首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   472篇
  免费   109篇
  国内免费   13篇
  594篇
  2024年   1篇
  2022年   3篇
  2021年   5篇
  2020年   5篇
  2019年   19篇
  2018年   6篇
  2017年   22篇
  2016年   27篇
  2015年   20篇
  2014年   18篇
  2013年   81篇
  2012年   34篇
  2011年   35篇
  2010年   31篇
  2009年   36篇
  2008年   33篇
  2007年   42篇
  2006年   38篇
  2005年   26篇
  2004年   27篇
  2003年   17篇
  2002年   18篇
  2001年   17篇
  2000年   13篇
  1999年   7篇
  1998年   1篇
  1997年   1篇
  1995年   3篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
排序方式: 共有594条查询结果,搜索用时 15 毫秒
61.
This paper models and simulates a government‐contractor principal‐agent weapon system repair model. Insights are derived as to how government repair contracts should be constructed so as to induce optimal contractor behavior. The paper's general conclusion is that the best contracting approach combines a lump‐sum payment that does not vary with the number of units repaired, expensive item cost‐sharing, and a contractor‐provided availability guarantee. Provided there is intercontractor competition, this type of contract performs well even if the government is poorly informed about weapon system break patterns or repair costs.  相似文献   
62.
This article proposes two dual‐ascent algorithms and uses each in combination with a primal drop heuristic embedded within a branch and bound framework to solve the uncapacitated production assembly distribution system (i.e., supply chain) design problem, which is formulated as a mixed integer program. Computational results indicate that one approach, which combines primal drop and dual‐ascent heuristics, can solve instances within reasonable time and prescribes solutions with gaps between the primal and dual solution values that are less than 0.15%, an efficacy suiting it for actual large‐scale applications. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
63.
Measuring the relative importance of components in a mechanical system is useful for various purposes. In this article, we study Birnbaum and Barlow‐Proschan importance measures for two frequently studied system designs: linear consecutive k ‐out‐of‐ n and m ‐consecutive‐ k ‐out‐of‐ n systems. We obtain explicit expressions for the component importance measures for systems consisting of exchangeable components. We illustrate the results for a system whose components have a Lomax type lifetime distribution. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
64.
When customers buy a product, they are often eligible for free repairs for a certain warranty period. In this article, we study some important aspects, which are often overlooked in the literature but are of interest to the manufacturer, in estimating both warranty and post‐warranty repair demands. We consider that the installed base of the product (i.e., the number of units of the product actually in use) varies with time due to both new sales and units being taken out of service. When estimating warranty and post‐warranty repair demands, we explicitly address the fact that customers may not always request repairs for failed units. For the case where the product failure time distribution is exponential, we derive the closed‐form expressions for both types of repair demands of a single unit and of the time‐varying installed base. The insights into some risk‐related quantities are also presented. Furthermore, the proposed model is extended by considering delayed warranty claims that are frequently seen in practice. Numerical examples illustrate that understanding both types of repair demands and the related decision variables is important for managing the obligatory and profitable repair services. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 499–511, 2013  相似文献   
65.
By running life tests at higher stress levels than normal operating conditions, accelerated life testing (ALT) quickly yields information on the lifetime distribution of a test unit. The lifetime at the design stress is then estimated through extrapolation using a regression model. In constant‐stress testing, a unit is tested at a fixed stress level until failure or the termination time point of test, whereas step‐stress testing allows the experimenter to gradually increase the stress levels at some prefixed time points during the test. In this work, the optimal k‐level constant‐stress and step‐stress ALTs are compared for the exponential failure data under complete sampling and Type‐I censoring. The objective is to quantify the advantage of using the step‐stress testing relative to the constant‐stress one. Assuming a log‐linear life–stress relationship with the cumulative exposure model for the effect of changing stress in step‐stress testing, the optimal design points are determined under C/D/A‐optimality criteria. The efficiency of step‐stress testing to constant‐stress one is then discussed in terms of the ratio of optimal objective functions based on the information matrix. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 00: 000–000, 2013  相似文献   
66.
We consider the single server Markovian queue subject to Poisson generated catastrophes. Whenever a catastrophe occurs, all customers are forced to abandon the system, the server is rendered inoperative and an exponential repair time is set on. During the repair time new arrivals are allowed to join the system. We assume that the arriving customers decide whether to join the system or balk, based on a natural linear reward‐cost structure with two types of rewards: A (usual) service reward for those customers that receive service and a (compensation) failure reward for those customers that are forced to abandon the system due to a catastrophe. We study the strategic behavior of the customers regarding balking and derive the corresponding (Nash) equilibrium strategies for the observable and unobservable cases. We show that both types of strategic behavior may be optimal: to avoid the crowd or to follow it. The crucial factor that determines the type of customer behavior is the relative value of the service reward to the failure compensation. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
67.
This paper investigates the nature of two military alliances under Chinese threat. The findings are as follows: First, South Korea does not consider China a significant threat while Japan and the United States have recognized China as a serious threat since the 1990s and the 2000s, respectively. Second, the relationship between South Korea and the United States is a true military alliance for all time periods, but the nature of the alliance has changed since the 1970s. Third, although Japan began to form an alliance relationship with the United States in the 1990s, Japan is considered a more significant ally by the United States. This paper implies that, should China provoke a military confrontation, it might be difficult to deduce a common solution among the three countries because of the different response to military threats from China.  相似文献   
68.
采用基于事例推理的估算方法可以很好地解决传统经验函数估算软件成本时的局限性。讨论了装备软件成本估算和基于事例推理研究的特点,从总体上描述了基于事例推理装备软件成本估算系统结构和实现流程,阐述了主要的研究内容,包括影响软件成本因素、系统的事例表示方法以及相似度的基本算法及事例的改写,并通过实例验证了事例推理在装备软件成本估算实践中的具体应用。  相似文献   
69.
Finding all nondominated vectors for multi‐objective combinatorial optimization (MOCO) problems is computationally very hard in general. We approximate the nondominated frontiers of MOCO problems by fitting smooth hypersurfaces. For a given problem, we fit the hypersurface using a single nondominated reference vector. We experiment with different types of MOCO problems and demonstrate that in all cases the fitted hypersurfaces approximate all nondominated vectors well. We discuss that such an approximation is useful to find the neighborhood of preferred regions of the nondominated vectors with very little computational effort. Further computational effort can then be spent in the identified region to find the actual nondominated vectors the decision maker will prefer. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
70.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号