首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   683篇
  免费   12篇
  695篇
  2021年   8篇
  2019年   15篇
  2018年   10篇
  2017年   15篇
  2016年   12篇
  2015年   13篇
  2013年   133篇
  2011年   6篇
  2010年   8篇
  2008年   6篇
  2007年   9篇
  2006年   9篇
  2005年   15篇
  2004年   10篇
  2003年   8篇
  2000年   11篇
  1999年   8篇
  1998年   5篇
  1997年   9篇
  1996年   16篇
  1995年   9篇
  1994年   15篇
  1993年   8篇
  1992年   10篇
  1991年   18篇
  1990年   10篇
  1989年   17篇
  1988年   11篇
  1987年   15篇
  1986年   16篇
  1985年   14篇
  1984年   10篇
  1983年   10篇
  1982年   14篇
  1981年   9篇
  1980年   14篇
  1979年   9篇
  1978年   10篇
  1977年   10篇
  1976年   10篇
  1975年   9篇
  1974年   15篇
  1973年   13篇
  1972年   14篇
  1971年   19篇
  1970年   6篇
  1969年   10篇
  1968年   7篇
  1967年   5篇
  1948年   5篇
排序方式: 共有695条查询结果,搜索用时 0 毫秒
331.
332.
Modification of algorithms designed for scalar computing, to take advantage of vector processing, raises several challenges. This article presents the vectorization of the primal simplex based network algorithm and results in a 50% improvement in computational time. One of the major contributors to this improvement is the matching of the size of the pricing candidate list to the vector register size. The side constraints are relaxed into a single surrogate constraint. The single constraint network algorithm is vectorized and used as the basis for solving large-scale constrained network problems. Computational experiments are presented which illustrate the vectorization of the network code as well as the ability of the surrogate constraint approach to deal with large constrained network problems.  相似文献   
333.
Hollander, Park, and Proschan define a survival function S of a positive random variable X to be new better than used at age t0 (NBU-{t0}) if S satisfies $ \begin{array}{*{20}c} {\frac{{S(x + t_0)}}{{S\left({t_0} \right)}} \le S\left(x \right),} & {{\rm for}\,{\rm all}\,x\, \ge \,0,} \\ \end{array}$ where S(x) = P(X > x). The NBU-{t0} class is a special case of the NBU-A family of survival distributions, where A is a subset of [0, ∞). These families introduce a variety of modeling possibilities for use in reliability studies. We treat problems of nonparametric estimation of survival functions from these classes by estimators which are themselves members of the classes of interest. For a number of such classes, a recursive estimation technique is shown to produce closed-form estimators which are strongly consistent and converge to the true survival distribution at optimal rates. For other classes, additional assumptions are required to guarantee the consistency of recursive estimators. As an example of the latter case, we demonstrate the consistency of a recursive estimator for S ∈ NBU-[t0, ∞) based on lifetime data from items surviving a preliminary “burn-in” test. The relative precision of the empirical survival curve and several recursive estimators of S are investigated via simulation; the results provide support for the claim that recursive estimators are superior to the empirical survival curve in restricted nonparametric estimation problems of the type studied here.  相似文献   
334.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
335.
A counterexample is given to demonstrate that previously proposed necessary conditions for the bilevel programming problem are not correct. An interpretation of the difficulty is given by appealing to a “theorem of alternative” result presented in the original work.  相似文献   
336.
The optimal linear combination of control variates is well known when the controls are assumed to be unbiased. We derive here the optimal linear combination of controls in the situation where asymptotically negligible bias is present. The small-sample linear control which minimizes the mean square error (MSE) is derived. When the optimal asymptotic linear control is used rather than the optimal small-sample control, the degradation in MSE is c/n3, where n is the sample size and c is a known constant. This analysis is particulary relevant to the small-sample theory for control variates as applied to the steady-state estimation problem. Results for the method of multiple estimates are also given.  相似文献   
337.
This paper considers the scheduling problem to minimize total tardiness given multiple machines, ready times, sequence dependent setups, machine downtime and scarce tools. We develop a genetic algorithm based on random keys representation, elitist reproduction, Bernoulli crossover and immigration type mutation. Convergence of the algorithm is proved. We present computational results on data sets from the auto industry. To demonstrate robustness of the approach, problems from the literature of different structure are solved by essentially the same algorithm. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 199–211, 1999  相似文献   
338.
339.
The provisions of the 1999 Constitution, which recognises the existence of a single police force and forbids parallel police organisations, have oftentimes generated controversies among actors in the Nigerian federal polity. Rising insecurity precipitates lingering questions on the utility and adequacy of a single, highly centralised and centrally controlled police force given Nigeria’s geographic vastness and demographic diversity. Conversely, arguments have also dwelt on the dangers of fragmentation considering Nigeria’s psychosocial, economic and political nature. This article attempts to balance these arguments by analysing policing and the operations of the Nigeria Police Force (NPF) through the lens of the subsidiarity principle. Subsidiarity is a governance principle in federations, captured in the founding documents of the European Union (EU), which prescribes that governmental powers, authorities and duties should be held by the tier that can best perform them equitably, efficiently, effectively, suitably and based on interest and need. Drawing largely on interviews with purposively selected police scholars, political actors, civil society organisations and police personnel, the paper contends that this principle offers a pragmatic solution to the perennial problems of intergovernmental frictions on the use of the police within the context of governance in the Nigerian federation.  相似文献   
340.
The malaise that the United States, and the West, have experienced in recent campaigns stems in large part from unclear thinking about war, its political essence, and the strategies needed to join the two. Instead, analysis and response are predicated on entrenched theoretical concepts with limited practical utility. The inadequacy of understanding has spawned new, and not so new, terms to capture unanticipated trends, starting with the re-discovery of “insurgency” and “counterinsurgency” and leading to discussion of “hybrid threats” and “gray-zone” operations. New terminology can help, but the change must go deeper. Challenging analytical orthodoxy, this article sets out a unifying approach for the study of political violence, or more accurately: violent politics. It provides a conceptual foundation that helps to make sense of recent shifts in warfare. In effect, it offers sorely needed theoretical insights into the nature of strategy and guides the process of responding to nontraditional threats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号