首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375篇
  免费   13篇
  国内免费   1篇
  2021年   3篇
  2019年   15篇
  2018年   14篇
  2017年   9篇
  2016年   8篇
  2015年   4篇
  2014年   10篇
  2013年   87篇
  2012年   3篇
  2010年   6篇
  2007年   8篇
  2006年   5篇
  2005年   11篇
  2004年   7篇
  2003年   4篇
  2002年   8篇
  2000年   2篇
  1999年   4篇
  1998年   8篇
  1997年   8篇
  1996年   4篇
  1995年   5篇
  1994年   9篇
  1993年   11篇
  1992年   7篇
  1991年   8篇
  1990年   7篇
  1989年   7篇
  1988年   8篇
  1987年   4篇
  1986年   5篇
  1985年   8篇
  1984年   4篇
  1983年   2篇
  1982年   5篇
  1981年   5篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
  1974年   5篇
  1973年   7篇
  1972年   4篇
  1969年   3篇
  1968年   5篇
  1967年   2篇
  1966年   4篇
  1948年   2篇
排序方式: 共有389条查询结果,搜索用时 15 毫秒
371.
This paper provides an overview of the Computer-Assisted Search Planning (CASP) system developed for the United States Coast Guard. The CASP information processing methodology is based upon Monte Carlo simulation to obtain an initial probability distribution for target location and to update this distribution to account for drift due to currents and winds. A multiple scenario approach is employed to generate the initial probability distribution. Bayesian updating is used to reflect negative information obtained from unsuccessful search. The principal output of the CASP system is a sequence of probability “maps” which display the current target location probability distributions throughout the time period of interest. CASP also provides guidance for allocating search effort based upon optimal search theory.  相似文献   
372.
A general result for obtaining recurrence relations between single moments of order statistics is obtained and has been used to establish the recurrence relations between moments of some doubly truncated distributions. The examples considered are Weibull, exponential, Pareto, power function, Cauchy, and logistic. Recurrence relations are also obtained for nontruncated gamma and beta distributions.  相似文献   
373.
374.
375.
376.
Book reviews     
America's Secret Power: the CIA in a Democratic Society. By Loch K. Johnson. Oxford University Press, New York (1989), ISBN 0–19–505490–3, $24.95

The Bundeswehr and Western Security. Edited by Stephen F. Szabo. Houndmills, Basingstoke, and Macmillan, London (1990), ISBN 0–333–49880–1, £45.00

Symbolic Defense: the Cultural Significance of the Strategic Defense Initiative. By Edward Tabor Linenthal. University of Illinois Press, Chicago, IL (1989), ISBN 0–252–01619‐X, $19.95

Rethinking European Security. Edited by Furio Cerutti and Rodolfo Ragionieri. Crane Russak, New York (1990), £29.00

Alternative Conventional Defense Postures in the European Theater, Vol. 1: The Military Balance and Domestic Constraints. Edited by Hans Günter Brauch and Robert Kennedy, Crane Russak, New York (1990), £32.00

The Gulf War. Edited by Hanns Maull and Otto Pick. Pinter, London (1989), ISBN 0–86187–763–2, £36.00  相似文献   

377.
378.
379.
In this paper we describe an approach to the scheduling and/or real-time control of sorting operations in the presence of deadlines. The problem arises in the postal service where mail has to be sorted by zip codes, and in the banking system where checks have to be sorted according to the bank on which they are drawn. In both applications losses are incurred if items miss their clearing deadlines. For example, in check-sorting an extremely important objective of the control system is to reduce the “float” i.e., the total dollar value of the checks which miss their deadlines. The proposed real-time control system utilizes a linear program which chooses between alternative sort-patterns and assigns the various processing steps to the time periods between deadlines.  相似文献   
380.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号