首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   107篇
  免费   1篇
  2020年   1篇
  2019年   6篇
  2018年   2篇
  2017年   6篇
  2016年   1篇
  2015年   1篇
  2014年   5篇
  2013年   46篇
  2012年   1篇
  2010年   2篇
  2009年   1篇
  2007年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1980年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有108条查询结果,搜索用时 31 毫秒
21.
A critical element in implementing a compensation scheme including nonmonetary incentives (NMIs) is recognizing that preferences vary widely across Service members. There are at least three sources of variability: across different population classes, across individuals within a population class, and across NMI packages for a particular individual. Surveys across different military communities, ranks, and years of Service show the difficulty of identifying any NMI that has significant value for even 50% of the active duty force. At the same time, approximately 80% of the surveyed Service members expressed a significant positive value for at least one NMI. Therefore, one-size-fits-all incentive packages will not be nearly as effective as more personalized incentive packages. The authors discuss variability in Service member NMI preferences and outline an approach to implementing personalized NMI packages in military compensation through a sealed-bid reverse auction, where Service members select individual NMIs from a “cafeteria-style” menu of options.  相似文献   
22.
This paper provides a framework in which warranty policies for non-repairable items can be evaluated according to risk preferences of both buyers and sellers. In particular, a warranty price schedule is established such that sellers are indifferent among the policies. Given this schedule, a buyer's response is expressed by selecting the price-warranty combination that minimizes disutility. Within this framework, a warranty can be viewed as an instrumet of risk management that can induce more sales and greater profitability. For given utility functions, analytical results for the development of a price schedule are developed. Numerical results illustrate the substitution effects between warranty terms, prices, and risk parameters.  相似文献   
23.
Strategy in the Missile Age. By Bernard Brodie. RAND Corporation, Princeton University Press, Princeton, NJ, 1959. Paperback editions 1965, 1967.  相似文献   
24.
A stochastically constrained optimal replacement model for capital equipment is constructed. Each piece of capital equipment, or machine, is characterized by its age and “utility” or “readiness” class. The readiness of a machine at any age is a stochastic function of its initial utility class and its age. The total discounted replacement cost of several replacement streams, each commencing with an initial machine, is minimized with respect to the replacement age and initial utility class of each machine, subject to a readiness constraint stating the lower bound on the expected number of machines in each utility class at any time. A general solution procedure is outlined and a specific case is solved in detail.  相似文献   
25.
The problem of computing reliability and availability and their associated confidence limits for multi-component systems has appeared often in the literature. This problem arises where some or all of the component reliabilities and availabilities are statistical estimates (random variables) from test and other data. The problem of computing confidence limits has generally been considered difficult and treated only on a case-by-case basis. This paper deals with Bayes confidence limits on reliability and availability for a more general class of systems than previously considered including, as special cases, series-parallel and standby systems applications. The posterior distributions obtained are exact in theory and their numerical evaluation is limited only by computing resources, data representation and round-off in calculations. This paper collects and generalizes previous results of the authors and others. The methods presented in this paper apply both to reliability and availability analysis. The conceptual development requires only that system reliability or availability be probabilities defined in terms acceptable for a particular application. The emphasis is on Bayes Analysis and the determination of the posterior distribution functions. Having these, the calculation of point estimates and confidence limits is routine. This paper includes several examples of estimating system reliability and confidence limits based on observed component test data. Also included is an example of the numerical procedure for computing Bayes confidence limits for the reliability of a system consisting of N failure independent components connected in series. Both an exact and a new approximate numerical procedure for computing point and interval estimates of reliability are presented. A comparison is made of the results obtained from the two procedures. It is shown that the approximation is entirely sufficient for most reliability engineering analysis.  相似文献   
26.
27.
28.
Book reviews     
European Security in the New Political Environment by James H. Wyllie, London: Addison, Wesley Longman, 1997, ISBN 0-582-24403-X (pbk), £13.99

Russia and Europe: The Emerging Security Agenda edited by Vladimir Baranovsky, Oxford: Oxford University Press, SIPRI, 1997, ISBN 0-19-829201-5 (hbk), £45.00

The Defeat of Japan by David Rees, Westport, Connecticut and London: Praeger, ISBN 0-275-95955-4 (hbk), £46.50

The Collective Naval Defence of the Empire, 1900-1940 by Nicholas Tracy (ed.), London: Ashgate, for the Navy Records Society, 1997, ISBN 1859-284-027 (hbk), £59.50

Knights in White Armour The New Art of War and Peace by Christopher Bellamy, London: Pimlico Press, 1997, ISBN 0-7126-739-03 (pbk), £12.50

Regional Orders: Building Security in a New World by avid A. Lake and Patrick M. Morgan (eds), University Park: Penn State Press, 1997, ISBN 0-271-01703-i (hbk), £49.50/$55, ISBN 0-271-01704-X (pbk), £7.95/$19.95

Contested Social Orders and International Politics by David Skidmore (ed.), Nashville: Vanderbilt University Press, 1997, ISBN 0-8265-1284-4 (hbk), $32.95

The Politics of Threat: Minuteman Vulnerability in American National Security Policy by David H. Dunn. London: Macmillan Press, 1997, ISBN 0-333-67816-8 (hbk), £45.00

The Sociology of the Military by Guiseppe Caforio (ed.), Cheltenham: Edward Elgar, 1998, ISBN 1-85898-619-2, 704 pp., £150

The Nordic Nations in the New Western Security Regime by Ingemar Dorfer, Baltimore: Johns Hopkins University Press, 1997, ISBN 0-943875-83-8 (hbk), £27, ISBN 0-943875-82-X (pbk), £13  相似文献   
29.
30.
When United States (US) President Barack Obama announced in 2013 that he would host the first United States-Africa leaders' summit the next year, he was greeted with considerable scepticism. Many critics thought he was just playing catch-up with other countries and organisations which had been holding Africa summits for years, especially China. But, whatever the motives, the event itself proved to be a substantial success, probably re-setting US relations with Africa for many years to come.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号