首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   295篇
  免费   9篇
  2020年   3篇
  2019年   5篇
  2018年   4篇
  2017年   7篇
  2016年   7篇
  2015年   6篇
  2014年   3篇
  2013年   58篇
  2012年   2篇
  2011年   4篇
  2009年   6篇
  2008年   4篇
  2007年   3篇
  2006年   3篇
  2005年   7篇
  2004年   7篇
  2003年   5篇
  2002年   2篇
  2000年   4篇
  1999年   4篇
  1998年   2篇
  1997年   2篇
  1996年   8篇
  1995年   4篇
  1994年   7篇
  1993年   3篇
  1992年   6篇
  1991年   12篇
  1989年   6篇
  1988年   3篇
  1987年   7篇
  1986年   9篇
  1985年   12篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1979年   3篇
  1978年   3篇
  1977年   5篇
  1976年   4篇
  1974年   5篇
  1973年   2篇
  1972年   8篇
  1971年   5篇
  1970年   8篇
  1969年   4篇
  1968年   4篇
  1967年   5篇
  1966年   3篇
排序方式: 共有304条查询结果,搜索用时 15 毫秒
171.
For more than a decade, multiattribute utility/value theory and multiobjective mathematical programming have offered different approaches to similar problems. Unfortunately, the two areas have developed with little interaction in spite of their common aims. We consider the use of utility/value functions in a mathematical programming framework, and demonstrate that these functions often possess desirable properties from an optimization point of view. We conclude that a hybridization of approaches is more viable than is perhaps commonly assumed.  相似文献   
172.
The problem is to protect a set of T identical targets that may come under attack by A identical weapons. The targets are to be defended by D identical interceptors, which must be preallocated to defend selected targets. The attacker is aware of the number of interceptors, but is ignorant of their allocation. The size of the attack is chosen by the attacker from within a specified range. The robust strategies developed in this article do not require the defender to assume an attack size. Rather, the defender chooses a strategy which is good over a wide range of attack sizes, though not necessarily best for any particular attack size. The attacker, knowing that the defender is adopting a robust strategy, chooses the optimal attack strategy for the number of weapons he chooses to expend. The expected number of survivors is a function of the robust defense strategy and optimal attack strategy against this robust defense.  相似文献   
173.
This article develops a structure by which the computational complexity of sequencing problems in assembly cells attended by one or two robots may be evaluated. A taxonomy of cell features that affect complexity is developed, polynomial-time algorithms are presented for certain problems, and borderline designs at which complexity changes dramatically are identified. Results will aid cell designers by indicating classes of designs for which task sequence may be optimized and other classes for which this cannot be done. Designs which entail features that lead to intractable sequencing problems may be modified to maximize cell productivity.  相似文献   
174.
Negotiations between an end product manufacturer and a parts supplier often revolve around two main issues: the supplier's price and the length of time the manufacturer is contractually held to its order quantity, commonly termed the “commitment time frame.” Because actual demand is unknown, the specification of the commitment time frame determines how the demand risk is shared among the members of the supply chain. Casual observation indicates that most manufacturers prefer to delay commitments as long as possible while suppliers prefer early commitments. In this paper, we investigate whether these goals are always in the firm's best interest. In particular, we find that the manufacturer may sometimes be better off with a contract that requires an early commitment to its order quantity, before the supplier commits resources and the supplier may sometimes be better off with a delayed commitment. We also find that the preferred commitment time frame depends upon which member of the supply chain has the power to set their exchange price. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
175.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
176.
177.
178.
In this study, we illustrate a real‐time approximate dynamic programming (RTADP) method for solving multistage capacity decision problems in a stochastic manufacturing environment, by using an exemplary three‐stage manufacturing system with recycle. The system is a moderate size queuing network, which experiences stochastic variations in demand and product yield. The dynamic capacity decision problem is formulated as a Markov decision process (MDP). The proposed RTADP method starts with a set of heuristics and learns a superior quality solution by interacting with the stochastic system via simulation. The curse‐of‐dimensionality associated with DP methods is alleviated by the adoption of several notions including “evolving set of relevant states,” for which the value function table is built and updated, “adaptive action set” for keeping track of attractive action candidates, and “nonparametric k nearest neighbor averager” for value function approximation. The performance of the learned solution is evaluated against (1) an “ideal” solution derived using a mixed integer programming (MIP) formulation, which assumes full knowledge of future realized values of the stochastic variables (2) a myopic heuristic solution, and (3) a sample path based rolling horizon MIP solution. The policy learned through the RTADP method turned out to be superior to polices of 2 and 3. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 2010  相似文献   
179.
对潜搜索模型有很多种,并且这些搜索模型可能因为进一部的完善、优化而发生改变;根据装备的发展及部队作战、训练的需要,也可能有新的模型不断加入.这些模型的作战效果指标是决定其是否可用的重要依据之一,而作战效果的计算应基于统一的方法,而不能各自不同,这样,得出的结论才具有可比性.为了实现这个目的,建立了基于蒙特卡罗法的通用计...  相似文献   
180.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号