首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   2篇
  2019年   4篇
  2017年   4篇
  2015年   3篇
  2014年   4篇
  2013年   22篇
  2011年   1篇
  2010年   1篇
  2009年   2篇
  2007年   2篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1994年   1篇
  1992年   1篇
  1982年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1971年   1篇
排序方式: 共有58条查询结果,搜索用时 234 毫秒
51.
THE NPT     
This article assesses the successes and failures of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) since its creation in 1968 by developing and applying a set of “metrics” to each of the NPT's substantive articles as well as to its withdrawal provisions. In light of this analysis, the article also puts forward some specific proposals for strengthening the NPT and its implementation, with a view to the debate and decisions at the upcoming 2010 NPT Review Conference. A concluding section turns explicitly to the 2010 NPT Review Conference and proposes pursuit of agreement on three NPT Action Plans: one for nonproliferation, one for peaceful uses, and one for nuclear disarmament. Combining vision and practicable steps, these Action Plans would set out a roadmap for action between the 2010 and the 2015 NPT Review Conferences. They could provide a foundation for substantive exchanges—in this case, on progress toward their implementation—during the preparations for the 2015 conference.  相似文献   
52.
We present a large‐scale network design model for the outbound supply chain of an automotive company that considers transportation mode selection (road vs. rail) and explicitly models the relationship between lead times and the volume of flow through the nodes of the network. We formulate the problem as a nonlinear zero‐one integer program, reformulate it to obtain a linear integer model, and develop a Lagrangian heuristic for its solution that gives near‐optimal results in reasonable time. We also present scenario analyses that examine the behavior of the supply chain under different parameter settings and the performance of the solution procedures under different experimental conditions. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
53.
In this paper the problem of minimizing makespan in a two‐machine openshop is examined. A heuristic algorithm is proposed, and its worst case performance ratio and complexity are analyzed. The average case performance is evaluated using an empirical study. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 129–145, 1999  相似文献   
54.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
55.
56.
We present transient and asymptotic reliability indices for a single‐unit system that is subject to Markov‐modulated shocks and wear. The transient results are derived from the (transform) solution of an integro‐differential equation describing the joint distribution of the cumulative degradation process and the state of the modulating process. Additionally, we prove the asymptotic normality of a properly centered and time‐scaled version of the cumulative degradation at time t. This asymptotic result leads to a simple normal approximation for a properly centered and space‐scaled version of the systes lifetime distribution. Two numerical examples illustrate the quality of the normal approximation. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
57.
We consider the problem of optimally maintaining a stochastically degrading, single‐unit system using heterogeneous spares of varying quality. The system's failures are unannounced; therefore, it is inspected periodically to determine its status (functioning or failed). The system continues in operation until it is either preventively or correctively maintained. The available maintenance options include perfect repair, which restores the system to an as‐good‐as‐new condition, and replacement with a randomly selected unit from the supply of heterogeneous spares. The objective is to minimize the total expected discounted maintenance costs over an infinite time horizon. We formulate the problem using a mixed observability Markov decision process (MOMDP) model in which the system's age is observable but its quality must be inferred. We show, under suitable conditions, the monotonicity of the optimal value function in the belief about the system quality and establish conditions under which finite preventive maintenance thresholds exist. A detailed computational study reveals that the optimal policy encourages exploration when the system's quality is uncertain; the policy is more exploitive when the quality is highly certain. The study also demonstrates that substantial cost savings are achieved by utilizing our MOMDP‐based method as compared to more naïve methods of accounting for heterogeneous spares.  相似文献   
58.
ABSTRACT

Increasingly, academic research in conflict-affected contexts relies on support from humanitarian organizations. Humanitarian organizations constitute sites of study in and of themselves; they partner with academics to roll out surveys or randomized program interventions; and they frequently facilitate security, logistics and transportation for independent researchers. We use a research partnership between IRC, the World Bank, and academic researchers in the UK, the US and eastern DR Congo, to explore the effects of humanitarian affiliation on conflict field research. In investigating when, how and under what conditions humanitarian identities are adopted by researchers (and how these affiliations shape research dynamics) we identify three paradoxes. First, “wearing humanitarian clothes” to facilitate research logistics can both facilitate and constrain access. Second, humanitarian affiliations invoked by researchers to ensure security and protection in volatile research sites can undermine the “insider” status of local staff. Finally, working through humanitarian organizations allows local and international researchers to benefit from the protections and privileges afforded to humanitarian employees without providing any of the services on which privileged access rests. In this article, we map out decisions faced by local and international researchers concerning when to adopt and discard humanitarian identities, and the fraught logistical, ethical and methodological consequences of these decisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号