首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   352篇
  免费   92篇
  国内免费   4篇
  448篇
  2022年   1篇
  2021年   2篇
  2019年   12篇
  2018年   6篇
  2017年   17篇
  2016年   22篇
  2015年   17篇
  2014年   18篇
  2013年   70篇
  2012年   14篇
  2011年   26篇
  2010年   23篇
  2009年   21篇
  2008年   22篇
  2007年   32篇
  2006年   23篇
  2005年   16篇
  2004年   20篇
  2003年   13篇
  2002年   23篇
  2001年   21篇
  2000年   15篇
  1999年   7篇
  1998年   3篇
  1997年   4篇
排序方式: 共有448条查询结果,搜索用时 15 毫秒
261.
Applications for content distribution over networks, such as Video‐on‐Demand (VOD), are expected to grow significantly over time. Effective bandwidth allocation schemes that can be repeatedly executed must be deployed since new programs are often installed at various servers while other are deleted. We present a model for bandwidth allocation in a content distribution network that consists of multiple trees, where the root of each tree has a server that broadcasts multiple programs throughout the tree. Each network link has limited capacity and may be used by one or more of these trees. The model is formulated as an equitable resource allocation problem with a lexicographic maximin objective function that attempts to provide equitable service performance for all requested programs at the various nodes. The constraints include link capacity constraints and tree‐like ordering constraints imposed on each of the programs. We present an algorithm that provides an equitable solution in polynomial time for certain performance functions. At each iteration, the algorithm solves single‐link maximin optimization problems while relaxing the ordering constraints. The algorithm selects a bottleneck link, fixes various variables at their lexicographic optimal solution while enforcing the ordering constraints, and proceeds with the next iteration. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
262.
基于免疫学的多代理入侵检测系统   总被引:6,自引:0,他引:6       下载免费PDF全文
在探讨免疫学基本原理的基础上 ,提出了基于免疫学的多代理系统 ,用于联网计算机的入侵检测与反应。在这个框架中 ,基于免疫学的安全代理在联网节点之间漫游 ,监视网络状态。这些代理相互识别对方的活动行为 ,以等级方式进行合作 ,并根据底层安全规则采取相应的行动。移动代理具有学习能力 ,能动态适应周围环境 ,检测出已知与未知的入侵。多代理检测系统同时在不同层次监视联网计算机的活动情况 ,包括用户级、系统级、进程级和数据包级。基于免疫学的多代理入侵检测系统是灵活的、可扩展的和可适应的 ,能够根据管理员的需要与参数配置实时监视网络。  相似文献   
263.
提出了一种基于Rough集理论的数据库推理泄漏通道消除方法。在由数据库中所有数据生成的不完备决策表上,该方法应用Rough集理论,分析提取出敏感和非敏感数据之间的确定性推理关系,以此产生推理控制规则。利用这些规则对数据库系统返回给普通用户的数据动态地做最小修改,防止推理通道的产生。实验结果表明,该方法可扩展性强,在保证较高的数据库安全性的同时提高了数据可用性。  相似文献   
264.
We consider a two‐phase service queueing system with batch Poisson arrivals and server vacations denoted by MX/G1G2/1. The first phase service is an exhaustive or a gated bulk service, and the second phase is given individually to the members of a batch. By a reduction to an MX/G/1 vacation system and applying the level‐crossing method to a workload process with two types of vacations, we obtain the Laplace–Stieltjes transform of the sojourn time distribution in the MX/G1G2/1 with single or multiple vacations. The decomposition expression is derived for the Laplace–Stieltjes transform of the sojourn time distribution, and the first two moments of the sojourn time are provided. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
265.
In this paper, we consider a new weapon‐target allocation problem with the objective of minimizing the overall firing cost. The problem is formulated as a nonlinear integer programming model, but it can be transformed into a linear integer programming model. We present a branch‐and‐price algorithm for the problem employing the disaggregated formulation, which has exponentially many columns denoting the feasible allocations of weapon systems to each target. A greedy‐style heuristic is used to get some initial columns to start the column generation. A branching strategy compatible with the pricing problem is also proposed. Computational results using randomly generated data show this approach is promising for the targeting problem. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
266.
This article is concerned with a general multi‐class multi‐server priority queueing system with customer priority upgrades. The queueing system has various applications in inventory control, call centers operations, and health care management. Through a novel design of Lyapunov functions, and using matrix‐analytic methods, sufficient conditions for the queueing system to be stable or instable are obtained. Bounds on the queue length process are obtained by a sample path method, with the help of an auxiliary queueing system. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
267.
We study in this paper the price‐dependent (PD) newsvendor model in which a manufacturer sells a product to an independent retailer facing uncertain demand and the retail price is endogenously determined by the retailer. We prove that for a zero salvage value and some expected demand functions, in equilibrium, the manufacturer may elect not to introduce buybacks. On the other hand, if buybacks are introduced in equilibrium, their introduction has an insignificant effect on channel efficiency improvement, but, by contrast, may significantly shift profits from the retailer to the manufacturer. We further demonstrate that the introduction of buybacks increases the wholesale price, retail price, and inventory level, as compared to the wholesale price‐only contract, and that the corresponding vertically integrated firm offers the lowest retail price and highest inventory level. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
268.
Recent years have seen a strong trend toward outsourcing warranty repair services to outside vendors. In this article we consider the problem of dynamically routing warranty repairs to service vendors when warranties have priority levels. Each time an item under warranty fails, it is sent to one of the vendors for repair. Items covered by higher priority warranty receive higher priority in repair service. The manufacturer pays a fixed fee per repair and incurs a linear holding cost while an item is undergoing or waiting for repair. The objective is to minimize the manufacturer's long‐run average cost. Because of the complexity of the problem, it is very unlikely that there exist tractable ways to find the optimal routing strategies. Therefore, we propose five heuristic routing procedures that are applicable to real‐life problems. We evaluate the heuristics using simulation. The simulation results show that the index‐based “generalized join the shortest queue” policy, which applies a single policy improvement step to an initial state‐independent policy, performs the best among all five heuristics. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
269.
We consider a manufacturer, served by a single supplier, who has to quote due dates to arriving customers in a make‐to‐order production environment. The manufacturer is penalized for long lead times and for missing due dates. To meet due dates, the manufacturer has to obtain components from a supplier. We model this manufacturer and supplier as a two‐machine flow shop, consider several variations of this problem, and design effective due‐date quotation and scheduling algorithms for centralized and decentralized versions of the model. We perform extensive computational testing to assess the effectiveness of our algorithms and to compare the centralized and decentralized models to quantify the value of centralized control in a make‐to‐order supply chain. Since complete information exchange and centralized control is not always practical or cost‐effective, we explore the value of partial information exchange for this system. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
270.
We study an infinite horizon periodic stochastic inventory system consisting of retail outlets and customers located on a homogenous line segment. In each period, the total demand, generated by the customers on the line, is normally distributed. To better match supply and demand, we incorporate lateral transshipments. We propose a compact model in which the strategic decisions—the number and locations of retail outlets—are determined simultaneously with the operational decisions—the inventory replenishment and transshipment quantities. We find the optimal balance between the risk‐pooling considerations, which drive down the optimal number of retail outlets, and lateral transshipments, which drive up the optimal number of retail outlets. We also explore the sensitivity of the optimal number of retail outlets to various problem parameters. This article presents a novel way of integrating lateral transshipments in the context of an inventory‐location model. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号