全文获取类型
收费全文 | 414篇 |
免费 | 11篇 |
出版年
2020年 | 3篇 |
2019年 | 7篇 |
2018年 | 5篇 |
2017年 | 8篇 |
2016年 | 10篇 |
2015年 | 8篇 |
2014年 | 5篇 |
2013年 | 105篇 |
2011年 | 5篇 |
2010年 | 3篇 |
2009年 | 7篇 |
2008年 | 7篇 |
2006年 | 3篇 |
2005年 | 8篇 |
2004年 | 8篇 |
2003年 | 4篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 5篇 |
1997年 | 3篇 |
1996年 | 9篇 |
1995年 | 4篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 10篇 |
1991年 | 13篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 6篇 |
1987年 | 10篇 |
1986年 | 12篇 |
1985年 | 15篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 6篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 6篇 |
1975年 | 2篇 |
1974年 | 5篇 |
1973年 | 4篇 |
1972年 | 12篇 |
1971年 | 6篇 |
1970年 | 11篇 |
1969年 | 6篇 |
1968年 | 4篇 |
1967年 | 7篇 |
1966年 | 6篇 |
排序方式: 共有425条查询结果,搜索用时 0 毫秒
321.
An approximate method for measuring the service levels of the warehouse-retailer system operating under (s, S) policy is presented. All the retailers are identical and the demand process at each retailer follows a stationary stuttering Poisson process. This type of demand process allows customer orders to be for a random number of units, which gives rise to the undershoot quantity at both the warehouse and retailer levels. Exact analyses of the distribution of the undershoot quantity and the number of orders place by a retailer during the warehouse reordering lead time are derived. By using this distribution together with probability approximation and other heuristic approaches, we model the behavior of the warehouse level. Based on the results of the warehouse level and on an existing framework from previous work, the service level at the retailer level is estimated. Results of the approximate method are then compared with those of simulation. © 1995 John Wiley & Sons, Inc. 相似文献
322.
Given a set of jobs, a processing time and a weight for each job, several parallel and identical machines, and a common due date that is not too early to constrain the scheduling decision, we want to find an optimal job schedule so as to minimize the maximum weighted absolute lateness. We show that this problem is NP-complete even for the single-machine case, and is strongly NP-complete for the general case. We present a polynomial time heuristic for this problem and analyze its worst-case performance. Empirical testing of the heuristic is reported, and the results suggest that the performance is asymptotically optimal as the number of jobs tends to infinity. © 1994 John Wiley & Sons, Inc. 相似文献
323.
This article examines the ship-to-shore transfer of cargo from ships that are located offshore. In these situations, cargo is transferred from the ships to smaller craft, which in turn transport the cargo the remaining distance to shore. These craft cycle back and forth from the ship to the shore until the transfer is complete. Queueing of these craft often occurs, as they must wait at either the ship or the shore for a loading or unloading position to become free. Two different methods of modeling this ship-to-shore transfer of cargo are developed and applied. One is an analytic queueing model and the other is a more traditional simulation model. The analytic model is found to produce results quite similar to the simulation model. Examples are shown that use these models to analyze trade-offs between variables affecting the ship-to-shore transfer of cargo and the total time to transfer a given amount of cargo ashore. © 1994 John Wiley & Sons, Inc. 相似文献
324.
The article presents a Bayesian analysis for the environmental stress screening problem. The decision problem of deriving optimal stress screen durations is solved. Given a screen duration, the optimal stress level can also be determined. Indicators of the quality of a screen of any duration are derived. A statistical model is presented which allows a posterior density for the rate of early failures of the production process to be calculated. This enables the user to update his opinion about the quality of the process. © 1994 John Wiley & Sons, Inc. 相似文献
325.
326.
Lawrence E. Cline 《Defense & Security Analysis》2019,35(3):241-260
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities. 相似文献
327.
Corine M. Laan Ana Isabel Barros Richard J. Boucherie Herman Monsuur Judith Timmer 《海军后勤学研究》2019,66(2):174-190
In this paper, we introduce partially observable agent‐intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable information about the state of the intruder and vice versa. The agent may place sensors at selected locations, while the intruder may recruit partners to observe the agent's movement. We formulate the problem as a two‐person zero‐sum game, and develop efficient algorithms to compute each player's optimal strategy. The solution to the game will help the agent choose sensor locations and design patrol routes that can handle imperfect information. First, we prove the existence of ?‐optimal strategies for POAIGs with an infinite time horizon. Second, we introduce a Bayesian approximation algorithm to identify these ?‐optimal strategies using belief functions that incorporate the imperfect information that becomes available during the game. For the solutions of large POAIGs with a finite time horizon, we use a solution method common to extensive form games, namely, the sequence form representation. To illustrate the POAIGs, we present several examples and numerical results. 相似文献
328.
329.
A military cannot hope to improve in wartime if it cannot learn. Ideally, in wartime, formal learning ceases and the application of knowledge begins. But this is optimistic. In 1942, USAAF Eighth Air Force assumed it had the means necessary for victory. In reality, its technique and technology were only potentially – rather than actually – effective. What remained was to create the practice of daylight bombing – to learn. This article (1) recovers a wartime learning process that created new knowledge, (2) tests existing tacit hypotheses in military adaptation research, and (3) offers additional theoretical foundation to explain how knowledge is created in wartime 相似文献
330.
An area to be defended consists of separated point targets. These targets are subject to an attack in which the offensive weapons are assumed to arrive simultaneously. The defense has area defenders, each of which is capable of intercepting any attacker'. Furthermore, the defense has impact-point prediction, i.e., it has knowledge of each attacker's intended target prior to allocation of the area interceptors. For a given attack, the defense wishes to allocate its interceptors against attackers so as to maximize the expected total survival value of the targets. In its first move, the offense seeks an attack allocation which will minimize expected total surviving value against best defense. We develop an algorithm to determine optimal attack and defense strategies and the optimal value of this sequential min-max problem. Branch-and-bound techniques are used to obtain integer solutions, and illustrative computational results are provided. 相似文献