全文获取类型
收费全文 | 768篇 |
免费 | 15篇 |
出版年
2019年 | 15篇 |
2017年 | 21篇 |
2016年 | 13篇 |
2015年 | 16篇 |
2014年 | 16篇 |
2013年 | 159篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 10篇 |
2009年 | 12篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 13篇 |
2003年 | 8篇 |
2002年 | 12篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 11篇 |
1995年 | 8篇 |
1994年 | 18篇 |
1993年 | 16篇 |
1992年 | 11篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 20篇 |
1987年 | 20篇 |
1986年 | 21篇 |
1985年 | 17篇 |
1984年 | 9篇 |
1983年 | 10篇 |
1982年 | 15篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1978年 | 13篇 |
1976年 | 9篇 |
1975年 | 8篇 |
1974年 | 12篇 |
1973年 | 12篇 |
1972年 | 13篇 |
1971年 | 10篇 |
1970年 | 12篇 |
1969年 | 10篇 |
1968年 | 9篇 |
1967年 | 8篇 |
排序方式: 共有783条查询结果,搜索用时 31 毫秒
71.
A general age replacement is introduced which incorporates minimal repair, planned and unplanned replacements, and costs which depend on time. Finite and infinite horizon results are obtained. Various special cases are considered. Furthermore, a shock model with general cost structure is considered. 相似文献
72.
A. W. Kemp 《海军后勤学研究》1987,34(6):853-858
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system. 相似文献
73.
A system of two parallel queues where the arrivals from a single stream of customers join the shorter queue is considered. Arrivals form a homogeneous Poisson stream and the service times in each of the two queues are independent exponential variates. By treating one of the queues as bounded, the steady-state probability vector for the system can be expressed in a modified matrix-geometric form and can be computed efficiently. Computational procedures for the sojourn time distribution and characteristics of the departure stream are developed. Some numerical results are presented, and based on these results an efficient approximation scheme for the model is developed which can be readily extended to systems with more than two parallel queues. 相似文献
74.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
75.
Vendor‐managed revenue‐sharing arrangements are common in the newspaper and other industries. Under such arrangements, the supplier decides on the level of inventory while the retailer effectively operates under consignment, sharing the sales revenue with his supplier. We consider the case where the supplier is unable to predict demand, and must base her decisions on the retailer‐supplied probabilistic forecast for demand. We show that the retailer's best choice of a distribution to report to his supplier will not be the true demand distribution, but instead will be a degenerate distribution that surprisingly induces the supplier to provide the system‐optimal inventory quantity. (To maintain credibility, the retailer's reports of daily sales must then be consistent with his supplied forecast.) This result is robust under nonlinear production costs and nonlinear revenue‐sharing. However, if the retailer does not know the supplier's production cost, the forecast “improves” and could even be truthful. That, however, causes the supplier's order quantity to be suboptimal for the overall system. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
76.
77.
78.
79.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method. 相似文献
80.
This paper examines the impact of military expenditure on economic growth on a large balanced panel, using an exogenous growth model and dynamic panel data methods for 106 countries over the period 1988–2010. A major focus of the paper is to consider the possibility group heterogeneity and non-linearity. Having estimated the model for all of the countries in the panel and finding that military burden has a negative effect on growth in the short and long run, the panel is broken down into various groupings based upon a range of potentially relevant factors, and the robustness of the results is evaluated. The factors considered are different levels of income, conflict experience, natural resources abundance, openness and aid. The estimates for the different groups are remarkably consistent with those for the whole panel, providing strong support for the argument that military spending has adverse effects on growth. There are, however, some intriguing results that suggest that for certain types of countries military spending has no significant effect on growth. 相似文献