首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   385篇
  免费   11篇
  2021年   10篇
  2019年   7篇
  2017年   11篇
  2016年   8篇
  2015年   11篇
  2014年   9篇
  2013年   73篇
  2010年   2篇
  2008年   6篇
  2007年   4篇
  2006年   5篇
  2005年   5篇
  2003年   2篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1997年   8篇
  1996年   5篇
  1995年   6篇
  1994年   8篇
  1993年   7篇
  1992年   7篇
  1991年   8篇
  1990年   2篇
  1989年   7篇
  1988年   14篇
  1987年   6篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   8篇
  1980年   5篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1976年   2篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有396条查询结果,搜索用时 15 毫秒
231.
A target is moving along a straight-line path. Random portions of the path might be invisible to the hunter (in shadow). Shooting trials are conducted only along the visible segments of the path. An algorithm for the numerical determination of the survival probability of the target is developed. This algorithm is based on the distribution of shadow length, which is also developed. © 1994 John Wiley & Sons, Inc.  相似文献   
232.
Minimax strategies are obtained for an infiltration game in which one player must move through a one-dimensional interval defended by the other player.  相似文献   
233.
This article provides a Bayes approach for the quality control of a production process which is defined by an M/G/1 queue. An inspection procedure which is jointly optimal from the queue's operational characteristics and quality-control perspectives is found using a queue-inspection renewal cycle analysis (with overall expected profit per unit time as the optimization objective). Numerical results are obtained, highlighting the relationships between quality control and (queue-like) production management.  相似文献   
234.
This article uses a vertex-closing approach to investigate the p-center problem. The optimal set of vertices to close are found in imbedded subgraphs of the original graph. Properties of these subgraphs are presented and then used to characterize the optimal solution, to establish a priori upper and lower bounds, to establish refined lower bounds, and to verify the optimality of solutions. These subgraphs form the foundation of two polynomial algorithms of complexity O(|E| log |E|) and O(|E|2). The algorithms are proven to converge to an optimum for special cases, and computational evidence is provided which suggests that they produce very good solutions more generally. Both algorithms perform very well on problems where p is large relative to the number of vertices n, specifically, when p/n ≥ 0.30. One of the algorithms is especially efficient for solving a sequence of problems on the same graph.  相似文献   
235.
In this article is studied a stochastic linear fractional programming problem, in which the parameters of both the numerator and the denominator are assumed to be mutually independent Cauchy variates. The deterministic equivalent of the problem is obtained and is shown to be a linear fractional program. A numerical example is also added for illustration.  相似文献   
236.
The problem is to protect a set of T identical targets that may come under attack by A identical weapons. The targets are to be defended by D identical interceptors, which must be preallocated to defend selected targets. The attacker is aware of the number of interceptors, but is ignorant of their allocation. The size of the attack is chosen by the attacker from within a specified range. The robust strategies developed in this article do not require the defender to assume an attack size. Rather, the defender chooses a strategy which is good over a wide range of attack sizes, though not necessarily best for any particular attack size. The attacker, knowing that the defender is adopting a robust strategy, chooses the optimal attack strategy for the number of weapons he chooses to expend. The expected number of survivors is a function of the robust defense strategy and optimal attack strategy against this robust defense.  相似文献   
237.
Intrastate conflicts, long eclipsing interstate conflicts, are often internationalized. This paper examines internationalized intrastate conflicts through the types of both the intervening and the embattled regimes. Do democracies, more or less than autocracies, support autocratic governments in their fights against rebels? This paper tests three hypotheses: (1) democracies support autocrats fighting rebels less than autocracies do. (2) Democracies support democratic governments fighting against rebels more than autocracies do. (3) The more democratic two states are, the higher the probability one would support the other’s fight against rebels. Covering all documented external support in intrastate wars (1975–2000), our findings support hypothesis one and two only partly and confirm hypothesis three. However, comparing the two major accounts of the Democratic Peace theory (DPT)—the normative and the structural—our findings corroborate only the former robustly. The paper thus helps enriching the insights of the DPT beyond interstate conflicts.  相似文献   
238.
We address the problem of optimal decision‐making in conflicts based on Lanchester square law attrition model where a defending force needs to be partitioned optimally, and allocated to two different attacking forces of differing strengths and capabilities. We consider a resource allocation scheme called the Time Zero Allocation with Redistribution (TZAR) strategy, where allocation is followed by redistribution of defending forces, on the occurrence of certain decisive events. Unlike previous work on Lanchester attrition model based tactical decision‐making, which propose time sequential tactics through an optimal control approach, the present article focuses on obtaining simpler resource allocation tactics based on a static optimization framework, and demonstrates that the results obtained are similar to those obtained by the more complex dynamic optimal control solution. Complete solution for this strategy is obtained for optimal partitioning of resources of the defending forces. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
239.
In this article, we study reliability properties of m‐consecutive‐k‐out‐of‐n: F systems with exchangeable components. We deduce exact formulae and recurrence relations for the signature of the system. Closed form expressions for the survival function and the lifetime distribution as a mixture of the distribution of order statistics are established as well. These representations facilitate the computation of several reliability characteristics of the system for a given exchangeable joint distribution or survival function. Finally, we provide signature‐based stochastic ordering results for the system's lifetime and investigate the IFR preservation property under the formulation of m‐consecutive‐k‐out‐of‐n: F systems. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
240.
Book Reviews     
The purpose of this article is to analyse British strategic nuclear targeting between 1974 and 1979, prior to the successful completion of the sophisticated modification to Polaris submarine-missile system codenamed Chevaline. It will use as its starting point the parameters for UK strategic nuclear targeting, and the foundation of the ‘Moscow Criterion’, prior to the deployment of Britain's Polaris submarines which began in 1968. It will then discuss the recommendation by the Chiefs of Staff to retarget Polaris in 1975/76 and the implications of that recommendation in terms of the British approach to strategic nuclear deterrence. The article will conclude with an assessment of these retargeting decisions on the decision to replace Polaris with the US Trident system in 1980.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号