首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   473篇
  免费   12篇
  国内免费   1篇
  2021年   5篇
  2019年   13篇
  2018年   7篇
  2017年   9篇
  2016年   7篇
  2015年   5篇
  2014年   9篇
  2013年   103篇
  2012年   4篇
  2010年   8篇
  2007年   8篇
  2006年   4篇
  2005年   9篇
  2004年   6篇
  2003年   4篇
  2002年   8篇
  2000年   4篇
  1999年   7篇
  1998年   7篇
  1997年   7篇
  1996年   7篇
  1995年   6篇
  1994年   12篇
  1993年   12篇
  1992年   8篇
  1991年   11篇
  1990年   9篇
  1989年   8篇
  1988年   10篇
  1987年   6篇
  1986年   10篇
  1985年   10篇
  1983年   4篇
  1982年   12篇
  1981年   6篇
  1980年   8篇
  1979年   6篇
  1978年   7篇
  1977年   6篇
  1976年   5篇
  1975年   8篇
  1974年   8篇
  1973年   10篇
  1972年   7篇
  1971年   9篇
  1969年   7篇
  1968年   10篇
  1967年   4篇
  1966年   4篇
  1948年   5篇
排序方式: 共有486条查询结果,搜索用时 15 毫秒
171.
This article shows how to determine the stationary distribution of the virtual wait in M/G/1 queues with either one-at-a-time or exhaustive server vacations, depending on either service times or accrued workload. For the first type of dependence, each vacation time is a function of the immediately preceding service time or of whether the server finds the system empty after returning from vacation. In this way, it is possible to model situations such as long service times followed by short vacations, and vice versa. For the second type of dependence, the vacation time assigned to an arrival to follow its service is a function of the level of virtual wait reached. By this device, we can model situations in which vacations may be shortened whenever virtual delays have gotten excessive. The method of analysis employs level-crossing theory, and examples are given for various cases of service and vacation-time distributions. A closing discussion relates the new model class to standard M/G/1 queues where the service time is a sum of variables having complex dependencies. © 1992 John Wiley & Sons, Inc.  相似文献   
172.
In this article we deal with the shortest queue model with jockeying. We assume that the arrivals are Poisson, each of the exponential servers has his own queue, and jockeying among the queues is permitted. Explicit solutions of the equilibrium probabilities, the expected customers, and the expected waiting time of a customer in the system are given, which only depend on the traffic intensity. Numerical results can be easily obtained from our solutions. Several examples are provided in the article.  相似文献   
173.
Rather than win hearts and minds, authoritarian counterinsurgency is said to rely heavily on coercion. It has a reputation for effectiveness, if also for its amorality. Still, the research into authoritarian counterinsurgency is surprisingly lacking. By distilling common features from key cases, this article concludes that this approach goes beyond the indiscriminate violence that typically captures the imagination. Like their democratic counterparts but differently, authoritarian regimes also engage in mobilisation, create narratives, and turn military advantage into political gain. The analysis explains how these tasks are undertaken and, by contradistinction, sheds light on more liberal approaches as well.  相似文献   
174.
This article develops a methodology for testing constant exchange risk properties and identifying an appropriate form for a decision maker's utility function. These risk properties characterize six different utility functions which are sums of products of polynomials and exponential functions. Such functional forms are commonly used in decision analysis applications. The practical advantage of this methodology is that these constant exchange risk properties eliminate the usual arbitrariness in the selection of a parametric utility function and often reduce the data requirements for subsequent estimation. The procedure is straightforward to apply. The decision maker need only provide certainty equivalents for two-outcome gambles and determine the more-preferred gamble in paired comparisons. The technical details of the procedure can be handled by interactive computer software.  相似文献   
175.
What has been causing cost overruns and schedule slippages in Army major weapon-system R&D programs during the past ten years? This article addresses this question with emphasis on the effectiveness of an Army acquisition strategy entitled Total Risk Assessing Cost Estimating (TRACE). An empirical study employed a questionnaire and interviews with key personnel from all of the major Army Program Management Offices involved with R&D. The major research question was the following: What explanatory variables have been affecting R&D cost overruns and development time? This includes an evaluation of TRACE as a potential explanatory variable. Data was collected and analyzed using an error components multiple regression model. The major explanatory variables that appeared to explain cost overruns were technological risk of the program, education and experience of key program management office personnel, and the degree of “buy in” by the prime contractor. Strong statistical results indicate that TRACE is having little or no effect on cost overruns. In the case of development time, the major explanatory variables were seen to be technological risk of the program, testing, TRACE, education, and length of the R&D contract.  相似文献   
176.
Empirical Bayes' methods had been used by Brier, Zacks, and Marlow [1] for estimating performance characteristic vectors of success probabilities. The problem is that of estimating k-dimensional success probabilities of dependent binomial random variables, which are highly correlated. The present study reinforces the results of the previous one by showing, via simulations, that the relative efficiency of the empirical Bayes estimators, compared to the Stein-type and to the maximum-likelihood ones, is very high. This holds even if the success proportions are based on a small number of trials. We study the case of equicorrelation structure with positive correlations.  相似文献   
177.
The existence of ordinal criteria is a factor that complicates multiple criteria problems. In this article we develop an approach for the problem of choosing among discrete alternatives assuming that criteria are ordinal. The approach requires pairwise comparisons of alternatives by the decision maker. Based on these comparisons, presumably inferior alternatives are eliminated. Experience on randomly generated problems indicates that the approach usually chooses one of the most preferred alternatives and requires a small number of pairwise comparisons.  相似文献   
178.
In a previous paper, the authors have introduced a class of multivariate lifetimes (MIFRA) which generalize the univariate lifetimes with increasing failure rate average (IFRA). They have also shown that this class satisfies many fundamental properties. In this paper it is shown that other concepts of multivariate IFRA do not satisfy all of these properties. Relationships between MIFRA and these other concepts are given. Finally, positive dependence implications with respect to these classes are also discussed.  相似文献   
179.
An algorithm is presented to gain postoptimality data about the family of nonlinear pure integer programming problems in which the objective function and constraints remain the same except for changes in the right-hand side of the constraints. It is possible to solve such families of problems simultaneously to give a global optimum for each problem in the family, with additional problems solved in under 2 CPU seconds. This represents a small fraction of the time necessary to solve each problem individually.  相似文献   
180.
Book reviews     
Military Helicopters. By E. J. Everett‐Heath, G. M. Moss, A. W. Mowat and K. E. Reid. Brassey's, London (1990), ISBN 0–08–037341–0 (hardcover), ISBN 0–08–036716‐X (flexicover), £22.50 (hardcover), £12.95 (flexicover)

The Killing Ground: the British Army, the Western Front and the Emergence of Modern Warfare 1900–1918. By Tim Travers. Unwin‐Hyman, London (1990), ISBN 0–04–4457367, £11.95

The Influence of S. L. A. Marshall on the United States Army. By Major F. D. G. Williams. TRADOC Historical Monograph Series, Fort Monroe, VA (1990)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号