全文获取类型
收费全文 | 317篇 |
免费 | 111篇 |
国内免费 | 25篇 |
专业分类
453篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 6篇 |
2020年 | 8篇 |
2019年 | 10篇 |
2018年 | 4篇 |
2017年 | 15篇 |
2016年 | 18篇 |
2015年 | 17篇 |
2014年 | 19篇 |
2013年 | 15篇 |
2012年 | 37篇 |
2011年 | 39篇 |
2010年 | 13篇 |
2009年 | 30篇 |
2008年 | 20篇 |
2007年 | 19篇 |
2006年 | 26篇 |
2005年 | 25篇 |
2004年 | 20篇 |
2003年 | 11篇 |
2002年 | 16篇 |
2001年 | 17篇 |
2000年 | 12篇 |
1999年 | 12篇 |
1998年 | 8篇 |
1997年 | 7篇 |
1996年 | 6篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
排序方式: 共有453条查询结果,搜索用时 15 毫秒
41.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
42.
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
43.
由于装甲车辆综合电子系统具有耦合性强、动态离散和复杂度高的特点,其难以采用静态故障树方法进行系统可靠性分析,针对这一难题,运用动态故障树方法对系统可靠性进行了分析判别,并运用随机Petri网建立了故障树的仿真模型。以某型车辆为例,通过仿真实验得出了综合电子系统的故障率和可用度指标的动态变化曲线,其分析结果为系统可靠性与测试性设计提供了理论参考。 相似文献
44.
软件保障流程分析是研究软件保障规律的重要手段。应用多层赋时变迁、随机Petri网技术,逐步细化建立了软件保障流程仿真模型,给出了各层次模型中库所和变迁的含义。结合模型的仿真分析,提出了用"软件使用保障时间比"作为评价软件保障性的参数,给出了软件使用保障时间比的计算方法,并就该计算方法所表达的意义同装备系统进行了比较,指出了软件使用与保障时间分配的特殊性。 相似文献
45.
多目标广义指派问题的模糊匈牙利算法求解 总被引:5,自引:0,他引:5
提出和讨论了两类多目标的广义指派决策问题,分别给出了它们的多目标整数线性规划数学模型,并结合模糊理论与解决传统指派问题的匈牙利方法提出了一种新的求解算法:模糊匈牙利法.最后给出了一个数值例子. 相似文献
46.
针对目前安全分析方法通常只能给出导致系统失效的事件发生序列,而对系统运行过程中的一些时序、动态等因素考虑不足等问题,提出了基于Petri网模型的系统安全性动态分析方法,并结合系统状态可达树,建立了系统动态安全性分析模型,得出导致系统失效的所有可能事件的序列及其发生概率.最后,以实例验证了该方法的可靠性和有效性. 相似文献
47.
研究一类具有两种随机扰动的SISV传染病模型.对于第一种随机SISV模型,证明对任给的非负初值,该随机模型一定存在唯一的全局正解,并讨论该随机模型的解围绕确定性模型的无病平衡点的渐近行为;对于第二种随机SISV模型,通过构造适当的Lyapunov泛函证明该随机模型的解是随机渐近稳定的. 相似文献
48.
49.
50.
Let X and Xτ denote the lifetime and the residual life at age τ of a system, respectively. X is said to be a NBUL random variable if Xτ is smaller than X in Laplace order, i.e., Xτ ≤L X. We obtain some characterizations for this class of life distribution by means of the lifetime of a series system and the residual life at random time. We also discuss preservation properties for this class of life distribution under shock models. Finally, under the assumption that the lifetimes have the NBUL property, we make stochastic comparisons between some basic replacement policies. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 578–591, 2001. 相似文献