全文获取类型
收费全文 | 483篇 |
免费 | 12篇 |
出版年
2021年 | 12篇 |
2019年 | 21篇 |
2018年 | 10篇 |
2017年 | 10篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2014年 | 9篇 |
2013年 | 93篇 |
2011年 | 4篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 5篇 |
2005年 | 9篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 7篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 15篇 |
1996年 | 7篇 |
1994年 | 10篇 |
1992年 | 4篇 |
1991年 | 13篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 15篇 |
1986年 | 8篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 12篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 8篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1973年 | 12篇 |
1972年 | 6篇 |
1971年 | 6篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 5篇 |
排序方式: 共有495条查询结果,搜索用时 281 毫秒
51.
A system of two parallel queues where the arrivals from a single stream of customers join the shorter queue is considered. Arrivals form a homogeneous Poisson stream and the service times in each of the two queues are independent exponential variates. By treating one of the queues as bounded, the steady-state probability vector for the system can be expressed in a modified matrix-geometric form and can be computed efficiently. Computational procedures for the sojourn time distribution and characteristics of the departure stream are developed. Some numerical results are presented, and based on these results an efficient approximation scheme for the model is developed which can be readily extended to systems with more than two parallel queues. 相似文献
52.
The methodology of determining simultaneous visibility probabilities and points on line segments is extended to problems of three-dimensional spaces, with Poisson random fields of obscuring spheres. Required functions are derived analytically and a numerical example is given for a special case of a standard Poisson field, with uniform distribution of sphere diameters. 相似文献
53.
An approximation for analyzing transient and nonstationary two-priority non-preemptive queueing systems is presented. This system has a three-dimensional state space, and through use of state-space partitioning in conjunction with use of conditional surrogate distributions with constant parameters an approximation is designed. Regardless of system capacity K, the approximation requires the numerical solution of only ten differential equations, compared to the K2 + K+1 Kolmogorov-forward equations required for the classic solution. Time-dependent approximations of the mean number of entities of type i and of the probability of a type-i entity being in service are obtained. Empirical test results over a wide range of systems indicate the approximation is quite accurate. 相似文献
54.
AbstractThe Military Compensation and Retirement Modernization Commission was established by the Congress in 2013 to perform a systematic review of military compensation to address rising costs and other trends. Their recommendation for reforming the TRICARE health care program was sweeping, and differed greatly from earlier proposals that focused on increasing beneficiary cost shares. Specifically, the commission proposed overhauling the current benefit delivery model and replacing it with a premium-based insurance model offering a menu of DoD-sponsored private health plans. The analysis presented here is based on work that supported the commission by estimating the budgetary impact of its proposed reforms. Results indicate that movement towards the premium-based model would produce an annual budgetary cost savings in the $2 billion to $4 billion range, with a best savings estimate of $3.2 billion. 相似文献
55.
Christine M. Leah 《战略研究杂志》2016,39(4):521-534
ABSTRACTFrom 1944 to 1973 Australia attempted to acquire atomic weaponry. This ambition was driven by the desire to contribute to defending British interests in Asia, fears of invasion by China, Indonesia, and Japan, great-power war, and the belief that nuclear weapons were merely bigger and better conventional weapons, that they would proliferate, and that US security assurances lacked credibility. Although the pursuit of the bomb was eventually abandoned, this was not the result of US assurances. Rather, geopolitical changes in Australia’s environment meant that a major attack on the continent was unlikely to occur outside the context of a confrontation between the US, China, and the Soviet Union. This article argues that Australia may soon have to rethink its policies towards US extended deterrence and instead focus on developing its own deterrent. 相似文献
56.
Stephen M. Saideman 《Contemporary Security Policy》2016,37(2):289-305
The effort to degrade and defeat the Islamic State is like many other multilateral military efforts – characterized by widely varying contributions to the effort. This article seeks to understand the patterns of contributions. Three sets of explanations are applied: the lessons of Afghanistan and Libya, variations in how potential contributors feel the threat posed by the Islamic State, and domestic political dynamics. While there may be some political processes that overlap with the big lessons and with the threat of the Islamic State, the patterns of contributions thus far suggest that the key drivers of reactions to the Islamic State are the desire not to repeat Afghanistan combined with some impetus provided by Islamic State attacks in the various homelands. The conclusion suggests some policy implications as well as some ideas for future research. 相似文献
57.
Fernando M. M. Ruiz Florent Hainaut Nathalie Schiffino 《Defence and Peace Economics》2016,27(6):774-793
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure. 相似文献
58.
The general problem we are concerned with here is the estimation of Pθ(C) where C is some fixed event and Pθ is unknown in some class. The various available estimation procedures seem to involve the choice of some random probability measure. In particular we consider this problem when C is a disk in R2 centered at o and Pθ is restricted to be bivariate normal. Details concerning the implementation of the estimation procedures and a Monte Carlo study are discussed for this case. This particular problem arises when we are concerned with assessing the accuracy of a targeting procedure. 相似文献
59.
We consider the integrated problem of optimally maintaining an imperfect, deteriorating sensor and the safety‐critical system it monitors. The sensor's costless observations of the binary state of the system become less informative over time. A costly full inspection may be conducted to perfectly discern the state of the system, after which the system is replaced if it is in the out‐of‐control state. In addition, a full inspection provides the opportunity to replace the sensor. We formulate the problem of adaptively scheduling full inspections and sensor replacements using a partially observable Markov decision process (POMDP) model. The objective is to minimize the total expected discounted costs associated with system operation, full inspection, system replacement, and sensor replacement. We show that the optimal policy has a threshold structure and demonstrate the value of coordinating system and sensor maintenance via numerical examples. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 399–417, 2017 相似文献
60.
On 22 September 1979 two optical sensors on U.S. satellite Vela 6911 detected a double-flash of light that appeared characteristic of an atmospheric nuclear explosion conducted over the southern Atlantic or Indian Ocean. It became known as the Vela Incident, Event 747, or Alert 747. An anomaly between the amplitude of the two signals during the second pulse led a U.S. government expert panel established to assess the event to conclude in mid-1980 that a more likely explanation was the impact of a small meteoroid on the satellite, the debris from which reflected sunlight into the sensors' field of view. No model was presented to support the contention, and a similar anomaly—known as background modulation—was a given for the second pulse of all confirmed explosions detected by Vela, though beginning later. Nonetheless, this event has remained the subject of intense debate. This article reviews the evidence and presents an updated analysis of the original Vela signal based on recently declassified literature and on modern knowledge of interplanetary dust and hyper velocity impact. Given the geometry of the satellite, and that the bulk of the surface comprised solar panels, much of the debris from any collision would be carried away from the sensors' field of view. Thus, a meteoroid collision appears much less likely than previously assumed. The double flash is instead consistent with a nuclear explosion, albeit detected by an aged satellite for which background modulation was abnormal and/or commenced earlier, also seen in post-event SYSTEM tests. A companion paper to be published in 2018 presents radionuclide and hydroacoustic evidence supporting the conclusion that the Vela Incident was a nuclear weapon test explosion. 相似文献