全文获取类型
收费全文 | 198篇 |
免费 | 65篇 |
国内免费 | 11篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 2篇 |
2017年 | 15篇 |
2016年 | 15篇 |
2015年 | 8篇 |
2014年 | 19篇 |
2013年 | 13篇 |
2012年 | 7篇 |
2011年 | 12篇 |
2010年 | 10篇 |
2009年 | 16篇 |
2008年 | 14篇 |
2007年 | 12篇 |
2006年 | 11篇 |
2005年 | 13篇 |
2004年 | 14篇 |
2003年 | 7篇 |
2002年 | 9篇 |
2001年 | 9篇 |
2000年 | 11篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有274条查询结果,搜索用时 15 毫秒
51.
The (standard) randomization method is an attractive alternative for the transient analysis of continuous time Markov models. The main advantages of the method are numerical stability, well‐controlled computation error, and ability to specify the computation error in advance. However, the fact that the method can be computationally very expensive limits its applicability. In this paper, we develop a new method called split regenerative randomization, which, having the same good properties as standard randomization, can be significantly more efficient. The method covers reliability‐like models with a particular but quite general structure and requires the selection of a subset of states and a regenerative state satisfying some conditions. For a class of continuous time Markov models, model class C2, including typical failure/repair reliability‐like models with exponential failure and repair time distributions and deferred repair, natural selections are available for both the subset of states and the regenerative state and, for those natural selections, theoretical results are available assessing the efficiency of the method in terms of “visible” model characteristics. Those results can be used to anticipate when the method can be expected to be competitive. We illustrate the application of the method using a large class C2 model and show that for models in that class the method can indeed be significantly more efficient than previously available randomization‐based methods. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
52.
Martin Schönteich 《African Security Review》2013,22(2):39-51
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance. 相似文献
53.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
54.
55.
在剖析海军装备体系与体系技术概念的基础上,分析了海军装备体系技术的特点与作用,提出了海军装备体系技术的基本构成,为海军装备体系技术的应用研究提供理论指导。 相似文献
56.
57.
地图数据库是地理信息系统(GIS)的核心。本文提出面向对象地图数据库的逻辑数据模型和数据结构,分析了地图的基本图形对象(结点和弧段)间的拓扑关系,围绕地图数据库的拓扑一致性,讨论了各种编辑操作的实现步骤。 相似文献
58.
开放系统互连管理 OSIM 是 OSI 参考模型中定义的特定应用服务元素 SASE 之一,也是唯一涉及全部七层协议的服务元素。OSIM 在控制和协调 Multivendor 和 Multidomain系统中所起的作用已使它成为改进网络性能和服务水平的关键性因素。并非所有开放系统均能提供全七层支持,因此,本文提出一种管理协议细栈 MTS(Management Thin Stack)结构,讨论了它自身的构造性特及其在上述管理环境下的作用。 相似文献
59.
唐朝京 《国防科技大学学报》1993,15(1):1-6
差分密码分析方法是1990年由E.Biham和A.Shamir提出的,这种方法对DES算法及DES类体制构成了威胁。本文在剖析了差分密码分析方法工作原理的基础上,提出了改进DES算法的7种方法,从而可以有效地阻止差分密码分析法的攻击。 相似文献
60.
贝叶斯网络推理在信息系统安全风险评估中的应用 总被引:2,自引:0,他引:2
提出了一种基于贝叶斯网络推理的安全风险评估方法。从实际出发建立信息系统的贝叶斯网络模型,根据专家给出的先验信息,结合获得的证据信息,运用Pearl方法完成对模型的评估,给出在特定条件下模型的计算——线性推理算法。最后,以实例分析信息系统安全评估的实现过程,结果表明,该方法可行、有效。 相似文献