首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   314篇
  免费   1篇
  315篇
  2021年   4篇
  2020年   5篇
  2019年   12篇
  2018年   5篇
  2017年   8篇
  2016年   8篇
  2015年   3篇
  2014年   4篇
  2013年   47篇
  2010年   4篇
  2009年   3篇
  2008年   7篇
  2004年   5篇
  2003年   4篇
  2002年   3篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   4篇
  1994年   2篇
  1993年   4篇
  1992年   5篇
  1991年   8篇
  1990年   5篇
  1989年   9篇
  1988年   8篇
  1987年   7篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   4篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
  1966年   6篇
排序方式: 共有315条查询结果,搜索用时 15 毫秒
81.
In this paper we consider dual angular and angular structured mixed integer programs which arise in some practical applications. For these problems we describe efficient methods for generating a desirable set of Benders' cuts with which one may initialize the partitioning scheme of Benders. Our research is motivated by the computational experience of McDaniel and Devine who have shown that the set of Benders' cuts which are binding at the optimum to the linear relaxation of the mixed integer program, play an important role in determining an optimal mixed integer solution. As incidental results in our development, we provide some useful remarks regarding Benders' and Dantzig-Wolfe's decomposition procedures. The computational experience reported seems to support the expedients recommended in this paper.  相似文献   
82.
This paper considers the problem of finding optimal solutions to a class of separable constrained extremal problems involving nonlinear functionals. The results are proved for rather general situations, but they may be easily stated for the case of search for a stationary object whose a priori location distribution is given by a density function on R, a subset of Euclidean n-space. The functional to be optimized in this case is the probability of detection and the constraint is on the amount of effort to be used Suppose that a search of the above type is conducted in such a manner as to produce the maximum increase in probability of detection for each increment of effort added to the search. Then under very weak assumptions, it is proven that this search will produce an optimal allocation of the total effort involved. Under some additional assumptions, it is shown that any amount of search effort may be allocated in an optimal fashion.  相似文献   
83.
A single machine is available to process a collection of stochastic jobs. There may be technological constraints on the job set. The machine sometimes breaks down. Costs are incurred and rewards are earned during processing. We seek strategies for processing the jobs which maximize the total expected reward earned.  相似文献   
84.
85.
Full‐system testing for large‐scale systems is often infeasible or very costly. Thus, when estimating system reliability, it is desirable to use a method that uses subsystem tests, which are often less expensive and more feasible. This article presents a method for bounding full‐system reliabilities based on subsystem tests and, if available, full‐system tests. The method does not require that subsystems be independent. It accounts for dependencies through the use of certain probability inequalities. The inequalities provide the basis for valid reliability calculations while not requiring independent subsystems or full‐system tests. The inequalities allow for test information on pairwise subsystem failure modes to be incorporated, thereby improving the bound on system reliability. We illustrate some of the properties of the estimates via an example application. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
86.
Dying to Win is one of the most important works on suicide terrorism. It purports to unravel the strategic, social, and individual logic that gives suicide terrorism its coercive value. The methodology that Pape uses to support his various assertions is problematic for three reasons. First, he defines his key terms in such a way as to artificially set suicide terrorism apart from other forms of political violence. Second, in a number of cases Pape selects data from single sources to support particular assertions when other sources of data, used together, could provide more rigorous and useful insights into the phenomenon of suicide bombing. Finally, Pape codes his data on suicide attacks according to a loose set of criteria which, if recoded, calls into question some of his broader conclusions about the strategic utility of suicide terrorism campaigns.  相似文献   
87.
88.
89.
90.
The stage may be set for what could be a historic turning point in America's reliance on nuclear weapons to meet its fundamental national security interests. Proponents of a refurbished nuclear stockpile and infrastructure are convinced that nuclear weapons will remain central to U.S. security interests, yet they admit that there is no national consensus on the need for and role of nuclear weapons. Nuclear opponents are gravely concerned that to the extent nuclear refurbishment creates a global perception that nuclear weapons remain essential instruments, it will eviscerate nuclear nonproliferation measures precisely at a time when nuclear ambitions are growing. Moreover, opponents see deterrence through advanced conventional weapons as decisively more credible than any nuclear alternative. With hopes of elevating discourse to the national level, this article examines the key current arguments pro and con within the specialist community and forecasts changes in the U.S. nuclear arsenal over the next decade. It concludes with a brief prognosis on prospects for complete nuclear disarmament.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号