首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3340篇
  免费   82篇
  国内免费   1篇
  3423篇
  2021年   37篇
  2019年   89篇
  2018年   51篇
  2017年   81篇
  2016年   80篇
  2015年   64篇
  2014年   64篇
  2013年   703篇
  2010年   37篇
  2009年   37篇
  2008年   47篇
  2007年   52篇
  2006年   36篇
  2005年   42篇
  2004年   56篇
  2003年   42篇
  2002年   57篇
  1999年   41篇
  1998年   46篇
  1997年   51篇
  1996年   62篇
  1995年   41篇
  1994年   59篇
  1993年   63篇
  1992年   58篇
  1991年   74篇
  1990年   39篇
  1989年   72篇
  1988年   78篇
  1987年   68篇
  1986年   71篇
  1985年   65篇
  1984年   36篇
  1983年   42篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   45篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1970年   40篇
  1969年   40篇
  1968年   34篇
  1967年   34篇
排序方式: 共有3423条查询结果,搜索用时 15 毫秒
691.
This article develops a methodology for testing constant exchange risk properties and identifying an appropriate form for a decision maker's utility function. These risk properties characterize six different utility functions which are sums of products of polynomials and exponential functions. Such functional forms are commonly used in decision analysis applications. The practical advantage of this methodology is that these constant exchange risk properties eliminate the usual arbitrariness in the selection of a parametric utility function and often reduce the data requirements for subsequent estimation. The procedure is straightforward to apply. The decision maker need only provide certainty equivalents for two-outcome gambles and determine the more-preferred gamble in paired comparisons. The technical details of the procedure can be handled by interactive computer software.  相似文献   
692.
693.
A procedure for obtaining a facilities scatter diagram within a rectangular boundary is developed using a multifacility location model. This method gives favorable computational results and has the advantage over other scatter diagram methods of being able to accommodate fixed facility locations. Examples illustrate how this method can be used by a designer/analyst either as a one-step algorithm or iteratively to build a layout.  相似文献   
694.
Dirichlet mixed models find wide application. Estimation is usually achieved through the method of moments. Here we present an iterative hybrid algorithm for obtaining the maximum likelihood estimate employing both modified Newton-Raphson and E-M methods. This successful MLE algorithm enables calculation of a jack-knife MLE. Simulation comparison of the three estimates is provided. The MLE substantially improves upon the moments estimator particularly with increasing dimension. The jack-knife MLE in turn offers dramatic improvement over the MLE.  相似文献   
695.
The article considers a two-person zero-sum game in which a searcher with b bombs wishes to destroy a mobile hider. The players are restricted to move on a straight line with maximum speeds v and u satisfying v > u > 0; neither player can see the other but each knows the other's initial position. The bombs all have destructive radius R and there is a time lag T between the release of a bomb and the bomb exploding. The searcher gets 1 unit if the hider is destroyed and 0 if he survives. A solution is given for b = 1, and extended to b > 1 when the time lag is small. Various applications of the game are discussed.  相似文献   
696.
This article investigates inference for pmax, the largest cell probability in multinomial trials for the case of a small to moderate number of trials. Emphasis focuses on point and interval estimation. Both frequentist and Bayesian approaches are developed. The results of extensive simulation investigation are included as well as the analysis of a set of crime data for the city of New Orleans taken from the National Crime Survey.  相似文献   
697.
This article is a theoretic study of the following problem in verification: Mobile units under control of an agent, whom we call the HIDER, travel on a known transportation network and must at the conclusion of their itinerary report locations at fixed time intervals to a monitoring authority, whom we call the SEEKER. The purpose of this reporting requirement is to verify that illegal units do not infiltrate the network from sources under the control of the HIDER. We assume that the SEEKER has an independent intelligence-gathering capability which gives sightings of both legal and illegal units. The purpose of this article is to quantify the advantage of frequent over infrequent reporting. © 1992 John Wiley & Sons, Inc.  相似文献   
698.
We consider the problem of testing for the decreasing mean residual life ordering introduced in Kochar and Wiens [14]. We treat both the one-sample and two-sample problems. The limiting distributions of the proposed test statistics are derived. © 1993 John Wiley & Sons, Inc.  相似文献   
699.
This article considers a two-person game in which the first player has access to certain information that is valuable but unknown to the second player. The first player can distort the information before it is passed on to the second player. The purpose in distorting the information is to render it as useless as possible to the second player. Based on the distorted information received, the second player then maximizes some given objective. In certain cases he may still be able to use the distorted information, but sometimes the information has been so badly distorted that it becomes completely useless to him. © 1993 John Wiley & Sons, Inc.  相似文献   
700.
Generalized Lagrange Multipliers (GLM) are used to develop an algorithm for a type of multiproduct single period production planning problem which involves discontinuities of the fixed charge variety. Several properties of the GLM technique are developed for this class of problems and from these properties an algorithm is obtained. The problem of resolving the gaps which are exposed by the GLM procedure is considered, and an example involving a quadratic cost function is explored in detail.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号