全文获取类型
收费全文 | 417篇 |
免费 | 15篇 |
出版年
2021年 | 10篇 |
2019年 | 9篇 |
2018年 | 4篇 |
2017年 | 13篇 |
2016年 | 10篇 |
2015年 | 14篇 |
2014年 | 13篇 |
2013年 | 88篇 |
2012年 | 3篇 |
2011年 | 3篇 |
2009年 | 4篇 |
2008年 | 6篇 |
2007年 | 4篇 |
2006年 | 4篇 |
2005年 | 4篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 8篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 8篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1989年 | 7篇 |
1988年 | 14篇 |
1987年 | 6篇 |
1986年 | 15篇 |
1985年 | 9篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 7篇 |
1975年 | 9篇 |
1974年 | 7篇 |
1973年 | 5篇 |
1972年 | 7篇 |
1971年 | 4篇 |
1970年 | 4篇 |
1969年 | 6篇 |
1968年 | 3篇 |
1967年 | 2篇 |
1966年 | 3篇 |
排序方式: 共有432条查询结果,搜索用时 31 毫秒
101.
A simple and relatively efficient method for simulating one-dimensional and two-dimensional nonhomogeneous Poisson processes is presented The method is applicable for any rate function and is based on controlled deletion of points in a Poisson process whose rate function dominates the given rate function In its simplest implementation, the method obviates the need for numerical integration of the rate function, for ordering of points, and for generation of Poisson variates. 相似文献
102.
A process control scheme is developed in which decisions as to the frequency of sampling are made based upon the choice of an Average Outgoing Quality Limit. The scheme utilizes plotted points on a U-control chart for defects and the theory of runs to determine when to switch among Reduced, Normal, Tightened, and 100 percent inspection. The scheme is formulated as a semi-Markov process to derive steady stale equations for the probabilities of being in Reduced, Normal, Tightened, or 100 percent inspection and for Average Outgoing Quality and Average Fraction Inspected. The resulting system and the computer programs used to derive it are discussed. 相似文献
103.
For large numbers of perfectly reliable, optimally targeted warheads the square-root law approximates the expected fraction damage achieved on an area target. In this paper a more exact expression is derived for this damage fraction which Holds for all numbers of warheads. This expression is shown to converge to the square-root law when a large number of warheads are fired. The more exact expression is used in a procedure to calculate expected damage when warheads are unreliable, and this procedure is shown to be superior to a modified square-root approximation which has been used previously. 相似文献
104.
The paper proposes an algorithm for the determination of the solution of the activities to be shortened and the amount by which they are to be shortened in order to minimize the total cost of project completion. This cost involves a linear penalty for tardienss of a set of key events and a linear cost of activity compression from its normal duration. The procedure is a generalization of the work of Fulkerson. 相似文献
105.
This paper analyzes the waiting-time distribution of a specific job as it moves through a job-shop with multiple centers and exponential service times. The movement of the job through the shop is governed by a Markovian transition matrix and ends with the job's exit from the shop. 相似文献
106.
A model is developed which may be used to determine the expected total cost of quality control per inspection lot under acceptance sampling by variables where several characteristics are to be simultaneously controlled. Optimization of the model is accomplished through the application of a conventional search procedure. The sensitivity of the model and the optimum solution to the shape of the underlying probability distributions is discussed and associated analyses are presented through an example. 相似文献
107.
S. H. Tijs 《海军后勤学研究》1981,28(1):153-156
For the family D, consisting of those zero-sum two-person games which have a value, the value-function on D is characterized by four properties called objectivity, monotony, symmetry and sufficiency. 相似文献
108.
It is known that the proportionate flow shop minimum makespan problem is solved optimally by any permutation job sequence. We show that the problem is at least ordinary NP‐hard when missing operations are allowed and present some solvable cases. We then consider the standard proportionate flow shop problem (with no missing operations) and show that the solution algorithms for a class of single‐machine due date assignment problems can be extended/generalized to the corresponding proportionate flow shop problems. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 98–106, 2015 相似文献
109.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
110.
Stephan Frühling 《Contemporary Security Policy》2017,38(1):4-25
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change. 相似文献