首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   131篇
  免费   4篇
  2021年   2篇
  2020年   1篇
  2019年   2篇
  2018年   1篇
  2017年   2篇
  2016年   3篇
  2015年   1篇
  2013年   33篇
  2012年   1篇
  2009年   2篇
  2008年   1篇
  2007年   4篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2002年   5篇
  1999年   3篇
  1998年   2篇
  1995年   2篇
  1994年   1篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1981年   2篇
  1980年   4篇
  1979年   1篇
  1978年   6篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   6篇
  1972年   1篇
  1971年   6篇
  1970年   2篇
  1969年   1篇
  1968年   1篇
  1967年   4篇
  1966年   5篇
  1949年   1篇
排序方式: 共有135条查询结果,搜索用时 15 毫秒
121.
122.
In this article, we study generalizations of some of the inventory models with nonlinear costs considered by Rosling in (Oper. Res. 50 (2002) 797–809). In particular, we extend the study of both the periodic review and the compound renewal demand processes from a constant lead time to a random lead time. We find that the quasiconvexity properties of the cost function (and therefore the existence of optimal (s, S) policies), holds true when the lead time has suitable log‐concavity properties. The results are derived by structural properties of renewal delayed processes stopped at an independent random time and by the study of log‐concavity properties of compound distributions. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 345–356, 2015  相似文献   
123.
This study provides an explanation of terrorism by examining interactions between the terrorist group with a minority as a potential pool of recruits and the government supported by a majority. A hawkish deterrence policy makes it more risky for terrorists to launch attacks, but heightens the anti‐government feeling of the terrorist group. In addition, the payoff for the government depends not only on the payoff loss associated with the level of terrorism, but also on the political payoff from the action itself of adopting a hawk policy due to its politicians’ vested interests. We first show that whether the deterrence policy should be ‘hawk to ‘dove is closely dependent on the relationships among the risk associated with terrorism, the anti‐government feeling of the terrorist group, and the political payoff for the government. This study then introduces transnational support enhancing the capability of a terrorist group to intensify its activity and shows that the emergence of transnational support may cause the government to reform its deterrence policy from ‘dove’ toward ‘hawk,’ with terrorism intensified in the society.  相似文献   
124.
An interactive economic model of military spending is proposed. It is quantified on the basis of cross section data for East Asia. Projections of military spending to the end of the decade suggest that the growth of military spending in the region will decline slightly in the current decade. East Asian military spending can, however, be greatly influenced by the path of Chinese and US military efforts. An expansion of military spending by China could cause neighboring countries to greatly increase their military expenditures.  相似文献   
125.
Abstract

This paper offers a simple strategic framework to help governments identify various policy mechanisms to minimize public sector corruption. The paper offers a formal model that blends the economics of crime with identity economics and money laundering. It presents a partial equilibrium framework that focuses on a representative public official engaged in a mix of legal and illegal effort. The model introduces various levers a government might use to impact the costs and benefits of illegal effort. The ultimate goal is to help turn volatile vicious cycles of political instability, into steady virtuous cycles of stability, growth, and sustainable development.  相似文献   
126.
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
127.
This article synthesizes three elements of power and balancing in the South China Sea (SCS): analytical perspectives on China's behaviour and intentions, the American rebalance to Asia and the dispositions of American allies and partners. Based on extensive interviews and theoretical analysis, it concludes that ‘soft balancing’ backed by American military power provides the optimum chance for resolving the growing dispute. Short to medium-term weakness of Malaysia, Philippines and Vietnam, as well as Japan, means the United States must provide much of the military power while working to build their forces. The most promising alternative is multilateral diplomacy through the Association of Southeast Asian Nations’ Regional Forum, a vehicle for negotiating a Code of Conduct and implementation of the UN Convention on the Law of the Sea. If China remains motivated mainly by defense of realist interests, the costs imposed against expansion will eventually cause recalculation of Beijing's strategy, and soft balancing by the United States and its partners has a chance of working. The constructivist perspective, stressing self-conceptualization of Chinese strategic culture, supports Chinese confidence that patience will eventually bring dominance. If China tries offensively to change the status quo, soft balancing is less likely to influence Beijing. President Xi Jin Ping appears to be offensively asserting power, seeking regional dominance before he is due to step down in 2023. This supports the finding of enhanced risks of unintended escalation in the SCS and the East China Sea.  相似文献   
128.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible.  相似文献   
129.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism.  相似文献   
130.
ABSTRACT

What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号