首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   768篇
  免费   15篇
  2019年   15篇
  2017年   21篇
  2016年   13篇
  2015年   16篇
  2014年   16篇
  2013年   159篇
  2012年   6篇
  2011年   6篇
  2010年   10篇
  2009年   12篇
  2008年   7篇
  2007年   8篇
  2006年   10篇
  2005年   12篇
  2004年   13篇
  2003年   8篇
  2002年   12篇
  2000年   9篇
  1999年   8篇
  1998年   12篇
  1997年   6篇
  1996年   11篇
  1995年   8篇
  1994年   18篇
  1993年   16篇
  1992年   11篇
  1991年   18篇
  1990年   10篇
  1989年   17篇
  1988年   20篇
  1987年   20篇
  1986年   21篇
  1985年   17篇
  1984年   9篇
  1983年   10篇
  1982年   15篇
  1981年   9篇
  1980年   10篇
  1979年   11篇
  1978年   13篇
  1976年   9篇
  1975年   8篇
  1974年   12篇
  1973年   12篇
  1972年   13篇
  1971年   10篇
  1970年   12篇
  1969年   10篇
  1968年   9篇
  1967年   8篇
排序方式: 共有783条查询结果,搜索用时 31 毫秒
71.
A general age replacement is introduced which incorporates minimal repair, planned and unplanned replacements, and costs which depend on time. Finite and infinite horizon results are obtained. Various special cases are considered. Furthermore, a shock model with general cost structure is considered.  相似文献   
72.
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system.  相似文献   
73.
A system of two parallel queues where the arrivals from a single stream of customers join the shorter queue is considered. Arrivals form a homogeneous Poisson stream and the service times in each of the two queues are independent exponential variates. By treating one of the queues as bounded, the steady-state probability vector for the system can be expressed in a modified matrix-geometric form and can be computed efficiently. Computational procedures for the sojourn time distribution and characteristics of the departure stream are developed. Some numerical results are presented, and based on these results an efficient approximation scheme for the model is developed which can be readily extended to systems with more than two parallel queues.  相似文献   
74.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
75.
Vendor‐managed revenue‐sharing arrangements are common in the newspaper and other industries. Under such arrangements, the supplier decides on the level of inventory while the retailer effectively operates under consignment, sharing the sales revenue with his supplier. We consider the case where the supplier is unable to predict demand, and must base her decisions on the retailer‐supplied probabilistic forecast for demand. We show that the retailer's best choice of a distribution to report to his supplier will not be the true demand distribution, but instead will be a degenerate distribution that surprisingly induces the supplier to provide the system‐optimal inventory quantity. (To maintain credibility, the retailer's reports of daily sales must then be consistent with his supplied forecast.) This result is robust under nonlinear production costs and nonlinear revenue‐sharing. However, if the retailer does not know the supplier's production cost, the forecast “improves” and could even be truthful. That, however, causes the supplier's order quantity to be suboptimal for the overall system. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
76.
77.
78.
79.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
80.
This paper examines the impact of military expenditure on economic growth on a large balanced panel, using an exogenous growth model and dynamic panel data methods for 106 countries over the period 1988–2010. A major focus of the paper is to consider the possibility group heterogeneity and non-linearity. Having estimated the model for all of the countries in the panel and finding that military burden has a negative effect on growth in the short and long run, the panel is broken down into various groupings based upon a range of potentially relevant factors, and the robustness of the results is evaluated. The factors considered are different levels of income, conflict experience, natural resources abundance, openness and aid. The estimates for the different groups are remarkably consistent with those for the whole panel, providing strong support for the argument that military spending has adverse effects on growth. There are, however, some intriguing results that suggest that for certain types of countries military spending has no significant effect on growth.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号