全文获取类型
收费全文 | 264篇 |
免费 | 5篇 |
出版年
2019年 | 8篇 |
2018年 | 10篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 71篇 |
2012年 | 2篇 |
2011年 | 3篇 |
2009年 | 4篇 |
2007年 | 2篇 |
2005年 | 3篇 |
2004年 | 3篇 |
2003年 | 8篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 7篇 |
1987年 | 4篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1974年 | 6篇 |
1973年 | 4篇 |
1972年 | 5篇 |
1971年 | 5篇 |
1970年 | 3篇 |
1969年 | 6篇 |
1968年 | 3篇 |
1966年 | 1篇 |
1948年 | 1篇 |
排序方式: 共有269条查询结果,搜索用时 0 毫秒
71.
72.
In this article we address the question of developing deep cuts for disjunctive programs using rectilinear distance measures. The method is applied to linear complementarity problems where the matrix M need not be copositive plus. Some modifications that are needed as a computational expediency are discussed. The computation results for matrix M of size up to 30 × 30 are discussed. 相似文献
73.
Sequential tests for the product of Poisson parameters based on the generalized incomplete modified Bessel (g.i.m.B.) distributions are given. Applications to reliability and biometry are indicated. 相似文献
74.
75.
Gerald G. Brown Kelly J. Cormican Siriphong Lawphongpanich Daniel B. Widdis 《海军后勤学研究》1997,44(4):301-318
Submarine berthing plans reserve mooring locations for inbound U.S. Navy nuclear submarines prior to their port entrance. Once in port, submarines may be shifted to different berthing locations to allow them to better receive services they require or to make way for other shifted vessels. However, submarine berth shifting is expensive, labor intensive, and potentially hazardous. This article presents an optimization model for submarine berth planning and demonstrates it with Naval Submarine Base, San Diego. After a berthing plan has been approved and published, changed requests for services, delays, and early arrival of inbound submarines are routine events, requiring frequent revisions. To encourage trust in the planning process, the effect on the solution of revisions in the input is kept small by incorporating a persistence incentive in the optimization model. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 301–318, 1997. 相似文献
76.
Multiple-facility loading (MFL) involves the allocation of products among a set of finite-capacity facilities. Applications of MFL arise naturally in a variety of production scheduling environments. MFL models typically assume that capacity is consumed as a linear function of products assigned to a facility. Product similarities and differences, however, result in capacity-based economies or diseconomies of scope, and thus the effective capacity of the facility is often a (nonlinear) function of the set of tasks assigned to the facility. This article addresses the multiple-facility loading problem under capacity-based economies (and diseconomies) of scope (MFLS). We formulate MFLS as a nonlinear 0–1 mixed-integer programming problem, and we discuss some useful properties. MFLS generalizes many well-known combinatorial optimization problems, such as the capacitated facility location problem and the generalized assignment problem. We also define a tabu-search heuristic and a branch-and-bound algorithm for MFLS. The tabu-search heuristic alternates between two search phases, a regional search and a diversification search, and offers a novel approach to solution diversification. We also report computational experience with the procedures. In addition to demonstrating MFLS problem tractability, the computational results indicate that the heuristic is an effective tool for obtaining high-quality solutions to MFLS. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 229–256, 1997 相似文献
77.
A system is subject to shocks that arrive according to a nonhomogeneous Poisson process. As shocks occur a system has two types of failures. Type 1 failure (minor failure) is removed by a minimal repair, whereas type 2 failure (catastrophic failure) is removed by replacement. The probability of a type 2 failure is permitted to depend on the number of shocks since the last replacement. A system is replaced at the times of type 2 failure or at the nth type 1 failure, whichever comes first. The optimal policy is to select n* to minimize the expected cost per unit time for an infinite time span. A numerical example is given to illustrate the method. © 1996 John Wiley & Sons, Inc. 相似文献
78.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other. 相似文献
79.
Marjolein B.A. van Asselt 《Contemporary Security Policy》2018,39(4):590-600
While security points to a deliberate harming of humans and/or the environment, safety refers to unintended damage. In this view point, I will analyse how the distinction between safety and security matters in the practice of accident investigation and I will argue that the division between the fields is problematic for the assessment of security-related safety risks. Drawing on the case of the our accident investigation into the downing of flight MH17 above Ukraine in 2014, I highlight key dilemmas the Dutch Safety Board dealt with. 相似文献
80.
The rise of China has been fuelled by a massive military modernisation programme relying, in large part, on the acquisition of foreign military equipment. The question of how the world’s major powers define their arms transfer policies towards China is therefore crucially important. This article makes two original contributions. First, drawing on neoclassical realism, it proposes an explanatory framework integrating international and domestic factors to explain variations in major powers’ arms transfers. Second, based on a large body of elite interviews and diplomatic cables, it offers the first comprehensive comparison of American, British, French and Russian arms transfer policies towards China since the end of the Cold War. 相似文献