首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   341篇
  免费   16篇
  2021年   11篇
  2020年   3篇
  2019年   10篇
  2018年   5篇
  2017年   6篇
  2016年   8篇
  2015年   7篇
  2014年   6篇
  2013年   48篇
  2011年   6篇
  2010年   3篇
  2009年   9篇
  2007年   8篇
  2006年   3篇
  2005年   5篇
  2004年   9篇
  2003年   5篇
  2002年   9篇
  2001年   8篇
  2000年   5篇
  1999年   10篇
  1998年   5篇
  1997年   4篇
  1996年   3篇
  1995年   8篇
  1994年   5篇
  1993年   5篇
  1992年   8篇
  1991年   12篇
  1990年   6篇
  1989年   6篇
  1988年   10篇
  1987年   8篇
  1986年   8篇
  1984年   7篇
  1983年   3篇
  1981年   7篇
  1980年   3篇
  1979年   6篇
  1978年   5篇
  1977年   7篇
  1975年   3篇
  1974年   5篇
  1973年   4篇
  1972年   3篇
  1971年   6篇
  1969年   4篇
  1968年   5篇
  1966年   2篇
  1948年   2篇
排序方式: 共有357条查询结果,搜索用时 15 毫秒
291.
292.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t.  相似文献   
293.
The problem considered in this article is a generalization of the familiar makespan problem, in which n jobs are allocated among m parallel processors, so as to minimize the maximum time (or cost) on any processor. Our problem is more general, in that we allow the processors to have (a) different initial costs, (b) different utilization levels before new costs are incurred, and (c) different rates of cost increase. A heuristic adapted from the bin-packing problem is shown to provide solutions which are close to optimal as the number of iterations is allowed to increase. Computational testing, over a large number of randomly generated problem instances, suggests that heuristic errors are, on average, very small.  相似文献   
294.
We consider a generalized minmax programming problem, and establish, under certain weaker convexity assumptions, the Fritz John sufficient optimality conditions for such a problem. A dual program is introduced and using those optimality conditions duality theorems are proved relating the dual and the primal. Duality for the generalized fractional programming problem is considered as an application of the results proved.  相似文献   
295.
296.
We consider the problem of scheduling n independent and simultaneously available jobs without preemption on a single machine, where the machine has a fixed maintenance activity. The objective is to find the optimal job sequence to minimize the total amount of late work, where the late work of a job is the amount of processing of the job that is performed after its due date. We first discuss the approximability of the problem. We then develop two pseudo‐polynomial dynamic programming algorithms and a fully polynomial‐time approximation scheme for the problem. Finally, we conduct extensive numerical studies to evaluate the performance of the proposed algorithms. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 172–183, 2016  相似文献   
297.
High-level declarations in Moscow and Beijing on the steady progress in upgrading their strategic partnership depart increasingly far from the reality of shrinking economic ties and diverging political perspectives. In late 2014, the dynamic development of this partnership appeared to have the potential of becoming a major shift in the fluid security balance in the Asia-Pacific region; in late 2015, however, the concerned neighbours have more reasons to worry about the deformations in the development of Russia–China relations. President Vladimir Putin and President Xi Jinping are eager to demonstrate perfect personal rapport but their mutual trust is open to doubt and their views on priorities of domestic and international order are in fact strikingly dissimilar. The deep contraction of trade and the lack of interest from Chinese investors propels the Russian leadership towards increasing the emphasis on the security dimension of the partnership, and this makes Russia one of the key sources of instability in the Asia-Pacific region and a challenge to the East Asian peace. It is also entirely possible that the Russian challenge to the stability of the world system would result in strengthening of the key institutions of its governance, thus leaving the revisionist Russia in isolation.  相似文献   
298.
In a recent paper, Teng, Chern, and Yang consider four possible inventory replenishment models and determine the optimal replenishment policies for them. They compare these models to identify the best alternative on the basis of minimum total relevant inventory costs. The total cost functions for Model 1 and Model 4 as derived by them are not exact for the comparison. As a result, their conclusion on the least expensive replenishment policy is incorrect. The present article provides the actual total costs for Model 1 and Model 4 to make a correct comparison of the four models. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 602–606, 2000  相似文献   
299.
We undertake inference for a stochastic form of the Lanchester combat model. In particular, given battle data, we assess the type of battle that occurred and whether or not it makes any difference to the number of casualties if an army is attacking or defending. Our approach is Bayesian and we use modern computational techniques to fit the model. We illustrate our method using data from the Ardennes campaign. We compare our results with previous analyses of these data by Bracken and Fricker. Our conclusions are somewhat different to those of Bracken. Where he suggests that a linear law is appropriate, we show that the logarithmic or linear‐logarithmic laws fit better. We note however that the basic Lanchester modeling assumptions do not hold for the Ardennes data. Using Fricker's modified data, we show that although his “super‐logarithmic” law fits best, the linear, linear‐logarithmic, and logarithmic laws cannot be ruled out. We suggest that Bayesian methods can be used to make inference for battles in progress. We point out a number of advantages: Prior information from experts or previous battles can be incorporated; predictions of future casualties are easily made; more complex models can be analysed using stochastic simulation techniques. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 541–558, 2000  相似文献   
300.
In this paper we study strategies for better utilizing the network capacity of Internet Service Providers (ISPs) when they are faced with stochastic and dynamic arrivals and departures of customers attempting to log‐on or log‐off, respectively. We propose a method in which, depending on the number of modems available, and the arrival and departure rates of different classes of customers, a decision is made whether to accept or reject a log‐on request. The problem is formulated as a continuous time Markov Decision Process for which optimal policies can be readily derived using techniques such as value iteration. This decision maximizes the discounted value to ISPs while improving service levels for higher class customers. The methodology is similar to yield management techniques successfully used in airlines, hotels, etc. However, there are sufficient differences, such as no predefined time horizon or reservations, that make this model interesting to pursue and challenging. This work was completed in collaboration with one of the largest ISPs in Connecticut. The problem is topical, and approaches such as those proposed here are sought by users. © 2001 John Wiley & Sons, Inc., Naval Research Logistics 48:348–362, 2001  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号