首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283篇
  免费   48篇
  国内免费   9篇
  2021年   3篇
  2020年   2篇
  2019年   18篇
  2018年   11篇
  2017年   12篇
  2016年   14篇
  2015年   19篇
  2014年   15篇
  2013年   99篇
  2012年   11篇
  2011年   10篇
  2010年   5篇
  2009年   8篇
  2008年   9篇
  2007年   12篇
  2006年   7篇
  2005年   12篇
  2004年   8篇
  2003年   12篇
  2002年   10篇
  2001年   8篇
  2000年   11篇
  1999年   10篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
  1986年   1篇
  1984年   1篇
  1978年   1篇
  1975年   2篇
  1974年   1篇
  1972年   1篇
  1970年   1篇
排序方式: 共有340条查询结果,搜索用时 15 毫秒
111.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
112.
Reliability data obtained from life tests and degradation tests have been extensively used for purposes such as estimating product reliability and predicting warranty costs. When there is more than one candidate model, an important task is to discriminate between the models. In the literature, the model discrimination was often treated as a hypothesis test and a pairwise model discrimination procedure was carried out. Because the null distribution of the test statistic is unavailable in most cases, the large sample approximation and the bootstrap were frequently used to find the acceptance region of the test. Although these two methods are asymptotically accurate, their performance in terms of size and power is not satisfactory in small sample size. To enhance the small‐sample performance, we propose a new method to approximate the null distribution, which builds on the idea of generalized pivots. Conventionally, the generalized pivots were often used for interval estimation of a certain parameter or function of parameters in presence of nuisance parameters. In this study, we further extend the idea of generalized pivots to find the acceptance region of the model discrimination test. Through extensive simulations, we show that the proposed method performs better than the existing methods in discriminating between two lifetime distributions or two degradation models over a wide range of sample sizes. Two real examples are used to illustrate the proposed methods.  相似文献   
113.
We deal with the problem of minimizing makespan on a single batch processing machine. In this problem, each job has both processing time and size (capacity requirement). The batch processing machine can process a number of jobs simultaneously as long as the total size of these jobs being processed does not exceed the machine capacity. The processing time of a batch is just the processing time of the longest job in the batch. An approximation algorithm with worst‐case ratio 3/2 is given for the version where the processing times of large jobs (with sizes greater than 1/2) are not less than those of small jobs (with sizes not greater than 1/2). This result is the best possible unless P = NP. For the general case, we propose an approximation algorithm with worst‐case ratio 7/4. A number of heuristics by Uzosy are also analyzed and compared. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 226–240, 2001  相似文献   
114.
We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP‐hard and develop a heuristic algorithm based on formulating the problem as an assignment problem. The effectiveness of the heuristic is analyzed from both worst‐case and computational points of view. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 363–385, 2001  相似文献   
115.
建立了惰性气体中电爆丝爆炸激励的冲击波模型。对于冲击波马赫数与光辐射强度的关系、惰性气体种类对冲击波强度的影响以及电爆丝根数对冲击波强度的影响,进行了理论计算与分析,所得结论对红外脉冲强光辐射源的研究有重要作用。  相似文献   
116.
We consider scheduling problems involving two agents (agents A and B), each having a set of jobs that compete for the use of a common machine to process their respective jobs. The due dates of the A‐jobs are decision variables, which are determined by using the common (CON) or slack (SLK) due date assignment methods. Each agent wants to minimize a certain performance criterion depending on the completion times of its jobs only. Under each due date assignment method, the criterion of agent A is always the same, namely an integrated criterion consisting of the due date assignment cost and the weighted number of tardy jobs. Several different criteria are considered for agent B, including the maxima of regular functions (associated with each job), the total (weighted) completion time, and the weighted number of tardy jobs. The overall objective is to minimize the performance criterion of agent A, while keeping the objective value of agent B no greater than a given limit. We analyze the computational complexity, and devise polynomial or pseudo‐polynomial dynamic programming algorithms for the considered problems. We also convert, if viable, any of the devised pseudopolynomial dynamic programming algorithms into a fully polynomial‐time approximation scheme. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 416–429, 2016  相似文献   
117.
We present the green telecommunication network planning problem with switchable base stations, where the location and configuration of the base stations are optimized, while taking into account uncertainty and variability of demand. The problem is formulated as a two‐stage stochastic program under demand uncertainty with integers in both stages. Since solving the presented problem is computationally challenging, we develop the corresponding Dantzig‐Wolfe reformulation and propose a solution approach based on column generation. Comprehensive computational results are provided for instances of varying characteristics. The results show that the joint location and dynamic switching of base stations leads to significant savings in terms of energy cost. Up to 30% reduction in power consumption cost is achieved while still serving all users. In certain cases, allowing dynamic configurations leads to more installed base stations and higher user coverage, while having lower total energy consumption. The Dantzig‐Wolfe reformulation provides solutions with a tight LP‐gap eliminating the need for a full branch‐and‐price scheme. Furthermore, the proposed column generation solution approach is computationally efficient and outperforms CPLEX on the majority of the tested instances. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 351–366, 2016  相似文献   
118.
In this article, we study a two‐level lot‐sizing problem with supplier selection (LSS), which is an NP‐hard problem arising in different production planning and supply chain management applications. After presenting various formulations for LSS, and computationally comparing their strengths, we explore the polyhedral structure of one of these formulations. For this formulation, we derive several families of strong valid inequalities, and provide conditions under which they are facet‐defining. We show numerically that incorporating these valid inequalities within a branch‐and‐cut framework leads to significant improvements in computation. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 647–666, 2017  相似文献   
119.
Critics of globalisation suggest that growing free-market conditions generate anomie, leading ultimately to what some term ‘new wars’ and new insecurities. Others argue that liberal economies dissuade violence since people gain from peace. This study argues for a micro perspective that views predatory economic policies driving higher investment in rebellion-specific capital, such as shadow economic activity that easily translates into insurgency in weak-state settings. Investment in the shadows determines survivability against superior state forces, and survivability determines rebellion, by definition. Using civil war onset data from 1970 to 2013, as well as the Global Peace Index (GPI) and several of its individual components, which capture societal insecurity above and beyond the absence of armed violence, this study finds that countries that are more capitalistic have a lower risk of civil war and societal insecurity. The results are robust to alternative models, testing methods, and uphold when examining several relevant subcomponents of the index, such as internal conflict, violent crime, homicides, ease of access to small arms, and political instability. Surprisingly, democracy tends not to be associated with peace but associates with increased criminality whereas strong autocracy reduces it, suggesting that capitalism, more than democracy, associates with conditions favourable to societal security, independently of a country’s level of development.  相似文献   
120.
Why do countries have air forces? Organizational alternatives, such as maintaining separate air arms for the army and navy, have become quite rare. The conventional narrative advanced by advocates of independent air forces stress that the primacy of airpower in modern warfare mandates centralized control of most military aviation. In this view, political–military uncertainty has driven mimetic isomorphism – pressure on national governments to organize as others organize so as to fight or deter war just as effectively. However, working from a set of 56 countries that were politically independent within a few years of the establishment of the first ever independent air force (the Royal Air Force) in 1918, and continuing through nearly the present, there is no clear pattern of external military pressure prompting this particular reorganization. Rather, from anecdotal evidence, the cause has more likely been normative isomorphism – a professional craving to look as others look to foster political or personal legitimacy. For whatever reason, though, choices of structures tend to lead to specific choices of policies. Thus, the result suggests that defense ministries looking for more effective or less costly organizational schemas may reasonably consider alternatives to the tripartite army–navy–air force structure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号