首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   528篇
  免费   137篇
  国内免费   22篇
化学   34篇
力学   14篇
综合类   14篇
数学   425篇
物理学   200篇
  2023年   14篇
  2022年   31篇
  2021年   36篇
  2020年   27篇
  2019年   22篇
  2018年   18篇
  2017年   26篇
  2016年   30篇
  2015年   16篇
  2014年   50篇
  2013年   25篇
  2012年   32篇
  2011年   42篇
  2010年   48篇
  2009年   37篇
  2008年   37篇
  2007年   38篇
  2006年   40篇
  2005年   17篇
  2004年   8篇
  2003年   17篇
  2002年   14篇
  2001年   12篇
  2000年   10篇
  1999年   3篇
  1998年   14篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1994年   4篇
  1993年   2篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1987年   2篇
  1986年   1篇
排序方式: 共有687条查询结果,搜索用时 15 毫秒
91.
In this paper, we examine a single period problem in a supply chain in which a Stackelberg manufacturer supplies a product to a retailer who faces customer returns and demand uncertainty. We show that the manufacturer incurs a significant profit loss with and without a buyback policy if it fails to account for customer returns in the wholesale price decision. Under the assumption that the retailer is better informed than the manufacturer on customer returns information, we show that without a buyback policy, the retailer prefers not to share if the manufacturer overestimates while it prefers to share customer returns information if the manufacturer underestimates this information. If the manufacturer offers a buyback policy, we have the opposite results. We also discuss incentives to share the customer returns information and some of the issues that are raised in sharing this information.  相似文献   
92.
在班轮运输网络中,支线运输与干线运输具有互补性,干线承运人与支线承运人之间的合作能够为托运人提供更高的便利度和更完善的运输服务。本文在考虑可替代运输路径之间竞争关系的基础上,研究干支线衔接路径的定价问题,在运输链纵向一体化和分散化两种结构下,构建Bertrand博弈模型研究上下游承运人的均衡运价。同时,设计合理的收益共享机制,使承运人在分散结构的运输系统中仍能实现运输链的协调。  相似文献   
93.
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and improve overall organisational security. An organisation’s vulnerabilities to attacks might change over time. It is utterly important to find a balance among a current threat, the potential countermeasures, their consequences and costs, and the estimation of the overall risk that this provides to the organisation. For enhancing organisational security and automation, applying threat intelligence technology is critical for detecting, classifying, analysing, and sharing new cyberattack tactics. Trusted partner organisations can then share newly identified threats to improve their defensive capabilities against unknown attacks. On this basis, organisations can help reduce the risk of a cyberattack by providing access to past and current cybersecurity events through blockchain smart contracts and the Interplanetary File System (IPFS). The suggested combination of technologies can make organisational systems more reliable and secure, improving system automation and data quality. This paper outlines a privacy-preserving mechanism for threat information sharing in a trusted way. It proposes a reliable and secure architecture for data automation, quality, and traceability based on the Hyperledger Fabric private-permissioned distributed ledger technology and the MITRE ATT&CK threat intelligence framework. This methodology can also be applied to combat intellectual property theft and industrial espionage.  相似文献   
94.
In this paper we prove a uniqueness theorem for meromorphic functions sharing three values with some weight which improves some known results.  相似文献   
95.
在模糊需求和非对称销售价格信息下,研究了由单一制造商和零售商组成的两级闭环供应链系统的协调问题。通过建立不确定环境下的集中决策和收益共享-费用共担契约决策模型,分别得到了不同模型下闭环供应链系统的最优策略。并进一步通过算例分析了契约下供应链各方收益随模糊需求和价格的变化情况,以及该契约对整个系统决策效率的影响。结果表明:收益共享-费用共担契约能有效实现模糊闭环供应链系统的协调,实现闭环供应链系统决策的最优化;其次,需求和零售价格的不确定性程度越高,对零售商的最优订购量、供应链成员及系统利润的影响也越大。  相似文献   
96.
知识共享与间接互惠:基于计算实验方法的研究   总被引:2,自引:0,他引:2  
林润辉  米捷 《运筹与管理》2017,26(9):157-165
团队中,个体知识共享行为的回报往往来自第三方而非受助者,而以直接互惠为视角的知识共享研究却不足以解释此类现象。采用基于计算机仿真实验方法,通过赋予Agent记忆、推理、决策和沟通等能力,研究受表型背叛、组织信任氛围及声誉传播机制影响下,间接互惠机制对团队大范围知识共享行为的维系机理。研究发现,由于辨别者的存在,即使无条件共享者会成为绝对多数,隐藏者并不会大量侵入群体。这意味着间接互惠机制维系了团队大范围知识共享行为。在低的组织信任氛围水平下,辨别者和隐藏者虽然能够共存,团队内的知识共享行为却没有出现。即使只有少数成员能观察到周围同事的知识共享行为,只要声誉信息能够有效传播,间接互惠对广泛知识共享行为的维系作用就能够发挥。  相似文献   
97.
Zhang  Zhi-Li 《Queueing Systems》1997,26(3-4):229-254
We establish the optimal asymptotic decay rate of per-session queue length tail distributions for a two-queue system where a single constant rate server serves the two queues using the Generalized Processor Sharing (GPS) scheduling discipline. The result is obtained using the sample-path large deviation principle and has implications in call admission control for high-speed communication networks. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
98.
This paper studies the idea of weighted sharing and proves two main theorems which generalize some results given by G. Brosch, Q. Zhang and other authors.  相似文献   
99.
This paper presents a large deviation analysis of the steady-state sojourn time distribution in the GI/G/1 PS queue. Logarithmic estimates are obtained under the assumption of the service time distribution having a light tail, thus supplementing recent results for the heavy-tailed setting. Our proof gives insight into the way a large sojourn time occurs, enabling the construction of an (asymptotically efficient) importance sampling algorithm. Finally our results for PS are compared to a number of other service disciplines, such as FCFS, LCFS, and SRPT. 2000 mathematics subject classification: 60K25.  相似文献   
100.
A multisecret threshold scheme is a system which protects a number of secret keys among a group of n participants. There is a secret sK associated with every subset K of k participants such that any t participants in K can reconstruct the secret sK, but a subset of w participants cannot get any information about a secret they are not associated with. This paper gives a construction for the parameters t = 2, k = 3 and for any n and w that is optimal in the sense that participants hold the minimal amount of information. Communicated by: P. Wild  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号