首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   157篇
  免费   4篇
  2020年   1篇
  2019年   8篇
  2018年   2篇
  2017年   10篇
  2016年   1篇
  2015年   3篇
  2014年   9篇
  2013年   62篇
  2012年   1篇
  2011年   1篇
  2010年   3篇
  2009年   3篇
  2007年   2篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1998年   4篇
  1997年   1篇
  1996年   3篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   3篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1978年   2篇
  1977年   1篇
  1976年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有161条查询结果,搜索用时 31 毫秒
91.
We present transient and asymptotic reliability indices for a single‐unit system that is subject to Markov‐modulated shocks and wear. The transient results are derived from the (transform) solution of an integro‐differential equation describing the joint distribution of the cumulative degradation process and the state of the modulating process. Additionally, we prove the asymptotic normality of a properly centered and time‐scaled version of the cumulative degradation at time t. This asymptotic result leads to a simple normal approximation for a properly centered and space‐scaled version of the systes lifetime distribution. Two numerical examples illustrate the quality of the normal approximation. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
92.
In this article, we present a multistage model to optimize inventory control decisions under stochastic demand and continuous review. We first formulate the general problem for continuous stages and use a decomposition solution approach: since it is never optimal to let orders cross, the general problem can be broken into a set of single‐unit subproblems that can be solved in a sequential fashion. These subproblems are optimal control problems for which a differential equation must be solved. This can be done easily by recursively identifying coefficients and performing a line search. The methodology is then extended to a discrete number of stages and allows us to compute the optimal solution in an efficient manner, with a competitive complexity. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 32–46, 2016  相似文献   
93.
Torture requires careful definition, because of the degree to which its definition often entails its moral condemnation. Torture involves the deliberate infliction of (intense) pain for coercive or punishment reasons. While emphasizing that the act of torture is indeed naturally seen as repulsive and ideally should not take place, I offer a non-utilitarian argument to ethically justify torture in specific kinds of interrogative cases. This argument closely examines the moral isomorphism between cases of immediate and delayed self-defense, showing that in both cases lethal force is justified. I further show that, once one’s life is forfeit, one’s other rights pertaining to the defense of one’s intended victims are likewise forfeit. As such, any form of interrogative torture necessary to procuring relevant information from persons involved in a lethal attack upon innocent persons is ethically justified. However, that an action is strictly ethically justified does not entail that it ought to be generally adopted. Several potent constitutional and sociological concerns are raised and considered.  相似文献   
94.
Military officers often oppose political interference in the conduct of war. Political leaders respond by citing Clausewitz’s contention that “war is the continuation of politics with the addition of other means.” Scholarship in security studies and civil-military relations argues that civilians are right to oppose military autonomy because it serves the parochial interests of the military. However, through the dialectical relationship between the violent essence of war and its political nature, Clausewitz provides an alternative explanation for military demands for autonomy. He shows that military and political leaders are prone to an incomplete understanding of war that can undermine strategy and policy.  相似文献   
95.
The object of this article is to investigate the risk-pooling effect of depot stock in two-echelon distribution system in which the depot serves n retailers in parallel, and to develop computationally tractable optimization procedures for such systems. The depot manager has complete information about stock levels and there are two opportunities to allocate stock to the retailers within each order cycle. We identify first- and second-order aspects to the risk-pooling effect. In particular, the second-order effect is the property that the minimum stock available to any retailer after the second allocation converges in probability to a constant as the number of retailers in the system increases, assuming independence of the demands. This property is exploited in the development of efficient procedures to determine near-optimal values of the policy parameters.  相似文献   
96.
The optimal linear combination of control variates is well known when the controls are assumed to be unbiased. We derive here the optimal linear combination of controls in the situation where asymptotically negligible bias is present. The small-sample linear control which minimizes the mean square error (MSE) is derived. When the optimal asymptotic linear control is used rather than the optimal small-sample control, the degradation in MSE is c/n3, where n is the sample size and c is a known constant. This analysis is particulary relevant to the small-sample theory for control variates as applied to the steady-state estimation problem. Results for the method of multiple estimates are also given.  相似文献   
97.
The problem is to protect a set of T identical targets that may come under attack by A identical weapons. The targets are to be defended by D identical interceptors, which must be preallocated to defend selected targets. The attacker is aware of the number of interceptors, but is ignorant of their allocation. The size of the attack is chosen by the attacker from within a specified range. The robust strategies developed in this article do not require the defender to assume an attack size. Rather, the defender chooses a strategy which is good over a wide range of attack sizes, though not necessarily best for any particular attack size. The attacker, knowing that the defender is adopting a robust strategy, chooses the optimal attack strategy for the number of weapons he chooses to expend. The expected number of survivors is a function of the robust defense strategy and optimal attack strategy against this robust defense.  相似文献   
98.
99.
Notes     
  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号