全文获取类型
收费全文 | 282篇 |
免费 | 84篇 |
国内免费 | 14篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 2篇 |
2017年 | 15篇 |
2016年 | 17篇 |
2015年 | 12篇 |
2014年 | 19篇 |
2013年 | 15篇 |
2012年 | 9篇 |
2011年 | 16篇 |
2010年 | 14篇 |
2009年 | 20篇 |
2008年 | 23篇 |
2007年 | 15篇 |
2006年 | 16篇 |
2005年 | 21篇 |
2004年 | 26篇 |
2003年 | 13篇 |
2002年 | 16篇 |
2001年 | 12篇 |
2000年 | 15篇 |
1999年 | 9篇 |
1998年 | 7篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 5篇 |
1992年 | 6篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有380条查询结果,搜索用时 906 毫秒
61.
While there has been significant previous literature on inventory transshipment, most research has focused on the dealers' demand filling decision (when to fill transshipment requests from other dealers), ignoring the requesting decision (when to send transshipment requests to other dealers). In this paper we develop optimal inventory transshipment policies that incorporate both types of decisions. We consider a decentralized system in which the dealers are independent of the manufacturer and of each other. We first study a network consisting of a very large number of dealers. We prove that the optimal inventory and transshipment decisions for an individual dealer are controlled by threshold rationing and requesting levels. Then, in order to study the impact of transshipment among independent dealers in a smaller dealer network, we consider a decentralized two‐dealer network and use a game theoretic approach to characterize the equilibrium inventory strategies of the individual dealers. An extensive numerical study highlights the impact of the requesting decision on the dealers' equilibrium behavior in a decentralized setting. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
62.
The (standard) randomization method is an attractive alternative for the transient analysis of continuous time Markov models. The main advantages of the method are numerical stability, well‐controlled computation error, and ability to specify the computation error in advance. However, the fact that the method can be computationally very expensive limits its applicability. In this paper, we develop a new method called split regenerative randomization, which, having the same good properties as standard randomization, can be significantly more efficient. The method covers reliability‐like models with a particular but quite general structure and requires the selection of a subset of states and a regenerative state satisfying some conditions. For a class of continuous time Markov models, model class C2, including typical failure/repair reliability‐like models with exponential failure and repair time distributions and deferred repair, natural selections are available for both the subset of states and the regenerative state and, for those natural selections, theoretical results are available assessing the efficiency of the method in terms of “visible” model characteristics. Those results can be used to anticipate when the method can be expected to be competitive. We illustrate the application of the method using a large class C2 model and show that for models in that class the method can indeed be significantly more efficient than previously available randomization‐based methods. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
63.
Martin Schönteich 《African Security Review》2013,22(2):39-51
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance. 相似文献
64.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
65.
66.
在剖析海军装备体系与体系技术概念的基础上,分析了海军装备体系技术的特点与作用,提出了海军装备体系技术的基本构成,为海军装备体系技术的应用研究提供理论指导。 相似文献
67.
68.
69.
利用地理信息技术、数据库技术以及办公自动化技术提出了营房可视化管理系统设计方案,实现了空间数据的上传下载以及与营地实力系统数据的导入导出;并根据面向对象技术实现了对空间图层类、信息窗体类和属性数据维护类的封装,为改变传统的营房管理模式,实现营房的信息化、可视化管理作了一定的探讨。 相似文献
70.