首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   563篇
  免费   131篇
  国内免费   20篇
化学   30篇
力学   15篇
综合类   13篇
数学   483篇
物理学   173篇
  2023年   12篇
  2022年   25篇
  2021年   31篇
  2020年   28篇
  2019年   24篇
  2018年   18篇
  2017年   27篇
  2016年   29篇
  2015年   17篇
  2014年   54篇
  2013年   30篇
  2012年   39篇
  2011年   43篇
  2010年   57篇
  2009年   51篇
  2008年   34篇
  2007年   44篇
  2006年   38篇
  2005年   17篇
  2004年   7篇
  2003年   16篇
  2002年   14篇
  2001年   12篇
  2000年   9篇
  1999年   3篇
  1998年   14篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
排序方式: 共有714条查询结果,搜索用时 15 毫秒
631.
We consider the problem of pricing (digital) items in order to maximize the revenue obtainable from a set of bidders. We suggest a natural monotonicity constraint on bundle prices, show that the problem remains NP-hard, and we derive a PTAS. We also briefly discuss the highway pricing problem.  相似文献   
632.
As the order fulfillment process needs to be managed in a seamless way, the level of information sharing among the partners of the supply chain needs to be increased. An entropy-based formulation is proposed as the basis of a methodology for comparing different information sharing approaches in a supply chain environment. A step-by-step comparison of two different information sharing approaches is presented to exemplify the use of the methodology. A computer simulation is used to validate the usefulness of the proposed methodology.  相似文献   
633.
Firstly, the definitions of the secret sharing schemes (SSS), i.e. perfect SSS, statistical SSS and computational SSS are given in an uniform way, then some new schemes for several familiar rearrangements of access structures with respect to the above three types of SSS are constructed from the old schemes. It proves that the new schemes and the old schemes are of the same security. A method of constructing the SSS which realizes the general access structure by rearranging some basic access structures is developed. The results of this paper can be used to key managements and access controls.  相似文献   
634.
For the M/D/1 processor sharing queue, explicit formulas for the coefficient of variation of the sojourn time conditioned on the service time and on the residual service times of the tasks found on arrival are derived via branching representations.  相似文献   
635.
Regarding professional service time as perishable goods, it should be possible to directly migrate the successful airline revenue management techniques to professional services firms (PSFs) for their analogous business characters. However, there are salient differences between airlines and PSFs should be highlighted—the network structure of length-of-continuance and capacity allocation of multifunctional staff. Customers booking to be served from a first continuance time to a last continuance time in consecutive time continuance. Multifunctional professionals should be properly allocated to maximize the benefit. The arrival demands and lengths of service are stochastic in nature.  相似文献   
636.
Multilevel processor sharing scheduling disciplines have recently been resurrected in papers that focus on the differentiation between short and long TCP flows in the Internet. We prove that, for M/G/1 queues, such disciplines are better than the processor sharing discipline with respect to the mean delay whenever the hazard rate of the service time distribution is decreasing.  相似文献   
637.
In fisheries, capacity analysis has largely been limited to measuring physical capacity, defined as the maximum amount of output that can be produced per unit of time, given existing plant and equipment and unrestricted availability of variable inputs. An economic measure of capacity can be defined as the maximum revenue attainable for the given fixed inputs, using relevant outputs and output prices. This paper examines these two approaches to capacity by applying data envelopment analysis to physical and economic input/output data for Danish North Sea trawlers. The economic and physical measures are compared and contrasted using correlation analysis. An innovative analysis into the composition of possible revenue increments is also presented and reasons for economic inefficiency of vessels are identified.  相似文献   
638.
考虑由一个供应商和两个零售商组成的二级供应链,假设产品需求分布未知,零售商将观察到的需求信息共享给供应商,各企业按贝叶斯方法管理生产和库存。本文将表明在一定条件下,信息的汇聚可能会扭曲供应商对市场需求的认识,造成供应商严重产品积压或严重缺货,我们把这种现象称为信息汇聚效应。本文将给出需求信息可完全观察时,多周期供应链中发生信息汇聚效应的充分条件,并推出发生信息汇聚效应的概率的下界。  相似文献   
639.
介绍了北京师范大学的一门针对化学师范生职前教育训练的实践类课程——“中学化学教学设计与实践”,主要包括该课程的特色和发展历程.以实际班级授课为例详细介绍了常规的一对一指导教学模式,以及结合网络课程进行线上和线下同步教学的模式.另外,介绍了该门课的2种网络课型,即“爱课程网”的精品资源共享课和“京师在线”网上的MOOC课的课程框架和课程资源.  相似文献   
640.
考虑一个闭环供应链由单个制造商和单个零售商组成,产品的制造和再制造由制造商负责,产品的销售和废旧品的回收由零售商负责。在建立博弈模型的基础上,首先分析了闭环供应链在收益共享契约下的协调性,接着分析了收益共享契约对突发事件下闭环供应链的协调应对。分析结果表明:当突发事件导致销售市场规模和废旧品回收市场初始规模同时发生变化时,闭环供应链的协调将被打破,为此对收益共享契约进行了调整,调整后的收益共享契约使闭环供应链具有抗突发事件性;最后,通过数值计算实例对此进行了验证分析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号