全文获取类型
收费全文 | 131篇 |
免费 | 4篇 |
出版年
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 3篇 |
2015年 | 1篇 |
2013年 | 33篇 |
2012年 | 1篇 |
2009年 | 2篇 |
2008年 | 1篇 |
2007年 | 4篇 |
2006年 | 1篇 |
2005年 | 1篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 5篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 1篇 |
1978年 | 6篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 6篇 |
1972年 | 1篇 |
1971年 | 6篇 |
1970年 | 2篇 |
1969年 | 1篇 |
1968年 | 1篇 |
1967年 | 4篇 |
1966年 | 5篇 |
1949年 | 1篇 |
排序方式: 共有135条查询结果,搜索用时 15 毫秒
121.
122.
Inventory models with nonlinear shortage costs and stochastic lead times; applications of shape properties of randomly stopped counting processes 下载免费PDF全文
In this article, we study generalizations of some of the inventory models with nonlinear costs considered by Rosling in (Oper. Res. 50 (2002) 797–809). In particular, we extend the study of both the periodic review and the compound renewal demand processes from a constant lead time to a random lead time. We find that the quasiconvexity properties of the cost function (and therefore the existence of optimal (s, S) policies), holds true when the lead time has suitable log‐concavity properties. The results are derived by structural properties of renewal delayed processes stopped at an independent random time and by the study of log‐concavity properties of compound distributions. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 345–356, 2015 相似文献
123.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society. 相似文献
124.
An interactive economic model of military spending is proposed. It is quantified on the basis of cross section data for East Asia. Projections of military spending to the end of the decade suggest that the growth of military spending in the region will decline slightly in the current decade. East Asian military spending can, however, be greatly influenced by the path of Chinese and US military efforts. An expansion of military spending by China could cause neighboring countries to greatly increase their military expenditures. 相似文献
125.
AbstractThis paper offers a simple strategic framework to help governments identify various policy mechanisms to minimize public sector corruption. The paper offers a formal model that blends the economics of crime with identity economics and money laundering. It presents a partial equilibrium framework that focuses on a representative public official engaged in a mix of legal and illegal effort. The model introduces various levers a government might use to impact the costs and benefits of illegal effort. The ultimate goal is to help turn volatile vicious cycles of political instability, into steady virtuous cycles of stability, growth, and sustainable development. 相似文献
126.
Mustapha Bouhtou Alexander Grigoriev Stan van Hoesel Anton F. van der Kraaij Frits C.R. Spieksma Marc Uetz 《海军后勤学研究》2007,54(4):411-420
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
127.
Stephen F. Burgess 《Contemporary Security Policy》2016,37(1):111-143
This article synthesizes three elements of power and balancing in the South China Sea (SCS): analytical perspectives on China's behaviour and intentions, the American rebalance to Asia and the dispositions of American allies and partners. Based on extensive interviews and theoretical analysis, it concludes that ‘soft balancing’ backed by American military power provides the optimum chance for resolving the growing dispute. Short to medium-term weakness of Malaysia, Philippines and Vietnam, as well as Japan, means the United States must provide much of the military power while working to build their forces. The most promising alternative is multilateral diplomacy through the Association of Southeast Asian Nations’ Regional Forum, a vehicle for negotiating a Code of Conduct and implementation of the UN Convention on the Law of the Sea. If China remains motivated mainly by defense of realist interests, the costs imposed against expansion will eventually cause recalculation of Beijing's strategy, and soft balancing by the United States and its partners has a chance of working. The constructivist perspective, stressing self-conceptualization of Chinese strategic culture, supports Chinese confidence that patience will eventually bring dominance. If China tries offensively to change the status quo, soft balancing is less likely to influence Beijing. President Xi Jin Ping appears to be offensively asserting power, seeking regional dominance before he is due to step down in 2023. This supports the finding of enhanced risks of unintended escalation in the SCS and the East China Sea. 相似文献
128.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible. 相似文献
129.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism. 相似文献
130.
Ian F. W. Beckett 《Small Wars & Insurgencies》2019,30(4-5):994-1019
ABSTRACT What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions. 相似文献