇
  2017年   13篇
  2016年   10篇
  2015年   14篇
  2014年   13篇
  2013年   88篇
  2012年   3篇
  2011年   3篇
  2009年   4篇
  2008年   6篇
  2007年   4篇
  2006年   4篇
  2005年   4篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1997年   8篇
  1996年   5篇
  1995年   6篇
  1994年   8篇
  1993年   7篇
  1992年   7篇
  1991年   8篇
  1989年   7篇
  1988年   14篇
  1987年   6篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   8篇
  1980年   5篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有432条查询结果,搜索用时 31 毫秒
101.
A simple and relatively efficient method for simulating one-dimensional and two-dimensional nonhomogeneous Poisson processes is presented The method is applicable for any rate function and is based on controlled deletion of points in a Poisson process whose rate function dominates the given rate function In its simplest implementation, the method obviates the need for numerical integration of the rate function, for ordering of points, and for generation of Poisson variates.  相似文献   
102.
A process control scheme is developed in which decisions as to the frequency of sampling are made based upon the choice of an Average Outgoing Quality Limit. The scheme utilizes plotted points on a U-control chart for defects and the theory of runs to determine when to switch among Reduced, Normal, Tightened, and 100 percent inspection. The scheme is formulated as a semi-Markov process to derive steady stale equations for the probabilities of being in Reduced, Normal, Tightened, or 100 percent inspection and for Average Outgoing Quality and Average Fraction Inspected. The resulting system and the computer programs used to derive it are discussed.  相似文献   
103.
For large numbers of perfectly reliable, optimally targeted warheads the square-root law approximates the expected fraction damage achieved on an area target. In this paper a more exact expression is derived for this damage fraction which Holds for all numbers of warheads. This expression is shown to converge to the square-root law when a large number of warheads are fired. The more exact expression is used in a procedure to calculate expected damage when warheads are unreliable, and this procedure is shown to be superior to a modified square-root approximation which has been used previously.  相似文献   
104.
The paper proposes an algorithm for the determination of the solution of the activities to be shortened and the amount by which they are to be shortened in order to minimize the total cost of project completion. This cost involves a linear penalty for tardienss of a set of key events and a linear cost of activity compression from its normal duration. The procedure is a generalization of the work of Fulkerson.  相似文献   
105.
This paper analyzes the waiting-time distribution of a specific job as it moves through a job-shop with multiple centers and exponential service times. The movement of the job through the shop is governed by a Markovian transition matrix and ends with the job's exit from the shop.  相似文献   
106.
A model is developed which may be used to determine the expected total cost of quality control per inspection lot under acceptance sampling by variables where several characteristics are to be simultaneously controlled. Optimization of the model is accomplished through the application of a conventional search procedure. The sensitivity of the model and the optimum solution to the shape of the underlying probability distributions is discussed and associated analyses are presented through an example.  相似文献   
107.
For the family D, consisting of those zero-sum two-person games which have a value, the value-function on D is characterized by four properties called objectivity, monotony, symmetry and sufficiency.  相似文献   
108.
It is known that the proportionate flow shop minimum makespan F m / p r p t / C max problem is solved optimally by any permutation job sequence. We show that the F m / p r p t / C max problem is at least ordinary NP‐hard when missing operations are allowed and present some solvable cases. We then consider the standard proportionate flow shop problem (with no missing operations) and show that the solution algorithms for a class of single‐machine due date assignment problems can be extended/generalized to the corresponding proportionate flow shop problems. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 98–106, 2015  相似文献   
109.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
110.
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号