首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   305篇
  免费   7篇
  国内免费   9篇
化学   198篇
力学   7篇
数学   73篇
物理学   43篇
  2023年   2篇
  2022年   2篇
  2021年   5篇
  2019年   3篇
  2017年   5篇
  2016年   5篇
  2015年   5篇
  2014年   6篇
  2013年   17篇
  2012年   11篇
  2011年   12篇
  2010年   7篇
  2009年   15篇
  2008年   19篇
  2007年   25篇
  2006年   21篇
  2005年   18篇
  2004年   11篇
  2003年   10篇
  2002年   11篇
  2001年   5篇
  2000年   9篇
  1999年   8篇
  1998年   4篇
  1997年   7篇
  1996年   2篇
  1995年   4篇
  1994年   2篇
  1993年   8篇
  1990年   3篇
  1988年   3篇
  1987年   8篇
  1984年   1篇
  1982年   4篇
  1980年   2篇
  1979年   5篇
  1978年   5篇
  1977年   3篇
  1976年   3篇
  1975年   2篇
  1974年   5篇
  1973年   3篇
  1971年   2篇
  1970年   1篇
  1969年   1篇
  1967年   1篇
  1965年   1篇
  1964年   1篇
  1963年   1篇
  1961年   2篇
排序方式: 共有321条查询结果,搜索用时 15 毫秒
41.
A generalized Weiszfeld method for the multi-facility location problem   总被引:1,自引:0,他引:1  
An iterative method is proposed for the K facilities location problem. The problem is relaxed using probabilistic assignments, depending on the distances to the facilities. The probabilities, that decompose the problem into K single-facility location problems, are updated at each iteration together with the facility locations. The proposed method is a natural generalization of the Weiszfeld method to several facilities.  相似文献   
42.
With the advent of microservice-based software architectures, an increasing number of modern cloud environments and enterprises use operating system level virtualization, which is often referred to as container infrastructures. Docker Swarm is one of the most popular container orchestration infrastructures, providing high availability and fault tolerance. Occasionally, discovered container escape vulnerabilities allow adversaries to execute code on the host operating system and operate within the cloud infrastructure. We show that Docker Swarm is currently not secured against misbehaving manager nodes. This allows a high impact, high probability privilege escalation attack, which we refer to as leadership hijacking, the possibility of which is neglected by the current cloud security literature. Cloud lateral movement and defense evasion payloads allow an adversary to leverage the Docker Swarm functionality to control each and every host in the underlying cluster. We demonstrate an end-to-end attack, in which an adversary with access to an application running on the cluster achieves full control of the cluster. To reduce the probability of a successful high impact attack, container orchestration infrastructures must reduce the trust level of participating nodes and, in particular, incorporate adversary immune leader election algorithms.  相似文献   
43.
44.
45.
46.
A random variable (RV) X is given aminimum selling price (S) $$S_U \left( X \right): = \mathop {\sup }\limits_x \left\{ {x + EU\left( {X - x} \right)} \right\}$$ and amaximum buying price (B) $$B_p \left( X \right): = \mathop {\inf }\limits_x \left\{ {x + EP\left( {X - x} \right)} \right\}$$ whereU(·) andP(·) are appropriate functions. These prices are derived from considerations ofstochastic optimization with recourse, and are calledrecourse certainty equivalents (RCE's) of X. Both RCE's compute the “value” of a RV as an optimization problem, and both problems (S) and (B) have meaningful dual problems, stated in terms of theCsiszár φ-divergence $$I_\phi \left( {p,q} \right): = \sum\limits_{i = 1}^n {q_i \phi \left( {\frac{{p_i }}{{q_i }}} \right)} $$ a generalized entropy function, measuring the distance between RV's with probability vectors p and q. The RCES U was studied elsewhere, and applied to production, investment and insurance problems. Here we study the RCEB P, and apply it to problems ofinventory control (where the attitude towards risk determines the stock levels and order sizes) andoptimal insurance coverage, a problem stated as a game between the insurance company (setting the premiums) and the buyer of insurance, maximizing the RCE of his coverage.  相似文献   
47.
48.
49.
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号