首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   816篇
  免费   19篇
  2021年   18篇
  2019年   28篇
  2018年   12篇
  2017年   18篇
  2016年   17篇
  2015年   21篇
  2014年   16篇
  2013年   157篇
  2008年   9篇
  2007年   9篇
  2006年   9篇
  2005年   11篇
  2004年   9篇
  2003年   8篇
  2002年   11篇
  2001年   10篇
  2000年   9篇
  1999年   8篇
  1998年   16篇
  1997年   21篇
  1996年   12篇
  1995年   9篇
  1994年   16篇
  1993年   9篇
  1992年   11篇
  1991年   20篇
  1989年   14篇
  1988年   20篇
  1987年   19篇
  1986年   23篇
  1985年   15篇
  1984年   11篇
  1983年   12篇
  1982年   12篇
  1981年   11篇
  1980年   12篇
  1979年   21篇
  1978年   14篇
  1977年   15篇
  1976年   8篇
  1975年   15篇
  1974年   13篇
  1973年   15篇
  1972年   13篇
  1971年   9篇
  1970年   10篇
  1969年   11篇
  1968年   7篇
  1967年   7篇
  1966年   6篇
排序方式: 共有835条查询结果,搜索用时 15 毫秒
61.
The effort to degrade and defeat the Islamic State is like many other multilateral military efforts – characterized by widely varying contributions to the effort. This article seeks to understand the patterns of contributions. Three sets of explanations are applied: the lessons of Afghanistan and Libya, variations in how potential contributors feel the threat posed by the Islamic State, and domestic political dynamics. While there may be some political processes that overlap with the big lessons and with the threat of the Islamic State, the patterns of contributions thus far suggest that the key drivers of reactions to the Islamic State are the desire not to repeat Afghanistan combined with some impetus provided by Islamic State attacks in the various homelands. The conclusion suggests some policy implications as well as some ideas for future research.  相似文献   
62.
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure.  相似文献   
63.
A new class of nonparametric reliability models is introduced and studied. A distribution is said to be better at age s than at age t (sBt) if the residual lifetime at age s is stochastically greater than or equal to the residual lifetime at age t. Applications to various forms of replacement policies, including the cannibalization of failed systems, are noted. For fixed s < t, the problem of estimating a survival curve assumed to belong to the sBt class is addressed using recursive methods. An sBt estimator is derived in closed form, and its uniform strong consistency at an optimal rate of convergence is demonstrated. A simulation study strongly supports the claim that the sBt estimator tends to outperform the empirical survivor function in small- and moderate-size samples. © 1993 John Wiley & Sons, Inc.  相似文献   
64.
Product support encompasses activities undertaken by durable goods producers to ensure their customers the continued use of the product. Examples of product support elements include after the sale activities such as providing repair services and warranty programs, as well as all the activities undertaken at the design and production stage to improve the reliability of products before they reach the market. The implications of incorporating customer costs while designing product support packages are the concern of this study. We study how the parameters of support package impact the costs incurred by customers and provide insights about selecting appropriate levels of product support. We show that the engineering orientation of maximizing the product's availability ignores market characteristics, and results in a mismatch between the corporation's support package and the customer's needs. The research is intended to be a step in understanding the interaction between design engineering parameters and customer's costs. © 1993 John Wiley & Sons, Inc.  相似文献   
65.
We model a two-echelon multi-indentured repairable-item inventory system where each “base” has a maximum number of identical online machines, and each machine consists of several module types. Machine failures are due to module failures and occur according to an exponential distribution. When a machine fails, the failed module is replaced by an identical spare module if one is available. Otherwise, the module is backordered. All failed modules go to a single “depot” repair facility which consists of a finite number of identical repairmen who are able to repair any module type in an exponentially distributed time, although the repair rates for different module types may differ. The principal contribution of this article is an approximation algorithm for calculating the steady-state characteristics of the system. In comparison with simulation results, the algorithm is quite accurate and computationally efficient. © 1993 John Wiley & Sons, Inc.  相似文献   
66.
In this article we consider a project scheduling problem where there are cash flows throughout the life of the project and where shorter activity durations can be attained by incurring greater direct costs. In particular, the objective of this problem is to determine the activity durations and a schedule of activity start times so that the net present value of cash flows is maximized. We formulate this problem as a mixed-integer nonlinear program which is amenable to solution using the generalized Benders decomposition technique developed by Geoffrion. We test the algorithm on 140 project scheduling problems, the largest of which contains 30 nodes and 64 activities. Our computational results are quite encouraging inasmuch as 123 of the 140 problems require less than 1 CPU second of solution time. © 1993 John Wiley & Sons, Inc.  相似文献   
67.
This article introduces a new conceptual and methodological framework for the use of decision makers and their interactions with the computer in bicriterion decision making. The new method, called the multirun interactive method, attempts to estimate the prior of the decision maker on his uncertain preference nature using the minimum cross-entropy principle. A computational study is performed with four hypothesized prior distributions under various interaction conditions. Other important aspects related to the method, such as implementation of the method, decision making under certainty, decision making with multiple decision makers, and bicriterion integer programming, are also discussed.  相似文献   
68.
This article considers the problem of equipment replacement in which the replacement decision at a particular time must take into account (i) the state of the existing machine in use, (ii) the available replacement alternatives at the time, (iii) the future advances in the relevant technologies with regard to the equipment under consideration, and (iv) costs of switching between different technologies. A methodology that attains minimal forecast horizons for the problem is developed. A numerical example illustrates the methodology.  相似文献   
69.
The problem considered is that of finding the set of efficient sequences of jobs on a single machine with respect to the total flow time and the number of tardy jobs. We present some properties of an existing algorithm and the problem itself.  相似文献   
70.
This article analyzes a one-to-one ordering perishable inventory model with renewal demands and exponential lifetimes. The leadtimes are independently and exponentially distributed and the demands that occur during stock out periods are lost. Although the items are assumed to decay at a constant rate, the output process is not renewal and the Markov renewal techniques are successfully employed to obtain the operating characteristics. The problem of minimizing the long run expected cost rate is discussed and numerical values of optimal stock level are also provided. © 1996 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号