全文获取类型
收费全文 | 393篇 |
免费 | 8篇 |
专业分类
401篇 |
出版年
2020年 | 3篇 |
2019年 | 8篇 |
2018年 | 6篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 7篇 |
2014年 | 4篇 |
2013年 | 99篇 |
2011年 | 5篇 |
2009年 | 7篇 |
2008年 | 5篇 |
2007年 | 4篇 |
2006年 | 3篇 |
2005年 | 9篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 10篇 |
1995年 | 4篇 |
1994年 | 8篇 |
1993年 | 5篇 |
1992年 | 6篇 |
1991年 | 14篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 8篇 |
1986年 | 10篇 |
1985年 | 13篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 6篇 |
1975年 | 5篇 |
1974年 | 5篇 |
1973年 | 4篇 |
1972年 | 14篇 |
1971年 | 6篇 |
1970年 | 8篇 |
1969年 | 7篇 |
1968年 | 5篇 |
1967年 | 5篇 |
1966年 | 3篇 |
排序方式: 共有401条查询结果,搜索用时 15 毫秒
391.
We present a computationally efficient procedure to determine control policies for an infinite horizon Markov Decision process with restricted observations. The optimal policy for the system with restricted observations is a function of the observation process and not the unobservable states of the system. Thus, the policy is stationary with respect to the partitioned state space. The algorithm we propose addresses the undiscounted average cost case. The algorithm combines a local search with a modified version of Howard's (Dynamic programming and Markov processes, MIT Press, Cambridge, MA, 1960) policy iteration method. We demonstrate empirically that the algorithm finds the optimal deterministic policy for over 96% of the problem instances generated. For large scale problem instances, we demonstrate that the average cost associated with the local optimal policy is lower than the average cost associated with an integer rounded policy produced by the algorithm of Serin and Kulkarni Math Methods Oper Res 61 (2005) 311–328. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
392.
This article develops a mathematical model and heuristic algorithm to design recreational boating mooring fields. The boating industry is important to the Florida economy, and boat storage is becoming a concern among those in the industry. The mooring field design problem is formulated to maximize the total number of boat feet moored in the mooring field. In the model, we allow two adjacent moorings to overlap, which introduces a risk that under certain conditions the boats on these moorings could contact each other. We identify the conditions when contact is possible and quantify the probability of contact. The mooring field design problem is formulated as a nonlinear mixed‐integer programming problem. To solve the problem, we decompose it into two separate models, a mooring radii assignment model and a mooring layout model, which are solved sequentially. The first is solved via exhaustive enumeration and the second via a depth‐first search algorithm. Two actual mooring fields are evaluated, and in both cases our model leads to better layouts than ones experts developed manually. The mooring field design model rationalizes the mooring field design and shows that in one case by increasing the risk from 0 to 1%, the mooring efficiency increases from 74.8% to 96.2%. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
393.
In an accumulation game, a HIDER attempts to accumulate a certain number of objects or a certain quantity of material before a certain time, and a SEEKER attempts to prevent this. In a continuous accumulation game the HIDER can pile material either at locations $1, 2, …, n, or over a region in space. The HIDER will win (payoff 1) it if accumulates N units of material before a given time, and the goal of the SEEKER will win (payoff 0) otherwise. We assume the HIDER can place continuous material such as fuel at discrete locations i = 1, 2, …, n, and the game is played in discrete time. At each time k > 0 the HIDER acquires h units of material and can distribute it among all of the locations. At the same time, k, the SEEKER can search a certain number s < n of the locations, and will confiscate (or destroy) all material found. After explicitly describing what we mean by a continuous accumulation game on discrete locations, we prove a theorem that gives a condition under which the HIDER can always win by using a uniform distribution at each stage of the game. When this condition does not hold, special cases and examples show that the resulting game becomes complicated even when played only for a single stage. We reduce the single stage game to an optimization problem, and also obtain some partial results on its solution. We also consider accumulation games where the locations are arranged in either a circle or in a line segment and the SEEKER must search a series of adjacent locations. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 60–77, 2002; DOI 10.1002/nav.1048 相似文献
394.
