全文获取类型
收费全文 | 474篇 |
免费 | 13篇 |
出版年
2021年 | 5篇 |
2019年 | 12篇 |
2018年 | 10篇 |
2017年 | 12篇 |
2016年 | 7篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 107篇 |
2011年 | 5篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2006年 | 7篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 12篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 11篇 |
1991年 | 11篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 11篇 |
1987年 | 11篇 |
1986年 | 8篇 |
1985年 | 8篇 |
1984年 | 6篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1980年 | 11篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 9篇 |
1974年 | 4篇 |
1971年 | 9篇 |
1970年 | 5篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 5篇 |
1966年 | 7篇 |
排序方式: 共有487条查询结果,搜索用时 15 毫秒
11.
A common problem in life testing is to demonstrate that the mean time to failure, θ, exceeds some minimum acceptable value, say θ1, with a given confidence coefficient γ. When this is true, it is said that “θ1 has been demonstrated with a confidence γ”. In this paper a Sequential Bayes Procedure (SBP) for demonstrating (by means of. a probability statement) that θ exceeds θ1 is presented. The SBP differs from the classical procedure in the sense that a prior distribution is assumed on the parameter θ, calling for a Bayesian approach. The procedure is based on the sequence of statistics. 相似文献
12.
R. D. Wollmer 《海军后勤学研究》1970,17(2):207-216
This paper presents an algorithm for determining where to place intercepting units in order to maximize the probability of preventing an opposing force from proceeding from one particular node in an undirected network to another. The usual gaming assumptions are invoked; namely, the strategy for placing the units is known to the opponent and he will choose a path through the network which, based on this knowledge, maximizes his probability of successful traverse. As given quantities, the model requires a list of the arcs and nodes of the network, the number of intercepting units available to stop the opposing force, and the probabilities for stopping the opposition at the arcs and nodes as functions of the number of intercepting units placed there. From these quantities, the algorithm calculates the probabilities for placing the unit at the arcs and nodes when one intercepting unit is available, and the expected numbers of units to place at the arcs and nodes when multiple intercepting units are available. 相似文献
13.
Michael Maschler 《海军后勤学研究》1966,13(1):11-33
An inspector's game is a non-constant-sum two-person game in which one player has promised to perform a certain duty and the other player is allowed to inspect and verify occasionally that the duty has indeed been performed. A solution to a variant of such a game is given in this paper, based on the assumption that the inspector can announce his mixed strategy in advance, if he so wishes, whereas the other player, who has already given his promise, cannot threaten by explicitly saying that he will not keep his word. 相似文献
14.
15.
16.
Philip M. Taylor Andrew Geddes Michael Pugh Sara Pienaar 《Defense & Security Analysis》1997,13(1):121-128
War, Culture and the Media: Representations of the Military in 20th Century Britain. Edited by Ian Stewart and Susan L. Carruthers, Trowbridge: Flicks Books, (1996), ISBN 0-948911-86-7 (pbk), £14.95.
The Future of Europe. By Peter Coffey, Aldershot: Edward Elgar, (1995), ISBN 1-85278-586-1 (hardback), £39.95, ISBN 1-85278-587-X (pbk), £12.95.
Global Dangers: Changing Dimensions of International Security. Edited by Sean M. Lynn-Jones, Steven E. Miller, London: the MIT Press, (1996), ISBN O-262-62097-9 (pbk), £13.50;.
New Studies in Post-Cold War Security. Edited by K.R. Dark, Aldershot: Dartmouth Publishing Company, (1996), ISBN 1-85521-728-7 (hardback), £42.50.
Enlarging NATO - The Russian Factor. By Richard L. Kugler with Marianna V. Kozintseva, Santa Monica, CA: National Defense Research Institute and Rand Corporation, (1996), ISBN 0-8330-2357-8, $20.00. 相似文献
The Future of Europe. By Peter Coffey, Aldershot: Edward Elgar, (1995), ISBN 1-85278-586-1 (hardback), £39.95, ISBN 1-85278-587-X (pbk), £12.95.
Global Dangers: Changing Dimensions of International Security. Edited by Sean M. Lynn-Jones, Steven E. Miller, London: the MIT Press, (1996), ISBN O-262-62097-9 (pbk), £13.50;.
New Studies in Post-Cold War Security. Edited by K.R. Dark, Aldershot: Dartmouth Publishing Company, (1996), ISBN 1-85521-728-7 (hardback), £42.50.
Enlarging NATO - The Russian Factor. By Richard L. Kugler with Marianna V. Kozintseva, Santa Monica, CA: National Defense Research Institute and Rand Corporation, (1996), ISBN 0-8330-2357-8, $20.00. 相似文献
17.
Consider an auction in which increasing bids are made in sequence on an object whose value θ is known to each bidder. Suppose n bids are received, and the distribution of each bid is conditionally uniform. More specifically, suppose the first bid X1 is uniformly distributed on [0, θ], and the ith bid is uniformly distributed on [Xi?1, θ] for i = 2, …?, n. A scenario in which this auction model is appropriate is described. We assume that the value θ is un known to the statistician and must be esimated from the sample X1, X2, …?, Xn. The best linear unbiased estimate of θ is derived. The invariance of the estimation problem under scale transformations in noted, and the best invariant estimation problem under scale transformations is noted, and the best invariant estimate of θ under loss L(θ, a) = [(a/θ) ? 1]2 is derived. It is shown that this best invariant estimate has uniformly smaller mean-squared error than the best linear unbiased estimate, and the ratio of the mean-squared errors is estimated from simulation experiments. A Bayesian formulation of the estimation problem is also considered, and a class of Bayes estimates is explicitly derived. 相似文献
18.
In this paper we present a new formulation of the quadratic assignment problem. This is done by transforming the quadratic objective function into a linear objective function by introducing a number of new variables and constraints. The resulting problem is a 0-1 linear integer program with a highly specialized structure. This permits the use of the partitioning scheme of Benders where only the original variables need be considered. The algorithm described thus iterates between two problems. The master problem is a pure 0-1 integer program, and the subproblem is a transportation problem whose optimal solution is shown to be readily available from the master problem in closed form. Computational experience on problems available in the literature is provided. 相似文献
19.
In this paper we address the question of deriving deep cuts for nonconvex disjunctive programs. These problems include logical constraints which restrict the variables to at least one of a finite number of constraint sets. Based on the works of Balas. Glover, and Jeroslow, we examine the set of valid inequalities or cuts which one may derive in this context, and defining reasonable criteria to measure depth of a cut we demonstrate how one may obtain the “deepest” cut. The analysis covers the case where each constraint set in the logical statement has only one constraint and is also extended for the case where each of these constraint sets may have more than one constraint. 相似文献
20.
A cutting plane scheme embedded in an implicit enumeration framework is proposed for ranking the extreme points of linear assignment problems. This method is capable of ranking any desired number of extreme points at each possible objective function value. The technique overcomes storage difficulties by being able to perform the ranking at any particular objective function value independently of other objective values. Computational experience on some test problems is provided. 相似文献