首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   302篇
  免费   12篇
  国内免费   2篇
  2021年   3篇
  2020年   4篇
  2019年   6篇
  2018年   5篇
  2017年   7篇
  2016年   7篇
  2015年   7篇
  2014年   2篇
  2013年   58篇
  2011年   4篇
  2010年   5篇
  2009年   7篇
  2008年   4篇
  2007年   4篇
  2006年   5篇
  2005年   10篇
  2004年   7篇
  2003年   4篇
  2002年   2篇
  2001年   5篇
  2000年   4篇
  1999年   9篇
  1998年   2篇
  1997年   2篇
  1996年   9篇
  1995年   3篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   12篇
  1989年   5篇
  1987年   3篇
  1986年   9篇
  1985年   12篇
  1984年   3篇
  1983年   3篇
  1980年   3篇
  1979年   3篇
  1978年   3篇
  1977年   5篇
  1976年   4篇
  1974年   5篇
  1973年   2篇
  1972年   8篇
  1971年   5篇
  1970年   8篇
  1969年   4篇
  1968年   4篇
  1967年   5篇
  1966年   3篇
排序方式: 共有316条查询结果,搜索用时 31 毫秒
81.
We consider a class of asymmetric two-person games played on graphs, and characterize all the positions in the game.  相似文献   
82.
83.
We consider scheduling problems involving two agents (agents A and B), each having a set of jobs that compete for the use of a common machine to process their respective jobs. The due dates of the A‐jobs are decision variables, which are determined by using the common (CON) or slack (SLK) due date assignment methods. Each agent wants to minimize a certain performance criterion depending on the completion times of its jobs only. Under each due date assignment method, the criterion of agent A is always the same, namely an integrated criterion consisting of the due date assignment cost and the weighted number of tardy jobs. Several different criteria are considered for agent B, including the maxima of regular functions (associated with each job), the total (weighted) completion time, and the weighted number of tardy jobs. The overall objective is to minimize the performance criterion of agent A, while keeping the objective value of agent B no greater than a given limit. We analyze the computational complexity, and devise polynomial or pseudo‐polynomial dynamic programming algorithms for the considered problems. We also convert, if viable, any of the devised pseudopolynomial dynamic programming algorithms into a fully polynomial‐time approximation scheme. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 416–429, 2016  相似文献   
84.
85.
It has been argued that the discovery of a new natural resource greatly increases the risk of conflict. This research aims to study the effect of natural resources on military spending, using the data from rentier states in the Middle East and North Africa (MENA) countries from 1987 to 2012. In considering the ‘resource curse,’ the types of natural resources matter. Our empirical results demonstrate that the ‘resource curse’ arising from the abundance of certain natural resources, particularly oil and forest resources, leads to increases in military spending. In contrast, the rent from coal and natural gas has a negative impact on military spending, while the rent from minerals has no impact on military spending, controlling for GDP growth and per capita income.  相似文献   
86.
We consider parallel‐machine scheduling with a common server and job preemption to minimize the makespan. While the non‐preemptive version of the problem is strongly NP‐hard, the complexity status of the preemptive version has remained open. We show that the preemptive version is NP‐hard even if there is a fixed number of machines. We give a pseudo‐polynomial time algorithm to solve the case with two machines. We show that the case with an arbitrary number of machines is unary NP‐hard, analyze the performance ratios of some natural heuristic algorithms, and present several solvable special cases. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 388–398, 2017  相似文献   
87.
This article examines challenges in international nuclear safeguards pertaining to the timely detection of highly enriched uranium production at large-scale gas centrifuge enrichment plants. To establish where present gas centrifuge enrichment plant safeguards measures and approaches could be strengthened, we have created a discrete time model for simulating hypothetical misuse scenarios, both through transient phases and at steady-state. We find that timely detection of misuse at modern large-scale facilities presents a challenge for international safeguards. A toolbox of unattended measurement systems, along with remote monitoring, however, could be used to improve detection timeliness, enabling the initiation of follow-up activities, potentially on a rapid time scale. These measures, which would need very low false alarm rates, should be implemented in a graded approach, depending on the characteristics of each enrichment plant and an analysis of plausible acquisition paths for the State in which it is situated. Some of these technologies could provide significant benefit to plant operators.  相似文献   
88.
MOZAMBIQUE     
Mozambique is widely regarded as a success story. The parliamentary and presidential lections in 1994 marked the peak of the peace process in Mozambique. Despite minor irregularities, the elections were declared free and fair by international observers. Mozambique has succeeded where other countries such as Angola has failed—a stable peace process, multiparty elections and the transformation of the armed opposition into a civil political party. Its transition to liberalism and capitalism brought macro-economic growth rates that are probably envied by many countries in the region. This article argues, however, that Mozambique provides an example of a third wave democracy where the transition from in electoral democracy to a consolidated democracy has not yet been completed, with little progress towards democratic maturity. In particular, the repercussions of the elections in 1999, Mozambique's ‘black’ November in 2000 and the process of recent consultation between the and Frelimo leadership in order to resolve the paralysed state of Mozambican politics underline a tendency towards a permanent entrenchment of democratic minimalism.  相似文献   
89.

This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense.  相似文献   
90.

Since 1975 “offsets” have begun to appear frequently in contracts covering international sales of aircraft and other products incorporating advanced technology. Offsets involve reciprocity beyond that normally found in an exchange of goods for money. They may involve co‐production or co‐design of the principal item to be exchanged, or acceptance by the seller of goods or services unrelated to it as partial payment (indirect offsets or countertrade).

The United States has become the major provider of offsets and anti‐offset sentiment has grown. Economists interpret them as trade diverting. Politicians from regions suffering loss of employment view them as bestowing unfair advantage to foreign competitors.

The authors examine offsets from both theoretical and policy perspectives and conclude that in such noncompetitive markets, second‐best considerations dominate, requiring case‐by‐case evaluation of impacts and rendering across‐the‐board determinations of welfare loss suspect.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号