首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   893篇
  免费   21篇
  2021年   14篇
  2019年   29篇
  2018年   19篇
  2017年   20篇
  2016年   20篇
  2015年   20篇
  2014年   11篇
  2013年   166篇
  2011年   8篇
  2009年   9篇
  2008年   8篇
  2007年   11篇
  2006年   11篇
  2005年   15篇
  2004年   16篇
  2003年   10篇
  2002年   8篇
  2000年   14篇
  1999年   10篇
  1998年   12篇
  1997年   24篇
  1996年   19篇
  1994年   18篇
  1993年   7篇
  1992年   11篇
  1991年   22篇
  1990年   12篇
  1989年   19篇
  1988年   12篇
  1987年   21篇
  1986年   16篇
  1985年   16篇
  1984年   12篇
  1983年   15篇
  1982年   13篇
  1981年   13篇
  1980年   16篇
  1979年   17篇
  1978年   14篇
  1977年   15篇
  1976年   14篇
  1975年   12篇
  1974年   18篇
  1973年   18篇
  1972年   15篇
  1971年   19篇
  1970年   9篇
  1969年   11篇
  1968年   10篇
  1967年   8篇
排序方式: 共有914条查询结果,搜索用时 15 毫秒
61.
The problem is to protect a set of t targets by n perfect interceptors against an attack by m perfect weapons. If the defender solves for an optimal preallocated preferential defense and associated game value assuming m1 attackers, and the attacker knows the assumption of the defender and utilizes m2 attackers, he may be able to achieve significantly more damage than had the defender assumed that there would be m2 attackers. The article treats the robustness of preallocated preferential defense to assumptions about the size of the attack and presents results of an alternative approach.  相似文献   
62.
63.
The “gold‐mining” decision problem is concerned with the efficient utilization of a delicate mining equipment working in a number of different mines. Richard Bellman was the first to consider this type of a problem. The solution found by Bellman for the finite‐horizon, continuous‐time version of the problem with two mines is not overly realistic since he assumed that fractional parts of the same mining equipment could be used in different mines and this fraction could change instantaneously. In this paper, we provide some extensions to this model in order to produce more operational and realistic solutions. Our first model is concerned with developing an operational policy where the equipment may be switched from one mine to the other at most once during a finite horizon. In the next extension we incorporate a cost component in the objective function and assume that the horizon length is not fixed but it is the second decision variable. Structural properties of the optimal solutions are obtained using nonlinear programming. Each model and its solution is illustrated with a numerical example. The models developed here may have potential applications in other areas including production of items requiring the same machine or choosing a sequence of activities requiring the same resource. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 186–203, 2002; DOI 10.1002/nav.10008  相似文献   
64.
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046  相似文献   
65.
The combination of uncertain demand and lead times for installing capacity creates the risk of shortage during the lead time, which may have serious consequences for a service provider. This paper analyzes a model of capacity expansion with autocorrelated random demand and a fixed lead time for adding capacity. To provide a specified level of service, a discrete time expansion timing policy uses a forecast error‐adjusted minimum threshold level of excess capacity position to trigger an expansion. Under this timing policy, the expansion cost can be minimized by solving a deterministic dynamic program. We study the effects of demand characteristics and the lead time length on the capacity threshold. Autocorrelation acts similarly to randomness in hastening expansions but has a smaller impact, especially when lead times are short. However, the failure either to recognize autocorrelation or to accurately estimate its extent can cause substantial policy errors. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
66.
Modern technology is producing high reliability products. Life testing for such products under normal use condition takes a lot of time to obtain a reasonable number of failures. In this situation a step‐stress procedure is preferred for accelerated life testing. In this paper we assume a Weibull and Lognormal model whose scale parameter depends upon the present level as well as the age at the entry in the present stress level. On the basis of that we propose a parametric model to the life distribution for step‐stress testing and suggest a suitable design to estimate the parameters involved in the model. A simulation study has been done by the proposed model based on maximum likelihood estimation. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
67.
We consider the problem of optimizing assortments in a multi‐item retail inventory system. In addition to the usual holding and stockout costs, there is a fixed cost for including any item in the assortment. Customers' preferences for items include both probabilistic substitution patterns and the desire to purchase sets of complementary items. We develop a demand model to capture this behavior, and derive tractable approximations that allow us to formulate the optimization problem as a 0–1 mixed integer linear program. Numerical examples are solved to illustrate key insights into how both complementary and substitute items affect the optimal assortment and the expected profit. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 793–822, 2003.  相似文献   
68.
ABSTRACT

From 1944 to 1973 Australia attempted to acquire atomic weaponry. This ambition was driven by the desire to contribute to defending British interests in Asia, fears of invasion by China, Indonesia, and Japan, great-power war, and the belief that nuclear weapons were merely bigger and better conventional weapons, that they would proliferate, and that US security assurances lacked credibility. Although the pursuit of the bomb was eventually abandoned, this was not the result of US assurances. Rather, geopolitical changes in Australia’s environment meant that a major attack on the continent was unlikely to occur outside the context of a confrontation between the US, China, and the Soviet Union. This article argues that Australia may soon have to rethink its policies towards US extended deterrence and instead focus on developing its own deterrent.  相似文献   
69.
Since declaring their nuclear weapons capabilities in 1998, India and Pakistan have engaged in three major crises that each threatened to escalate into war. In each crisis, the USA engaged in active diplomacy to dissuade the South Asian rivals from taking escalatory actions. Previous literature on the crises has described the American role, but has not theorized third-party involvement in a nuclearized regional rivalry. We apply Timothy Crawford’s pivotal deterrence theory to the nuclearized India–Pakistan conflict, and extend the original theory to cover the novel condition of a non-superpower nuclear dyad, in the context of a single-superpower international system. We find that America’s pivotal deterrence generally enhanced stability in the India–Pakistan crises, and unlike in pre-nuclear South Asia, other great powers supported American diplomacy. However, we suggest that future regional crises between nuclear rivals, in South Asia or elsewhere, may present greater challenges for pivotal deterrence.  相似文献   
70.
The effort to degrade and defeat the Islamic State is like many other multilateral military efforts – characterized by widely varying contributions to the effort. This article seeks to understand the patterns of contributions. Three sets of explanations are applied: the lessons of Afghanistan and Libya, variations in how potential contributors feel the threat posed by the Islamic State, and domestic political dynamics. While there may be some political processes that overlap with the big lessons and with the threat of the Islamic State, the patterns of contributions thus far suggest that the key drivers of reactions to the Islamic State are the desire not to repeat Afghanistan combined with some impetus provided by Islamic State attacks in the various homelands. The conclusion suggests some policy implications as well as some ideas for future research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号