全文获取类型
收费全文 | 887篇 |
免费 | 19篇 |
出版年
2021年 | 11篇 |
2019年 | 18篇 |
2018年 | 8篇 |
2017年 | 19篇 |
2016年 | 17篇 |
2015年 | 16篇 |
2014年 | 19篇 |
2013年 | 165篇 |
2012年 | 8篇 |
2010年 | 9篇 |
2009年 | 14篇 |
2007年 | 16篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 13篇 |
2003年 | 11篇 |
2002年 | 14篇 |
2000年 | 8篇 |
1999年 | 9篇 |
1998年 | 17篇 |
1997年 | 15篇 |
1996年 | 13篇 |
1995年 | 7篇 |
1994年 | 21篇 |
1993年 | 23篇 |
1992年 | 16篇 |
1991年 | 21篇 |
1990年 | 15篇 |
1989年 | 28篇 |
1988年 | 25篇 |
1987年 | 23篇 |
1986年 | 26篇 |
1985年 | 19篇 |
1984年 | 11篇 |
1983年 | 10篇 |
1982年 | 15篇 |
1981年 | 14篇 |
1980年 | 11篇 |
1979年 | 16篇 |
1978年 | 18篇 |
1977年 | 7篇 |
1976年 | 11篇 |
1975年 | 9篇 |
1974年 | 15篇 |
1973年 | 10篇 |
1972年 | 12篇 |
1971年 | 11篇 |
1970年 | 14篇 |
1969年 | 10篇 |
1967年 | 10篇 |
排序方式: 共有906条查询结果,搜索用时 15 毫秒
891.
Tûba Aktaran‐Kalaycı Christos Alexopoulos Nilay Tanık Argon David Goldsman James R. Wilson 《海军后勤学研究》2007,54(4):397-410
We formulate exact expressions for the expected values of selected estimators of the variance parameter (that is, the sum of covariances at all lags) of a steady‐state simulation output process. Given in terms of the autocovariance function of the process, these expressions are derived for variance estimators based on the simulation analysis methods of nonoverlapping batch means, overlapping batch means, and standardized time series. Comparing estimator performance in a first‐order autoregressive process and the M/M/1 queue‐waiting‐time process, we find that certain standardized time series estimators outperform their competitors as the sample size becomes large. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
892.
Mustapha Bouhtou Alexander Grigoriev Stan van Hoesel Anton F. van der Kraaij Frits C.R. Spieksma Marc Uetz 《海军后勤学研究》2007,54(4):411-420
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
893.
We consider a manufacturer (i.e., a capacitated supplier) that produces to stock and has two classes of customers. The primary customer places orders at regular intervals of time for a random quantity, while the secondary customers request a single item at random times. At a predetermined time the manufacturer receives advance demand information regarding the order size of the primary customer. If the manufacturer is not able to fill the primary customer's demand, there is a penalty. On the other hand, serving the secondary customers results in additional profit; however, the manufacturer can refuse to serve the secondary customers in order to reserve inventory for the primary customer. We characterize the manufacturer's optimal production and stock reservation policies that maximize the manufacturer's discounted profit and the average profit per unit time. We show that these policies are threshold‐type policies, and these thresholds are monotone with respect to the primary customer's order size. Using a numerical study we provide insights into how the value of information is affected by the relative demand size of the primary and secondary customers. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
894.
James R. Jackson 《海军后勤学研究》1967,14(1):23-41
Certain zero-sum games are examined in which an individual player is opposed by a two-man team. The members of the team have identical interests, but must act separately during play. Most of the paper is devoted to instances in which one teammate has an opportunity to communicate to the other about their mutual opponent's strategy; but he may only be able to transmit a limited amount of information and his choice of a “message” may affect the payoff. The team must thus make economically efficient use of a limited communication opportunity. The present paper treats a variety of models, all of which are formulated as rectangular (matrix) games. Related models, some of which cannot be so formulated either because of restrictions on the team's opportunities to use mixed strategies or because they are non-zero-sum games, will be treated in another paper. 相似文献
895.
896.
GORDON JE 《Military review》1949,28(12):27; passim
897.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last. 相似文献
898.
Ian J. Stewart 《The Nonproliferation Review》2019,26(5-6):519-536
ABSTRACTThe International Atomic Energy Agency (IAEA) faces challenges in fulfilling its safeguards mandate as a result of an expanding safeguards burden and a relatively static budget. This dilemma has been exacerbated by the additional burdens of implementing the Joint Comprehensive Plan of Action (JCPOA) in Iran, but would not go away if implementation of the JCPOA were to end. There are three main areas of opportunity for the Agency: (1) budgetary expansion tied to changes in staffing policies, (2) changes in safeguards approaches, and (3) technological innovation. Barriers and limitations are associated with each approach, and advancing any of them will face a difficult political environment in Vienna. 相似文献
899.
ABSTRACTThis paper examines the importance of closer co-operation in defence-related procurement. Led by the decision that Belgium will lead the procurement of 12 Mine CounterMeasures Vessels (MCMV), the case of a potential Belgian naval construction cluster is discussed. The feasibility of a potential cluster is investigated by looking at key elements of a successful naval construction cluster, the Dutch naval construction cluster, and comparing those key elements to the current Belgian situation. Forming a sustainable Belgian naval construction cluster will be difficult. Most of the procurement process of the MCMVs is set on a European tender. In the long run, due to the absence of both a launching customer and leader firms, no party is able to carry the cluster with investments and knowledge spill-overs. In order to keep public support for large defence-related investments, clustering around the MCMV integration system and proactive cluster support is recommended. 相似文献
900.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献