全文获取类型
收费全文 | 215篇 |
免费 | 2篇 |
专业分类
217篇 |
出版年
2018年 | 7篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 83篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2006年 | 1篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 6篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有217条查询结果,搜索用时 11 毫秒
201.
John McCulloch 《Whitehall Papers》2013,80(1):53-57
Abstract The author provides an introduction to the Package Management System, which is transforming the relationship between MOD and the research establishments of the Defence Research Agency. 相似文献
202.
203.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
204.
A natural extension of the bucket brigade model of manufacturing is capable of chaotic behavior in which the product intercompletion times are, in effect, random, even though the model is completely deterministic. This is, we believe, the first proven instance of chaos in discrete manufacturing. Chaotic behavior represents a new challenge to the traditional tools of engineering management to reduce variability in production lines. Fortunately, if configured correctly, a bucket brigade assembly line can avoid such pathologies. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
205.
John S. Hollywood 《海军后勤学研究》2005,52(6):590-605
We develop an approximate planning model for a distributed computing network in which a control system oversees the assignment of information flows and tasks to a pool of shared computers, and describe several optimization applications using the model. We assume that the computers are multithreaded, and have differing architectures leading to varying and inconsistent processing rates. The model is based on a discrete‐time, continuous flow model developed by Graves [Oper Res 34 (1986), 522–533] which provides the steady‐state moments of production and work‐in‐queue quantities. We make several extensions to Graves' model to represent distributed computing networks. First, we approximately model control rules that are nonlinear functions of the work‐in‐queue at multiple stations through a linearization approach. Second, we introduce an additional noise term on production and show its use in modeling the discretization of jobs. Third, we model groups of heterogeneous computers as aggregate, “virtual computing cells” that process multiple tasks simultaneously, using a judiciously selected control rule. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
206.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
207.
Previous studies criticize the general use of the normal approximation of lead-time demand on the grounds that it can lead to serious errors in safety stock. We reexamine this issue for the distribution of fast-moving finished goods. We first determine the optimal reorder points and quantities by using the classical normal-approximation method and a theoretically correct procedure. We then evaluate the misspecification error of the normal approximation solution with respect to safety stock, logistics-system costs, total costs (logistics costs, including acquisition costs), and fill rates. The results provide evidence that the normal approximation is robust with respect to both cost and service for seven major industry groups. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 165–186, 1997 相似文献
208.
In this article we present a stochastic model for determining inventory rotation policies for a retail firm which must stock many hundreds of distinctive items having uncertain heterogeneous sales patterns. The model develops explicit decision rules for determining (1) the length of time that an item should remain in inventory before the decision is made on whether or not to rotate the item out of inventory and (2) the minimum sales level necessary for retaining the item in inventory. Two inventory rotation policies are developed, the first of which maximizes cumulative expected sales over a finite planning horizon and the second of which maximizes cumulative expected profit. We also consider the statistical behavior of items having uncertain, discrete, and heterogeneous sales patterns using a two-period prediction methodology where period 1 is used to accumulate information on individual sales rates and this knowledge is then used, in a Bayesian context, to make sales predictions for period 2. This methodology assumes that over an arbitrary time interval sales for each item are Poisson with unknown but stationary mean sales rates and the mean sales rates are distributed gamma across all items. We also report the application of the model to a retail firm which stocks many hundreds of distinctive unframed poster art titles. The application provides some useful insights into the behavior of the model as well as some interesting aspects pertaining to the implementation of the results in a “real-world” situation. 相似文献
209.
This article formulates an analytic model of just-in-time purchasing contracts and compares the minimum cost solution with the cost attainable through vertical integration. The models use standard inventory theory cost parameters and decision variables. The results quantify the increase in cost of buying an item rather than making it. Optimal incentives are characterized when JIT purchasing contracts are used. When JIT purchasing is implemented, buffer inventories are typically reduced. This inventory reduction makes on-time delivery critical to the buyer; yet timeliness is controlled by the supplier. As an incentive to provide on-time delivery, the buyer offers the supplier a bonus for on-time delivery. The supplier chooses a flow time allowance based upon the bonus offered. First- and second-order conditions are characterized in general, and examples are provided for exponentially and uniformly distributed flow times. The delivery timeliness obtainable in a vertically integrated firm is determined and compared with timeliness obtainable between separate firms. This comparison indicates that buyers who choose to purchase materials from a separate firm are more likely to experience late deliveries. The relationship between the value of the bonus and the proportion of on-time deliveries is also considered. The bonus required to achieve the same probability of on-time delivery as under vertical integration is also determined. © 1993 John Wiley & Sons, Inc. 相似文献
210.
Emma Matanle Rosemary Durward Richard Mills John C. Jackson 《Defense & Security Analysis》1995,11(2):217-222
Nuclear Non-Proliferation and Global Order. By Harald Muller, David Fischer, and Wolfgang Kotter. SIPRI, Oxford, Oxford University Press, (1994) ISBN 0-19-329155-8, hardback, £25.00
Conventional Arms Control: Perspectives on Verification By Sergey Koulik and Richard Kokoski, SIPRI, Oxford University Press, (1994) ISBN 0-19-829149-3 and
Implementing the Comprehensive Test Ban: New Aspects of Definition, Organisation and Verification Edited by Eric Arnett, SIPRI Research Report No. 8, Oxford University Press, (1994) ISBN 019-829188-4
Military Technological Innovation and Stability in a Changing World: Politically assessing and Influencing Weapons Innovation and Military Research and Development, By Wim A. Smit, John Grin and Lev Voronkov (eds.) VU University Press, Amsterdam, Netherlands (1992), ISBN 90-5383-158-4.
Security, democracy, and development in US - Latin American relations. By Lars Schoultz, William C. Smith and Augusto Varas (eds.) Transaction Publishers, New Brunswick (USA), and London (UK) (1994). ISBN 1-56000-760-5 相似文献
Conventional Arms Control: Perspectives on Verification By Sergey Koulik and Richard Kokoski, SIPRI, Oxford University Press, (1994) ISBN 0-19-829149-3 and
Implementing the Comprehensive Test Ban: New Aspects of Definition, Organisation and Verification Edited by Eric Arnett, SIPRI Research Report No. 8, Oxford University Press, (1994) ISBN 019-829188-4
Military Technological Innovation and Stability in a Changing World: Politically assessing and Influencing Weapons Innovation and Military Research and Development, By Wim A. Smit, John Grin and Lev Voronkov (eds.) VU University Press, Amsterdam, Netherlands (1992), ISBN 90-5383-158-4.
Security, democracy, and development in US - Latin American relations. By Lars Schoultz, William C. Smith and Augusto Varas (eds.) Transaction Publishers, New Brunswick (USA), and London (UK) (1994). ISBN 1-56000-760-5 相似文献