首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   202篇
  免费   6篇
  2021年   8篇
  2019年   3篇
  2018年   4篇
  2017年   2篇
  2016年   3篇
  2014年   4篇
  2013年   27篇
  2012年   2篇
  2010年   2篇
  2009年   7篇
  2007年   5篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   7篇
  2001年   5篇
  2000年   5篇
  1999年   2篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   7篇
  1994年   2篇
  1993年   4篇
  1992年   3篇
  1991年   5篇
  1990年   4篇
  1989年   6篇
  1988年   6篇
  1987年   6篇
  1986年   5篇
  1984年   5篇
  1983年   3篇
  1982年   1篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   5篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   4篇
  1972年   2篇
  1971年   2篇
  1970年   2篇
  1969年   3篇
  1968年   2篇
  1948年   1篇
排序方式: 共有208条查询结果,搜索用时 15 毫秒
171.
We undertake inference for a stochastic form of the Lanchester combat model. In particular, given battle data, we assess the type of battle that occurred and whether or not it makes any difference to the number of casualties if an army is attacking or defending. Our approach is Bayesian and we use modern computational techniques to fit the model. We illustrate our method using data from the Ardennes campaign. We compare our results with previous analyses of these data by Bracken and Fricker. Our conclusions are somewhat different to those of Bracken. Where he suggests that a linear law is appropriate, we show that the logarithmic or linear‐logarithmic laws fit better. We note however that the basic Lanchester modeling assumptions do not hold for the Ardennes data. Using Fricker's modified data, we show that although his “super‐logarithmic” law fits best, the linear, linear‐logarithmic, and logarithmic laws cannot be ruled out. We suggest that Bayesian methods can be used to make inference for battles in progress. We point out a number of advantages: Prior information from experts or previous battles can be incorporated; predictions of future casualties are easily made; more complex models can be analysed using stochastic simulation techniques. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 541–558, 2000  相似文献   
172.
In this paper we study strategies for better utilizing the network capacity of Internet Service Providers (ISPs) when they are faced with stochastic and dynamic arrivals and departures of customers attempting to log‐on or log‐off, respectively. We propose a method in which, depending on the number of modems available, and the arrival and departure rates of different classes of customers, a decision is made whether to accept or reject a log‐on request. The problem is formulated as a continuous time Markov Decision Process for which optimal policies can be readily derived using techniques such as value iteration. This decision maximizes the discounted value to ISPs while improving service levels for higher class customers. The methodology is similar to yield management techniques successfully used in airlines, hotels, etc. However, there are sufficient differences, such as no predefined time horizon or reservations, that make this model interesting to pursue and challenging. This work was completed in collaboration with one of the largest ISPs in Connecticut. The problem is topical, and approaches such as those proposed here are sought by users. © 2001 John Wiley & Sons, Inc., Naval Research Logistics 48:348–362, 2001  相似文献   
173.
We consider a routing policy that forms a dynamic shortest path in a network with independent, positive and discrete random arc costs. When visiting a node in the network, the costs for the arcs going out of this node are realized, and then the policy will determine which node to visit next with the objective of minimizing the expected cost from the current node to the destination node. This paper proposes an approach, which mimics the classical label-correcting approach, to compute the expected path cost. First, we develop a sequential implementation of this approach and establish some properties about the implementation. Next, we develop stochastic versions of some well-known label-correcting methods, including the first-in-first-out method, the two-queue method, the threshold algorithms, and the small-label-first principle. We perform numerical experiments to evaluate these methods and observe that fast methods for deterministic networks can become very slow for stochastic networks. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 769–789, 1998  相似文献   
174.
The G/G/R machine repair problem with M operating machines, S warm standby spares, and R repairmen is studied as a diffusion process. The steady-state equations are formulated as diffusion equations subject to two reflecting barriers. The approximate diffusion parameters of the diffusion equations are obtained (1) under the assumption that the input characteristics of the problem are defined only by their first two moments rather than their probability distribution function, (2) under the assumption of heavy traffic approximation, that is, when queues of failed machines in the repair stage are almost always nonempty, and (3) using well-known asymptotic results from renewal theory. Expressions for the probability density functions of the number of failed machines in the system are obtained. A study of the derived approximate results, compared to some of the exact results, suggests that the diffusion approach provides a useful method for solving complex machine-repair problems.  相似文献   
175.
