首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   414篇
  免费   11篇
  2020年   3篇
  2019年   7篇
  2018年   5篇
  2017年   8篇
  2016年   10篇
  2015年   8篇
  2014年   5篇
  2013年   105篇
  2011年   5篇
  2010年   3篇
  2009年   7篇
  2008年   7篇
  2006年   3篇
  2005年   8篇
  2004年   8篇
  2003年   4篇
  2000年   3篇
  1999年   4篇
  1998年   5篇
  1997年   3篇
  1996年   9篇
  1995年   4篇
  1994年   7篇
  1993年   6篇
  1992年   10篇
  1991年   13篇
  1990年   3篇
  1989年   6篇
  1988年   6篇
  1987年   10篇
  1986年   12篇
  1985年   15篇
  1984年   4篇
  1983年   5篇
  1981年   2篇
  1980年   4篇
  1979年   6篇
  1978年   4篇
  1977年   6篇
  1976年   6篇
  1975年   2篇
  1974年   5篇
  1973年   4篇
  1972年   12篇
  1971年   6篇
  1970年   11篇
  1969年   6篇
  1968年   4篇
  1967年   7篇
  1966年   6篇
排序方式: 共有425条查询结果,搜索用时 0 毫秒
321.
An approximate method for measuring the service levels of the warehouse-retailer system operating under (s, S) policy is presented. All the retailers are identical and the demand process at each retailer follows a stationary stuttering Poisson process. This type of demand process allows customer orders to be for a random number of units, which gives rise to the undershoot quantity at both the warehouse and retailer levels. Exact analyses of the distribution of the undershoot quantity and the number of orders place by a retailer during the warehouse reordering lead time are derived. By using this distribution together with probability approximation and other heuristic approaches, we model the behavior of the warehouse level. Based on the results of the warehouse level and on an existing framework from previous work, the service level at the retailer level is estimated. Results of the approximate method are then compared with those of simulation. © 1995 John Wiley & Sons, Inc.  相似文献   
322.
Given a set of jobs, a processing time and a weight for each job, several parallel and identical machines, and a common due date that is not too early to constrain the scheduling decision, we want to find an optimal job schedule so as to minimize the maximum weighted absolute lateness. We show that this problem is NP-complete even for the single-machine case, and is strongly NP-complete for the general case. We present a polynomial time heuristic for this problem and analyze its worst-case performance. Empirical testing of the heuristic is reported, and the results suggest that the performance is asymptotically optimal as the number of jobs tends to infinity. © 1994 John Wiley & Sons, Inc.  相似文献   
323.
This article examines the ship-to-shore transfer of cargo from ships that are located offshore. In these situations, cargo is transferred from the ships to smaller craft, which in turn transport the cargo the remaining distance to shore. These craft cycle back and forth from the ship to the shore until the transfer is complete. Queueing of these craft often occurs, as they must wait at either the ship or the shore for a loading or unloading position to become free. Two different methods of modeling this ship-to-shore transfer of cargo are developed and applied. One is an analytic queueing model and the other is a more traditional simulation model. The analytic model is found to produce results quite similar to the simulation model. Examples are shown that use these models to analyze trade-offs between variables affecting the ship-to-shore transfer of cargo and the total time to transfer a given amount of cargo ashore. © 1994 John Wiley & Sons, Inc.  相似文献   
324.
The article presents a Bayesian analysis for the environmental stress screening problem. The decision problem of deriving optimal stress screen durations is solved. Given a screen duration, the optimal stress level can also be determined. Indicators of the quality of a screen of any duration are derived. A statistical model is presented which allows a posterior density for the rate of early failures of the production process to be calculated. This enables the user to update his opinion about the quality of the process. © 1994 John Wiley & Sons, Inc.  相似文献   
325.
326.
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.  相似文献   
327.
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results.  相似文献   
328.
329.
A military cannot hope to improve in wartime if it cannot learn. Ideally, in wartime, formal learning ceases and the application of knowledge begins. But this is optimistic. In 1942, USAAF Eighth Air Force assumed it had the means necessary for victory. In reality, its technique and technology were only potentially – rather than actually – effective. What remained was to create the practice of daylight bombing – to learn. This article (1) recovers a wartime learning process that created new knowledge, (2) tests existing tacit hypotheses in military adaptation research, and (3) offers additional theoretical foundation to explain how knowledge is created in wartime  相似文献   
330.
An area to be defended consists of separated point targets. These targets are subject to an attack in which the offensive weapons are assumed to arrive simultaneously. The defense has area defenders, each of which is capable of intercepting any attacker'. Furthermore, the defense has impact-point prediction, i.e., it has knowledge of each attacker's intended target prior to allocation of the area interceptors. For a given attack, the defense wishes to allocate its interceptors against attackers so as to maximize the expected total survival value of the targets. In its first move, the offense seeks an attack allocation which will minimize expected total surviving value against best defense. We develop an algorithm to determine optimal attack and defense strategies and the optimal value of this sequential min-max problem. Branch-and-bound techniques are used to obtain integer solutions, and illustrative computational results are provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号