全文获取类型
收费全文 | 763篇 |
免费 | 129篇 |
国内免费 | 72篇 |
专业分类
964篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 12篇 |
2019年 | 23篇 |
2018年 | 29篇 |
2017年 | 55篇 |
2016年 | 50篇 |
2015年 | 34篇 |
2014年 | 47篇 |
2013年 | 124篇 |
2012年 | 55篇 |
2011年 | 56篇 |
2010年 | 36篇 |
2009年 | 49篇 |
2008年 | 41篇 |
2007年 | 65篇 |
2006年 | 71篇 |
2005年 | 52篇 |
2004年 | 37篇 |
2003年 | 25篇 |
2002年 | 19篇 |
2001年 | 24篇 |
2000年 | 21篇 |
1999年 | 8篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1990年 | 1篇 |
排序方式: 共有964条查询结果,搜索用时 15 毫秒
291.
292.
293.
当今的网络环境变得越来越复杂,网络安全管理员的工作不断加重,不经意的 疏忽便有可能遗留下安全的重大隐患,同时网上黑客教程和千余种入侵工具随手可得,因此 网络安全问题防不胜防,网络的防卫必须采用一种纵深的、多样的手段。入侵诱骗技术是网 络安全中的一个新兴的领域,是对现有的网络安全体系的一次重要扩充。结合校园网络平 台,将入侵检测和入侵诱骗有机地结合起来,对入侵诱骗系统进行了研究和具体实现,并详 细阐述了入侵诱骗系统的中心管理端和网络代理端的构成和功能。 相似文献
294.
从舰空导弹武器作战任务的需求出发,分析了舰空导弹体系的组成,给出了评估体系优劣的指标。简要回顾了国外舰空导弹武器的发展,阐述了美、俄、英等国家舰空导弹体系的构成,并展望了舰空导弹发展趋势。 相似文献
295.
防空、反潜作战中舰载设备生存能力的定量评估算法 总被引:1,自引:0,他引:1
防空、反潜作战是当前海上编队面临的最重要的作战样式之一,研究舰载设备在海战中的生存能力,对于提高水面舰艇可持续作战能力具有重要作用。采用定量评估方法来研究舰载设备的生存能力问题,基于水面舰艇编队典型防空、反潜作战防线模型,给出了详细的数学计算模型。 相似文献
296.
297.
A rule that constrains decision‐makers is enforced by an inspector who is supplied with a fixed level of inspection resources—inspection personnel, equipment, or time. How should the inspector distribute its inspection resources over several independent inspectees? What minimum level of resources is required to deter all violations? Optimal enforcement problems occur in many contexts; the motivating application for this study is the role of the International Atomic Energy Agency in support of the Treaty on the Non‐Proliferation of Nuclear Weapons. Using game‐theoretic models, the resource level adequate for deterrence is characterized in a two‐inspectee problem with inspections that are imperfect in the sense that violations can be missed. Detection functions, or probabilities of detecting a violation, are assumed to be increasing in inspection resources, permitting optimal allocations over inspectees to be described both in general and in special cases. When detection functions are convex, inspection effort should be concentrated on one inspectee chosen at random, but when they are concave it should be spread deterministicly over the inspectees. Our analysis provides guidance for the design of arms‐control verification operations, and implies that a priori constraints on the distribution of inspection effort can result in significant inefficiencies. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004. 相似文献
298.
In this article we introduce a 2‐machine flowshop with processing flexibility. Two processing modes are available for each task: namely, processing by the designated processor, and processing simultaneously by both processors. The objective studied is makespan minimization. This production environment is encountered in repetitive manufacturing shops equipped with processors that have the flexibility to execute orders either individually or in coordination. In the latter case, the product designer exploits processing synergies between two processors so as to execute a particular task much faster than a dedicated processor. This type of flowshop environment is also encountered in labor‐intensive assembly lines where products moving downstream can be processed either in the designated assembly stations or by pulling together the work teams of adjacent stations. This scheduling problem requires determining the mode of operation of each task, and the subsequent scheduling that preserves the flowshop constraints. We show that the problem is ordinary NP‐complete and obtain an optimal solution using a dynamic programming algorithm with considerable computational requirements for medium and large problems. Then, we present a number of dynamic programming relaxations and analyze their worst‐case error performance. Finally, we present a polynomial time heuristic with worst‐case error performance comparable to that of the dynamic programming relaxations. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004. 相似文献
299.
Command and Control (C2) in a military setting can be epitomized in battles‐of‐old when commanders would seek high ground to gain superior spatial‐temporal information; from this vantage point, decisions were made and relayed to units in the field. Although the fundamentals remain, technology has changed the practice of C2; for example, enemy units may be observed remotely, with instruments of varying positional accuracy. A basic problem in C2 is the ability to track an enemy object in the battlespace and to forecast its future position; the (extended) Kalman filter provides a straightforward solution. The problem changes fundamentally if one assumes that the moving object is headed for an (unknown) location, or waypoint. This article is concerned with the new problem of estimation of such a waypoint, for which we use Bayesian statistical prediction. The computational burden is greater than an ad hoc regression‐based estimate, which we also develop, but the Bayesian approach has a big advantage in that it yields both a predictor and a measure of its variability. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
300.
李志 《中国人民武装警察部队学院学报》2006,22(6):87-89
网络游戏产业快速发展的同时,赌博现象混迹其中。网络游戏赌博与传统赌博只是形式上的不同,其实质就是一种赌博行为。只有从教育、法制、监督、自律四方面综合治理,才能使这个行业健康发展。 相似文献