Benjamin E. Bagozzi 《Civil Wars》2015,17(1):1-24
Advances in the study of civil war have led to the proliferation of event count data, and to a corresponding increase in the use of (zero-inflated) count models for the quantitative analysis of civil conflict events. Our ability to effectively use these techniques is met with two current limitations. First, researchers do not yet have a definitive answer as to whether zero-inflated count models are a verifiably better approach to civil conflict modeling than are ‘less assuming’ approaches such as negative binomial count models. Second, the accurate analysis of conflict-event counts with count models – zero-inflated or otherwise – is severely limited by the absence of an effective framework for the evaluation of predictive accuracy, which is an empirical approach that is of increasing importance to conflict modelers. This article rectifies both of these deficiencies. Specifically, this study presents count forecasting techniques for the evaluation and comparison of count models' predictive accuracies. Using these techniques alongside out-of-sample forecasts, it then definitively verifies – for the first time – that zero-inflated count models are superior to comparable non-inflated models for the study of intrastate conflict events. 相似文献
395.
Michael E. Smith 《Contemporary Security Policy》2016,37(3):446-460
The EU Global Strategy (EUGS) is a broad and ambitious document in terms of its geographic scope and thematic priorities. However, the EU cannot devote equal attention to all aspects of the EUGS; so there is still scope for more clarity regarding the EU’s core strategic aims. This article argues that in addition to fostering internal cohesion, the EU’s strategic priority must involve stabilizing its own neighbourhood. This task has challenged the EU for decades because of an inherent credibility deficit regarding the EU’s own capabilities, yet the EUGS does not diagnose and remedy this problem as effectively as it could have. Therefore much more work will need to be done in terms of reforming EU institutions and developing common capabilities if the EU hopes to achieve its central internal and external security goals as outlined in the EUGS and related policy statements. 相似文献
396.
Approximation schemes for single‐machine scheduling with a fixed maintenance activity to minimize the total amount of late work 下载免费PDF全文
We consider the problem of scheduling n independent and simultaneously available jobs without preemption on a single machine, where the machine has a fixed maintenance activity. The objective is to find the optimal job sequence to minimize the total amount of late work, where the late work of a job is the amount of processing of the job that is performed after its due date. We first discuss the approximability of the problem. We then develop two pseudo‐polynomial dynamic programming algorithms and a fully polynomial‐time approximation scheme for the problem. Finally, we conduct extensive numerical studies to evaluate the performance of the proposed algorithms. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 172–183, 2016 相似文献
397.
Algorithm to solve a chance‐constrained network capacity design problem with stochastic demands and finite support 下载免费PDF全文
Kathryn M. Schumacher Richard Li‐Yang Chen Amy E.M. Cohn Jeremy Castaing 《海军后勤学研究》2016,63(3):236-246
We consider the problem of determining the capacity to assign to each arc in a given network, subject to uncertainty in the supply and/or demand of each node. This design problem underlies many real‐world applications, such as the design of power transmission and telecommunications networks. We first consider the case where a set of supply/demand scenarios are provided, and we must determine the minimum‐cost set of arc capacities such that a feasible flow exists for each scenario. We briefly review existing theoretical approaches to solving this problem and explore implementation strategies to reduce run times. With this as a foundation, our primary focus is on a chance‐constrained version of the problem in which α% of the scenarios must be feasible under the chosen capacity, where α is a user‐defined parameter and the specific scenarios to be satisfied are not predetermined. We describe an algorithm which utilizes a separation routine for identifying violated cut‐sets which can solve the problem to optimality, and we present computational results. We also present a novel greedy algorithm, our primary contribution, which can be used to solve for a high quality heuristic solution. We present computational analysis to evaluate the performance of our proposed approaches. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 236–246, 2016 相似文献
398.
399.
GORDON JE 《Military review》1949,28(12):27; passim
400.
Amy E. Eckert 《Journal of Military Ethics》2020,19(2):84-98
ABSTRACT The legitimate authority principle has become reduced to the issue of state authority. In its current formulation, the state has the sole authority to wage war, and because non-state actors, by their very definition, cannot satisfy this principle, their use of force is inherently unethical. This does not reflect the reality that non-state actors are increasingly engaging in the use of force, sometimes legitimately. As a result, the legitimate authority principle can and should look beyond the state. This article navigates a terrain in which non-state actors engage in the use of force, and in which revisionist just war thinking proposes that the concept of legitimate authority is irrelevant to thinking about the ethics of war. It proposes a principled approach to the inclusion of some non-state actors under the rubric of legitimate authority. This approach draws upon the historical development of the legitimate authority principle and incorporates the factors important to early writers on the subject. 相似文献