首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   232篇
  免费   9篇
  2020年   3篇
  2019年   13篇
  2018年   9篇
  2017年   4篇
  2016年   8篇
  2015年   7篇
  2014年   7篇
  2013年   76篇
  2011年   8篇
  2010年   2篇
  2009年   3篇
  2008年   4篇
  2007年   7篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   4篇
  2001年   3篇
  1999年   5篇
  1997年   3篇
  1996年   3篇
  1995年   3篇
  1994年   6篇
  1993年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   3篇
  1988年   4篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   3篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
  1970年   3篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有241条查询结果,搜索用时 203 毫秒
101.
This essay provides an overview of the ongoing quantitative and qualitative changes in Pakistan's nuclear arsenal and their impact on deterrence stability vis-à-vis India. Prominent among these trends is a major expansion in fissile material production that enables the manufacture of lighter and more compact warheads optimized for battlefield missions; the development of cruise missiles and shorter-range ballistic missiles possessing dual-use capabilities; and a greater emphasis in doctrinal pronouncements on the need for strike options geared to all levels of conflict. Although these trends pose problematic ramifications for the risks of unauthorized and inadvertent escalation, deterrence stability in South Asia is not as precarious as many observers fear. The challenges of fashioning a robust nuclear peace between India and Pakistan cannot be lightly dismissed, however, and policy makers would do well to undertake some reinforcing measures.  相似文献   
102.
103.
104.
The Western interventions in Iraq and Afghanistan have produced a heated polemic concerning the merits and demerits of counterinsurgency – the operational approach underpinning both campaigns. The two books reviewed here provide a good summation of the arguments against counterinsurgency: it is not a strategy and will fail when mistaken as such; its theory does not make intervention and war significantly easier; and even the most successful counterinsurgency campaigns have been bloody, violent, and protracted. Yet as this review highlights, beyond these central points, criticism of counterinsurgency is too often off the mark in its approach and totalizing in its pretentions. There is much to criticize and an urgent need to learn from past campaigns, yet bold claims and broad generalizations can mislead rather than enlighten. The analysis is particularly unhelpful when the definition of the central issue at hand – counterinsurgency – is being unwittingly or deliberately distorted. In the end, these two books form a poor basis for the debate that must now take place, because they are too ideological in tone, too undisciplined in approach, and therefore too unqualified in what they finally say.  相似文献   
105.
Problems in counterterrorism and corporate competition have prompted research that attempts to combine statistical risk analysis with game theory in ways that support practical decision making. This article applies these methods of adversarial risk analysis to the problem of selecting a route through a network in which an opponent chooses vertices for ambush. The motivating application is convoy routing across a road network when there may be improvised explosive devices and imperfect intelligence about their locations. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
106.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
107.
This article studies the optimal control of a periodic‐review make‐to‐stock system with limited production capacity and multiple demand classes. In this system, a single product is produced to fulfill several classes of demands. The manager has to make the production and inventory allocation decisions. His objective is to minimize the expected total discounted cost. The production decision is made at the beginning of each period and determines the amount of products to be produced. The inventory allocation decision is made after receiving the random demands and determines the amount of demands to be satisfied. A modified base stock policy is shown to be optimal for production, and a multi‐level rationing policy is shown to be optimal for inventory allocation. Then a heuristic algorithm is proposed to approximate the optimal policy. The numerical studies show that the heuristic algorithm is very effective. © 2011 Wiley Periodicals, Inc. Naval Research Logistics 58: 43–58, 2011  相似文献   
108.
In this study, we explore an inventory model for a wholesaler who sells a fashion product through two channels with asymmetric sales horizons. The wholesaler can improve profitability by employing joint procurement and inventory reallocation as a recourse action in response to the dynamics of sales. In this research, a simple stochastic programming model is analyzed to specify the properties of the optimal inventory decisions. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
109.
Existing theory on counterinsurgency does not adequately explain persistent insurrection in face of the reconstruction work currently underway in Afghanistan and Iraq. We starkly depart from the literature by developing a simple model of reconstruction allowing misalignment of occupier spending with community preferences. Insurgency arises endogenously as a result of the mix of spending rather than its level. Occupier insistence on its preferred path of reconstruction may lead to fewer projects of any kind being completed. In equilibrium, the occupier may accept an endogenous insurgency to achieve a preferred project mix, or be constrained in its choice even when no insurgency occurs.  相似文献   
110.
This paper describes an approximate solution method for solving the fixed charge problem. This heuristic approach is applied to a set of test problems to explore the margin of error. The results indicate that the proposed fixed charge simplex algorithm is capable of finding optimal or near optimal solutions to moderate sized fixed charge problems. In the absence of an exact method, this heuristic should prove useful in solving this fundamental nonlinear programming problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号