At the core of waging war and strategy is the creation, control and use of force. This article investigates the volunteer battalions that mobilized in Ukraine during the spring of 2014. It contextualizes the volunteer phenomenon and focuses on the state strategies to establish control over these militias. As ambiguous entities arising from a situation characterized by rapid social change – revolution and war – the volunteer battalions threatened existing hierarchies and questioned state authority. The situation was exacerbated by the war, which deviated from the expectations of Ukrainian combatants and Western military observers alike. The state nevertheless enjoyed a modicum of success in reining in the militias through four strategies of undermining, co-option, incorporation and coercion. While predominantly integrated into a more rigid category of paramilitary forces, the volunteers continue to play a role in both the Ukrainian society and security sector to the unforeseeable future.  相似文献   
176.
A carrier battle group is operating in an area where it is subject to attack by enemy aircraft. It is anticipated that air raids will occur in large waves. The uncertain time between raids is available for the replenishment of supplies. We consider the problem of how best to schedule ammunition replenishment during this period. The theory of Gittins indices provides the technical background to the development of a range of models which yield a hierarchy of index-based heuristics for replenishment. One such heuristic is assessed computationally in a more realistic scenario than is explicitly allowed for by the models.  相似文献   
177.
In this article we present a stochastic model for determining inventory rotation policies for a retail firm which must stock many hundreds of distinctive items having uncertain heterogeneous sales patterns. The model develops explicit decision rules for determining (1) the length of time that an item should remain in inventory before the decision is made on whether or not to rotate the item out of inventory and (2) the minimum sales level necessary for retaining the item in inventory. Two inventory rotation policies are developed, the first of which maximizes cumulative expected sales over a finite planning horizon and the second of which maximizes cumulative expected profit. We also consider the statistical behavior of items having uncertain, discrete, and heterogeneous sales patterns using a two-period prediction methodology where period 1 is used to accumulate information on individual sales rates and this knowledge is then used, in a Bayesian context, to make sales predictions for period 2. This methodology assumes that over an arbitrary time interval sales for each item are Poisson with unknown but stationary mean sales rates and the mean sales rates are distributed gamma across all items. We also report the application of the model to a retail firm which stocks many hundreds of distinctive unframed poster art titles. The application provides some useful insights into the behavior of the model as well as some interesting aspects pertaining to the implementation of the results in a “real-world” situation.  相似文献   
178.
179.
This article generalizes the model for the economic design of x̄-control charts of Duncan [4], starting from the more recent papers of Lorenzen and Vance [8] and Banerjee and Rahim [3]. The classical model of Duncan [4] and its several extensions including the unified model of Lorenzen and Vance [8] assumed exponentially distributed in-control periods and provided uniform sampling schemes. Banerjee and Rahim [3], however, assumed a Weibull-distributed in-control period having an increasing failure rate and used variable sampling intervals. The present article is an extension of the work of Banerjee and Rahim [3], where a general distribution of in-control periods having an increasing failure rate is assumed and the possibility of age-dependent repair before failure is considered. Several different truncated and nontruncated probability models are chosen. It is proposed that economic benefits can be achieved by adopting a nonuniform inspection scheme and by truncating a production cycle when it attains a certain age. Numerical examples are presented to support this proposition. Finally, the effect of model specification in the choice of failure mechanism is investigated. © 1993 John Wiley & Sons, Inc.  相似文献   
180.
It is shown that two recent results of Baxter and Harche [1] on monotone and balanced optimal assemblies hold only under conditions that are more restrictive than those originally proposed by the authors. We describe such additional conditions, illustrate why they are needed, and establish their sufficiency. We also consider a recent result by Malon [11] and demonstrate that, while the result itself is correct, its two proofs were incomplete. A complete proof of an extension of the result is then suggested. © 1995 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号