首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283篇
  免费   43篇
  国内免费   25篇
  2022年   4篇
  2021年   1篇
  2020年   4篇
  2019年   8篇
  2018年   2篇
  2017年   9篇
  2016年   20篇
  2015年   7篇
  2014年   15篇
  2013年   14篇
  2012年   30篇
  2011年   16篇
  2010年   19篇
  2009年   23篇
  2008年   22篇
  2007年   29篇
  2006年   31篇
  2005年   12篇
  2004年   20篇
  2003年   10篇
  2002年   6篇
  2001年   7篇
  2000年   6篇
  1999年   5篇
  1998年   3篇
  1997年   3篇
  1996年   9篇
  1995年   5篇
  1994年   2篇
  1992年   3篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
排序方式: 共有351条查询结果,搜索用时 312 毫秒
81.
针对互补问题提出了一种无SLC限制的内点算法,仅要求线性函数F(x)=Hx q中的F是一个P*(τ)函数,不需要满足范数Lipschitz条件.并对该算法的全局收敛性做了证明。  相似文献   
82.
公安派出所应在辖区内进行消防监督检查是法定职能之一,也是加强社会消防安全监督检查,提高社会防御火灾事故能力,全面实现消防工作社会化的一条有效途径,它对弥补消防监督警力不足有着重要意义。分析目前派出所消防监督管理工作面临的问题,提出了改进和加强派出所消防监督管理工作的措施。  相似文献   
83.
消防部队基层干部面临个体需求与现实满足存在较大差距时出现的心理问题,受个体与周围环境因素的影响。面对心理问题,在重视部队传统教育的基础上,大胆借鉴现代企业管理经验和理念,充分利用压力的正效应,结合物质鼓励和精神激励,合理疏导,妥善处理。  相似文献   
84.
In the classical multiprocessor scheduling problem independent jobs must be assigned to parallel, identical machines with the objective of minimizing the makespan. This article explores the effect of assignment restrictions on the jobs for multiprocessor scheduling problems. This means that each job can only be processed on a specific subset of the machines. Particular attention is given to the case of processing times restricted to one of two values, 1 and λ, differing by at most 2. A matching based polynomial time ε‐approximation algorithm is developed that has a performance ratio tending to . This algorithm is shown to have the best possible performance, tending to 3/2, for processing times 1 and 2. For the special case of nested processing sets, i.e., when the sets of machines upon which individual jobs may be assigned are non‐overlapping, the behavior of list scheduling algorithms is explored. Finally, for assignment restrictions determined by just one characteristic of the machines, such as disc storage or memory constraint in the case of high performance computing, we contribute an algorithm that provides a 3/2 worst case bound and runs in time linear in the number of jobs. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
85.
用仿真模型研究了仓库物资的发放过程,定量解决了如何科学合理地分配一条作业线中作业机械的使用问题。根据这一结果,研究了在给定作业量的情况下如何确定作业机械数量的方法。  相似文献   
86.
本文引入带权的 Sobolev 空间,讨论了奇型线性问题:(?)((?)u)/((?)t)-1/x~(?)(x~aa(x)u′)′=f(t,x) (x,t)∈1×J(?)/((?)x)u(t,0)=u(t,1)=0 t∈Ju(0,x)=φ(x) x∈I式中 I=(0,1),J=[0,T],0<α<3的有限元方法,并在适当条件下,给出了最佳估计:‖u_(?)-u‖_(0,2,a)≤ch~2{‖φ‖_(2,2,a)+[integral 0 to t (‖u‖~2_(2,2,a)+‖u_(?)‖~2_(2,2,a)dt]~(1/2)}‖u_(?)-u‖_(1,2,a)≤ch~2{‖φ‖_(2,2,a)+[integral 0 to t (‖u‖~2_(2,2,a)+‖u_(?)‖~2_(2,2,a)dt]~(1/2)}  相似文献   
87.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
88.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
89.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
90.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号