全文获取类型
收费全文 | 1040篇 |
免费 | 464篇 |
国内免费 | 110篇 |
出版年
2024年 | 1篇 |
2023年 | 21篇 |
2022年 | 11篇 |
2021年 | 25篇 |
2020年 | 41篇 |
2019年 | 24篇 |
2018年 | 14篇 |
2017年 | 77篇 |
2016年 | 84篇 |
2015年 | 67篇 |
2014年 | 83篇 |
2013年 | 70篇 |
2012年 | 93篇 |
2011年 | 72篇 |
2010年 | 66篇 |
2009年 | 117篇 |
2008年 | 81篇 |
2007年 | 84篇 |
2006年 | 91篇 |
2005年 | 69篇 |
2004年 | 69篇 |
2003年 | 48篇 |
2002年 | 46篇 |
2001年 | 39篇 |
2000年 | 36篇 |
1999年 | 34篇 |
1998年 | 28篇 |
1997年 | 24篇 |
1996年 | 19篇 |
1995年 | 12篇 |
1994年 | 11篇 |
1993年 | 16篇 |
1992年 | 8篇 |
1991年 | 8篇 |
1990年 | 17篇 |
1989年 | 7篇 |
1988年 | 1篇 |
排序方式: 共有1614条查询结果,搜索用时 15 毫秒
821.
822.
823.
824.
Non‐zero‐sum nonlinear network path interdiction with an application to inspection in terror networks 下载免费PDF全文
Noam Goldberg 《海军后勤学研究》2017,64(2):139-153
A simultaneous non‐zero‐sum game is modeled to extend the classical network interdiction problem. In this model, an interdictor (e.g., an enforcement agent) decides how much of an inspection resource to spend along each arc in the network to capture a smuggler. The smuggler (randomly) selects a commodity to smuggle—a source and destination pair of nodes, and also a corresponding path for traveling between the given pair of nodes. This model is motivated by a terrorist organization that can mobilize its human, financial, or weapon resources to carry out an attack at one of several potential target destinations. The probability of evading each of the network arcs nonlinearly decreases in the amount of resource that the interdictor spends on its inspection. We show that under reasonable assumptions with respect to the evasion probability functions, (approximate) Nash equilibria of this game can be determined in polynomial time; depending on whether the evasion functions are exponential or general logarithmically‐convex functions, exact Nash equilibria or approximate Nash equilibria, respectively, are computed. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 139–153, 2017 相似文献
825.
We study two‐agent scheduling on a single sequential and compatible batching machine in which jobs in each batch are processed sequentially and compatibility means that jobs of distinct agents can be processed in a common batch. A fixed setup time is required before each batch is started. Each agent seeks to optimize some scheduling criterion that depends on the completion times of its own jobs only. We consider several scheduling problems arising from different combinations of some regular scheduling criteria, including the maximum cost (embracing lateness and makespan as its special cases), the total completion time, and the (weighted) number of tardy jobs. Our goal is to find an optimal schedule that minimizes the objective value of one agent, subject to an upper bound on the objective value of the other agent. For each problem under consideration, we provide either a polynomial‐time or a pseudo‐polynomial‐time algorithm to solve it. We also devise a fully polynomial‐time approximation scheme when both agents’ scheduling criteria are the weighted number of tardy jobs. 相似文献
826.
Simon Emde 《海军后勤学研究》2017,64(6):476-489
This article treats the problem of scheduling multiple cranes processing jobs along a line, where cranes are divided into different groups and only cranes in the same group can interfere with each other. Such crane scheduling problems occur, for example, at indented berths or in container yards where double rail‐mounted gantry cranes stack containers such that cranes of the same size can interfere with each other but small cranes can pass underneath larger ones. We propose a novel algorithm based on Benders decomposition to solve this problem to optimality. In a computational study, it is shown that this algorithm solves small and medium‐sized instances and even many large instances within a few seconds or minutes. Moreover, it improves several best known solutions from the literature with regard to the simpler problem version with only one crane group. We also look into whether investment in more complicated crane configurations with multiple crane groups is actually worthwhile. 相似文献
827.
828.
针对容忍延迟网络(DTN)高延迟、数据传输成功率低等问题,提出了一种基于节点综合效能的DTN路由算法SERA。该算法综合考虑移动节点的活跃度和剩余能量,使消息副本向综合效能高的节点扩散。SERA节点活跃度描述了节点的社会和动态特性,SERA尽量将消息副本传递给活跃度高的节点,以提高消息传输的成功率;在选择中继节点时,充分考虑节点的能量状态,以避免能量不足的节点承担更多的信息传输任务,从而提高网络节点的存活率。仿真结果表明,与典型的DTN路由算法相比,SERA能够更好地平衡节点的能耗,获得更高的消息递交成功率和更长的网络生存期。 相似文献
829.
830.
本文讨论了在大规模并行计算机上实现数据并行程序设计语言的关键问题──分布数组的地址计算问题。文中详细给出了维分布数组的下标地址计算公式,分布数组的内情向量结构以及分布数组映射函数算法,并对有关编译实现技术进行了探讨。 相似文献