全文获取类型
收费全文 | 115篇 |
免费 | 38篇 |
国内免费 | 16篇 |
专业分类
169篇 |
出版年
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 1篇 |
2020年 | 3篇 |
2018年 | 1篇 |
2017年 | 8篇 |
2016年 | 11篇 |
2015年 | 13篇 |
2014年 | 5篇 |
2013年 | 8篇 |
2012年 | 8篇 |
2011年 | 14篇 |
2010年 | 11篇 |
2009年 | 10篇 |
2008年 | 9篇 |
2007年 | 11篇 |
2006年 | 9篇 |
2005年 | 6篇 |
2004年 | 2篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 6篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1994年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有169条查询结果,搜索用时 0 毫秒
71.
Consider a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. An attack takes a random amount of time to complete. The patroller takes one time unit to move to and inspect an adjacent node, and will detect an ongoing attack with some probability. If an attack completes before it is detected, a cost is incurred. The attack time distribution, the cost due to a successful attack, and the detection probability all depend on the attack node. The patroller seeks a patrol policy that minimizes the expected cost incurred when, and if, an attack eventually happens. We consider two cases. A random attacker chooses where to attack according to predetermined probabilities, while a strategic attacker chooses where to attack to incur the maximal expected cost. In each case, computing the optimal solution, although possible, quickly becomes intractable for problems of practical sizes. Our main contribution is to develop efficient index policies—based on Lagrangian relaxation methodology, and also on approximate dynamic programming—which typically achieve within 1% of optimality with computation time orders of magnitude less than what is required to compute the optimal policy for problems of practical sizes. © 2014 Wiley Periodicals, Inc. Naval Research Logistics, 61: 557–576, 2014 相似文献
72.
73.
In a caching game introduced by Alpern et al. (Alpern et al., Lecture notes in computer science (2010) 220–233) a Hider who can dig to a total fixed depth normalized to 1 buries a fixed number of objects among n discrete locations. A Searcher who can dig to a total depth of h searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero‐sum game is complicated to analyze even for small values of its parameters, and for the case of 2 hidden objects has been completely solved only when the game is played in up to 3 locations. For some values of h the solution of the game with 2 objects hidden in 4 locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. (Fokkink et al., Search theory: A game theoretic perspective (2014) 85–104). Here we solve the remaining cases of the game with 2 objects hidden in 4 locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are 2 objects hidden in n locations and n→∞, the value of the game is asymptotically equal to h/n for h≥n/2. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 23–31, 2016 相似文献
74.
75.
针对既定目标,采用卫星系统进行协同观测可以最大化卫星系统的整体效能,如何对卫星系统的轨道或载荷参数设计是一个设计空间大、设计变量多的优化问题。对此,采用基于代理模型的仿真优化,通过改进广义模式搜索算法在设计空间中搜索最优解,并以此为核心设计开发卫星系统仿真优化平台。该平台集成问题建模、仿真优化和结果评估显示,为用户提供设计和改进卫星系统方案的方法和依据。采用该平台对卫星系统设计实例进行优化,通过对比发现,平台的优化结果稳定性和优化效率优于STK-Analyzer。 相似文献
76.
We show that the linear objective function of a search problem can be generalized to a power function and/or a logarithmic function and still be minimized by an index priority rule. We prove our result by solving the differential equation resulting from the required invariance condition, therefore, we also prove that any other generalization of this linear objective function will not lead to an index priority rule. We also demonstrate the full equivalence between two related search problems in the sense that a solution to either one can be used to solve the other one and vice versa. Finally, we show that the linear function is the only function leading to an index priority rule for the single‐machine makespan minimization problem with deteriorating jobs and an additive job deterioration function. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
77.
贾林川 《中国人民武装警察部队学院学报》2007,23(7):94-96
搜索引擎是互联网信息检索技术的核心,中文搜索引擎与国外相比存在着搜索引擎覆盖率低、查准率不高、检索精度差、更新速度慢、无法控制网络信息的动态变化、对信息内容难于控制和管理等问题。对此,提出了中文搜索引擎从单一查询工具向综合化、全功能服务发展;分类主题一体化,检索语言向自然语言发展;查询智能化,向多国化和多语种化发展;搜索引擎集成化、网络资源著录标准化及利用智能代理技术的信息检索等对策。 相似文献
78.
Ryusuke Hohzaki 《海军后勤学研究》2007,54(1):46-58
This paper deals with a two‐person zero‐sum game called a search allocation game, where a searcher and a target participate, taking account of false contacts. The searcher distributes his search effort in a search space in order to detect the target. On the other hand, the target moves to avoid the searcher. As a payoff of the game, we take the cumulative amount of search effort weighted by the target distribution, which can be derived as an approximation of the detection probability of the target. The searcher's strategy is a plan of distributing search effort and the target's is a movement represented by a path or transition probability across the search space. In the search, there are false contacts caused by environmental noises, signal processing noises, or real objects resembling true targets. If they happen, the searcher must take some time for their investigation, which interrupts the search for a while. There have been few researches dealing with search games with false contacts. In this paper, we formulate the game into a mathematical programming problem to obtain its equilibrium point. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
79.
利用Visual C++语言,定义了一个面向对象的基于实数编码遗传算法类。运用可最大限度保证遗传算法搜索到问题的全局最优解的深度搜索策略,编制了灰土挤密桩的优化设计和造价估算遗传算法程序,并针对兰州某地灰土挤密桩复合地基进行了计算分析,并与原有方案比较,结果表明:两种优化方案在满足承载力和变形的条件下,在降低造价成本方面优势非常明显。 相似文献
80.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献