全文获取类型
收费全文 | 167篇 |
免费 | 2篇 |
出版年
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 8篇 |
2017年 | 5篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 60篇 |
2012年 | 2篇 |
2010年 | 1篇 |
2009年 | 1篇 |
2008年 | 3篇 |
2007年 | 1篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1975年 | 2篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有169条查询结果,搜索用时 15 毫秒
81.
We develop a simple approximation for multistage production-inventory systems with limited production capacity and variable demands. Each production stage follows a base-stock policy for echelon inventory, constrained by production capacity and the availability of upstream inventory. Our objective is to find base-stock levels that approximately minimize holding and backorder costs. The key step in our procedure approximates the distribution of echelon inventory by a sum of exponentials; the parameters of the exponentials are chosen to match asymptotically exact expressions. The computational requirements of the method are minimal. In a test bed of 72 problems, each with five production stages, the average relative error for our approximate optimization procedure is 1.9%. © 1996 John Wiley & Sons, Inc. 相似文献
82.
83.
This article analyzes a model of a multiechelon inventory system. The exogenous demands form Markov-modulated Poisson processes. That is, the demand rates are functions of an underlying Markov chain. Each location follows a base-stock policy which is independent of the state of the underlying Markov chain. We employ the exogenous transit mechanism introduced by Zipkin [7] and Svoronos and Zipkin [6]. The transit times between locations have phase-type distributions. An exact procedure to compute steady-state performance measures is presented. © 1992 John Wiley & Sons, Inc. 相似文献
84.
Does an emergency such as a natural disaster lead to a surge of terrorism? This paper contributes to the emerging literature on this issue. We consider the experience of 129 countries during the period 1998–2012 to determine the effect of a natural disaster on both domestic as well as transnational terrorism. We also control for endogeneity using expenditure on health care and land area in a country as instruments. In contrast to the existing literature, we measure the extent of terrorism by the value of property damage. The results indicate that after natural disasters, (a) transnational terrorism increases with a lag, and (b) a statistically significant impact on domestic terrorism is not observed. 相似文献
85.
This article generalizes the models in Guo and Zipkin, who focus on exponential service times, to systems with phase‐type service times. Each arriving customer decides whether to stay or balk based on his expected waiting cost, conditional on the information provided. We show how to compute the throughput and customers' average utility in each case. We then obtain some analytical and numerical results to assess the effect of more or less information. We also show that service‐time variability degrades the system's performance. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
86.
87.
88.
Thomas W. Lucas W. David Kelton Paul J. Sánchez Susan M. Sanchez Ben L. Anderson 《海军后勤学研究》2015,62(4):293-303
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015 相似文献
89.
Determination of the gunfire probability of kill against a target requires two parameters to be taken into consideration: the likelihood of hitting the target (susceptibility) and the conditional probability of kill given a hit (vulnerability). Two commonly used methods for calculating the latter probability are (1) treating each hit upon the target independently, and (2) setting an exact number of hits to obtain a target kill. Each of these methods contains an implicit assumption about the probability distribution of the number of hits‐to‐kill. Method (1) assumes that the most likely kill scenario occurs with exactly one hit, whereas (2) implies that achieving a precise number of hits always results in a kill. These methods can produce significant differences in the predicted gun effectiveness, even if the mean number of hits‐to‐kill for each distribution is the same. We therefore introduce a new modeling approach with a more general distribution for the number of hits‐to‐kill. The approach is configurable to various classes of damage mechanism and is able to match both methods (1) and (2) with a suitable choice of parameter. We use this new approach to explore the influence of various damage accumulation models on the predicted effectiveness of weapon‐target engagements. 相似文献
90.
Paul E Roitsch 《African Security Review》2014,23(1):3-16
From 2006 to 2011, al-Qaeda's East African proxy, al-Shabaab, served as the de facto ruling party of Somalia despite the efforts of the internationally recognised Transitional Federal Government (TFG). During these five years, a violent struggle between al-Shabaab and the peacekeeping force of the African Union Mission in Somalia (AMISOM) resulted in thousands of dead civilians, hundreds of thousands of internally displaced persons and a strategic environment inhospitable to reconciliation, recovery or development. By 2012, AMISOM was able to break the deadlock and force al-Shabaab from Mogadishu and Kismayo. In order to continue the momentum, the African Union and other partner nations must support the TFG in neutralising al-Shabaab throughout Somalia and providing good governance to its constituents. Al-Shabaab's revenue streams must be shut down and its offensive capability must be degraded while the strategic environment is shaped to ensure that conditions conducive to a revival do not exist. Failure to do so will likely see Somalia continuing to produce Islamist extremists and pirates to menace international maritime traffic in the western Indian Ocean, destabilise East Africa and adversely impact millions. 相似文献