全文获取类型
收费全文 | 596篇 |
免费 | 0篇 |
专业分类
596篇 |
出版年
2021年 | 11篇 |
2019年 | 24篇 |
2018年 | 12篇 |
2017年 | 16篇 |
2016年 | 12篇 |
2015年 | 12篇 |
2014年 | 14篇 |
2013年 | 137篇 |
2009年 | 6篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 5篇 |
2005年 | 9篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 5篇 |
2000年 | 9篇 |
1998年 | 11篇 |
1997年 | 16篇 |
1996年 | 9篇 |
1995年 | 5篇 |
1994年 | 11篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 13篇 |
1990年 | 5篇 |
1989年 | 9篇 |
1988年 | 9篇 |
1987年 | 16篇 |
1986年 | 10篇 |
1985年 | 8篇 |
1984年 | 5篇 |
1983年 | 8篇 |
1982年 | 9篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 9篇 |
1976年 | 8篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1973年 | 12篇 |
1972年 | 6篇 |
1971年 | 7篇 |
1970年 | 8篇 |
1969年 | 7篇 |
1968年 | 6篇 |
1967年 | 8篇 |
排序方式: 共有596条查询结果,搜索用时 0 毫秒
341.
342.
This paper considers the search for an evader concealed in one of two regions, each of which is characterized by its detection probability. The single-sided problem, in which the searcher is told the probability of the evader being located in a particular region, has been examined previously. We shall be concerned with the double-sided problem in which the evader chooses this probability secretly, although he may not subsequently move: his optimal strategy consists of that probability distribution which maximizes the expected time to detection, while the searcher's optimal strategy is the sequence of searches which limits the evader to this expected time. It transpires for this problem that optimal strategies for both searcher and evader may generally be obtained to a surprisingly good degree of approximation by using the optimal strategies for the closely related (but far more easily solved) problem in which the evader is completely free to move between searches. 相似文献
343.
Gary M. Roodman 《海军后勤学研究》1972,19(3):435-447
The procedures for postoptimality analysis that are so much a part of linear programming studies have no simple counterparts in an integer programming context. In the case of Balas' Additive Algorithm, however, it would appear that the capacity of the technique to facilitate certain types of postoptimality analysis has not been fully exploited. This paper proposes an extension of the additive algorithm that utilizes insights generated while solving the original problem to do subsequent analysis upon it. In particular, procedures are developed for doing limited parameter ranging and for seeking new optima in light of parameter changes. 相似文献
344.
Richard M. Simon 《海军后勤学研究》1972,19(1):1-14
A reliability model for multicomponent multistate systems is presented. This is a generalization of a model previously studied by Hirsch, Meisner, and Boll. In the earlier model, when a failure occurs for which no replacement spare is available, the locations using the same type of part as that having failed are “cannibalized” so as to allocate the shortages to locations where they are least detrimental to system performance. Here, we permit certain restrictions to be imposed upon the cannibalization procedure, and develop effective techniques for relating the probability laws governing the level of system performance to the system structure, cannibalization policy, kit of spare parts, and part reliabilities. 相似文献
345.
In an ordered sample from a given population, a few of the consecutive observations from somewhere in the middle may be missing Further, we may be constrained to use a few, and not all, of the remaining observations for purposes of estimation of population parameters. In this paper, such a situation is considered for the double exponential distribution and best linear unbiased estimates are obtained for its parameters, based on a choice of an optimum set of order statistics when the number of observations in the set are prefixed. 相似文献
346.
Myerson 3 and 4 proposed and characterized a modification of the Shapley value in the context of communication situations. In this paper we propose several characterizations of the extension of the Banzhaf value proposed by Owen 7 to communication situations. In particular we characterize this value with the properties of fairness, isolation, and pairwise merging. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
347.
In this paper we present an application of the core solution concepts for multi‐objective games to a bank ATM network model. In these games, the worth of a coalition is given by a subset of vectors of the k‐dimensional space rather than by a scalar. The paper investigates how an ATM network model based on multi‐objective cooperative game theory could be used as an alternative way of setting interchange fees paid by the customer's bank to the one that owns the ATM. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
348.
One of the major problems in modeling production systems is how to treat the job arrival process. Restrictive assumptions such as Markovian arrivals do not represent real world systems, especially if the arrival process is generated by job departures from upstream workstations. Under these circumstances, cost‐effective policies that are robust with respect to the nature of the arrival process become of interest. In this paper, we focus on minimizing the expected total holding and setup costs in a two‐stage produce‐to‐order production system operated by a cross‐trained worker. We will show that if setup times are insignificant in comparison with processing times, then near‐optimal policies can be generated with very robust performances with respect to the arrival process. We also present conditions under which these near‐optimal policies can be obtained by using only the arrival and service rates. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
349.
350.