首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   905篇
  免费   0篇
  905篇
  2021年   10篇
  2019年   18篇
  2018年   8篇
  2017年   19篇
  2016年   17篇
  2015年   16篇
  2014年   19篇
  2013年   165篇
  2012年   8篇
  2010年   9篇
  2009年   14篇
  2007年   16篇
  2006年   9篇
  2005年   10篇
  2004年   13篇
  2003年   11篇
  2002年   14篇
  2000年   8篇
  1999年   9篇
  1998年   17篇
  1997年   15篇
  1996年   13篇
  1995年   7篇
  1994年   21篇
  1993年   23篇
  1992年   16篇
  1991年   21篇
  1990年   15篇
  1989年   28篇
  1988年   25篇
  1987年   23篇
  1986年   26篇
  1985年   19篇
  1984年   11篇
  1983年   10篇
  1982年   15篇
  1981年   14篇
  1980年   11篇
  1979年   16篇
  1978年   18篇
  1977年   7篇
  1976年   11篇
  1975年   9篇
  1974年   15篇
  1973年   10篇
  1972年   12篇
  1971年   11篇
  1970年   14篇
  1969年   10篇
  1967年   10篇
排序方式: 共有905条查询结果,搜索用时 0 毫秒
31.
32.
33.
34.
35.
36.
A system of two parallel queues where the arrivals from a single stream of customers join the shorter queue is considered. Arrivals form a homogeneous Poisson stream and the service times in each of the two queues are independent exponential variates. By treating one of the queues as bounded, the steady-state probability vector for the system can be expressed in a modified matrix-geometric form and can be computed efficiently. Computational procedures for the sojourn time distribution and characteristics of the departure stream are developed. Some numerical results are presented, and based on these results an efficient approximation scheme for the model is developed which can be readily extended to systems with more than two parallel queues.  相似文献   
37.
The problem is to protect a set of t targets by n perfect interceptors against an attack by m perfect weapons. If the defender solves for an optimal preallocated preferential defense and associated game value assuming m1 attackers, and the attacker knows the assumption of the defender and utilizes m2 attackers, he may be able to achieve significantly more damage than had the defender assumed that there would be m2 attackers. The article treats the robustness of preallocated preferential defense to assumptions about the size of the attack and presents results of an alternative approach.  相似文献   
38.
The general problem we are concerned with here is the estimation of Pθ(C) where C is some fixed event and Pθ is unknown in some class. The various available estimation procedures seem to involve the choice of some random probability measure. In particular we consider this problem when C is a disk in R2 centered at o and Pθ is restricted to be bivariate normal. Details concerning the implementation of the estimation procedures and a Monte Carlo study are discussed for this case. This particular problem arises when we are concerned with assessing the accuracy of a targeting procedure.  相似文献   
39.
Calculations for large Markovian finite source, finite repair capacity two-echelon repairable item inventory models are shown to be feasible using the randomization technique and a truncated state space approach. More complex models (involving transportation pipelines, multiple-item types and additional echelon levels) are also considered.  相似文献   
40.
The damaging economic effects of the debt crises on Africa in the late 1980s encouraged considerable research on the determinants of external debt in developing economies. Although sub-Saharan Africa's (SSA) debt was cut by two-thirds by 2008, through two debt relief programmes, debt in the region has since been rising at an increasingly rapid pace. This study provides an empirical analysis of the determinants of external debt in SSA over the period 1960–2016, using dynamic panel methods. It also considers two potentially important factors that have received relatively little attention. One is military spending, rarely considered, despite a number of well-publicised scandals over the procurement of unnecessary and expensive high-tech weapons systems. A second, is the possibility that the countries studied have been involved in conflict. The empirical results point to a positive impact of military spending on external debt, but with some evidence of heterogeneity across the countries. Furthermore, findings indicate that the positive effect of military expenditure on debt becomes more marked in countries that have been affected by conflict. These results imply that policies to improve security and reduce military spending could be beneficial in reducing external debt and, potentially, improving economic performance in the region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号