首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   150篇
  免费   21篇
  国内免费   2篇
  2023年   1篇
  2022年   2篇
  2021年   6篇
  2020年   4篇
  2019年   7篇
  2018年   1篇
  2017年   4篇
  2016年   3篇
  2015年   5篇
  2014年   12篇
  2013年   29篇
  2012年   9篇
  2011年   13篇
  2010年   13篇
  2009年   12篇
  2008年   9篇
  2007年   8篇
  2006年   7篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2002年   3篇
  2001年   5篇
  2000年   1篇
  1999年   3篇
  1997年   1篇
  1996年   1篇
  1993年   1篇
  1990年   3篇
排序方式: 共有173条查询结果,搜索用时 46 毫秒
31.
We study a supply chain in which an original equipment manufacturer (OEM) and a contract manufacturer (CM) compete in the finished goods market. The OEM can decide whether to outsource the intermediate good, a critical component for producing the finished good, from the CM or make in‐house production. Technology transition improves the CM's production efficiency, and it can take two different forms: a direct technology transfer from the OEM to the CM or technology spillovers through outsourcing from the OEM to the CM. We document the possibility of strategic outsourcing, that is, the CM supplies the intermediate good to the OEM when she is less efficient than the OEM's in‐house production. We find that technology spillovers can strengthen the incentive for strategic outsourcing. Furthermore, compared with direct technology transfers, outsourcing coupled with technology spillovers may generate more technology transition. Outsourcing is a particularly appropriate channel for implicit collusion when the OEM is not very efficient with the production of the intermediate good. Our results suggest that ex post competition on the finished goods can create room for ex ante collaboration and provide some implications on the OEM's outsourcing strategies when facing a competitive CM.© 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 501–514, 2014  相似文献   
32.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
33.
基于有限维的级联马尔科夫对称信道矩阵,其转移概率的极限一定存在,推导出当n足够大时,输出符号的概率分布不依赖于输入的概率分布,使得信道容量为零,信道阻塞。n为信道级联的上限。针对主对角元素概率值不同将信道矩阵划分为惰性信道和灵敏信道,并通过仿真分析得出信道的级联上限n与矩阵维数无关,与信道矩阵主对角元素呈正相关。  相似文献   
34.
现行装备器材供应存在着供应渠道过长、不能快速响应等问题,为此通过对装备器材供应链进行集成化体系结构模型设计与构建,探讨了装备器材供应链的重构策略,分别从信息流模式重构、业务流程重构和物流体系重构等3个主要方面对装备器材供应链重构策略进行了分析与探讨,以实现装备器材供应链的快速响应.  相似文献   
35.
This paper contributes to the growing literature on the milex-growth nexus, by providing a case study of South Africa and considering the possibility of structural breaks by applying newly developed econometric methods. Using full sample bootstrap Granger non-causality tests, no Granger causal link is found between military expenditure and GDP for 1951–2010, but parameter instability tests show the estimated VARs to be unstable. Using a bootstrap rolling window estimation procedure, however, finds evidence of bidirectional Granger causality in various subsamples. This implies standard Granger non-causality tests, which neither account for structural breaks nor time variation may be invalid.  相似文献   
36.
This study revisits the causal linkages between military spending and economic growth in China and G7 countries (i.e. Canada, France, Germany, Italy, Japan, the UK, and the USA) by focusing country-specific analysis for the period 1988–2010. The panel causality analysis, which accounts for both cross-country dependency and heterogeneity across countries, is employed in this study. Our results find evidence of the neutrality hypothesis for Italy, France, and Germany, the military spending–growth detriment hypothesis for both Canada and the UK, and one-way Granger causality running from economic growth to military spending for China. Furthermore, we find a feedback between military spending and economic growth in both Japan and the USA. Thus, our results do not support that one size fits all.  相似文献   
37.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism.  相似文献   
38.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
39.
The stochastic sequential assignment problem (SSAP) considers how to allocate available distinct workers to sequentially arriving tasks with stochastic parameters such that the expected total reward obtained from the sequential assignments is maximized. Implementing the optimal assignment policy for the SSAP involves calculating a new set of breakpoints upon the arrival of each task (i.e., for every time period), which is impractical for large‐scale problems. This article studies two problems that are concerned with obtaining stationary policies, which achieve the optimal expected reward per task as the number of tasks approaches infinity. The first problem considers independent and identically distributed (IID) tasks with a known distribution function, whereas in the second problem tasks are derived from r different unobservable distributions governed by an ergodic Markov chain. The convergence rate of the expected reward per task to the optimal value is also obtained for both problems. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
40.
In this article, we consider a generic electronic product that can be remanufactured or recycled at the end of its life cycle to generate new profit. We first describe the product return process and then present a customer segmentation model to capture consumers' different behaviors with respect to product return so that the retailer can work more effectively to increase the return volume. In regard to the collaboration between the retailer and the manufacturer, we explore a revenue‐sharing coordination mechanism for achieving a win‐win outcome. The optimality and sensitivity of the critical parameters in four strategies are obtained and examined both theoretically and numerically, which generate insights on how to manage an efficient consumer‐retailer‐manufacturer reverse supply chain, as well as on the feasibility of simplifying such a three‐stage chain structure. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号