首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20篇
  免费   0篇
  2022年   1篇
  2021年   1篇
  2019年   2篇
  2018年   1篇
  2017年   1篇
  2013年   5篇
  2006年   1篇
  1999年   1篇
  1986年   1篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
  1973年   1篇
  1969年   2篇
排序方式: 共有20条查询结果,搜索用时 750 毫秒
1.
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants.  相似文献   
2.
This paper demonstrates how to determine the minimal cost combination of end products and repair service capability in order to maintain a given level of operating end products. It is shown that the general rule for optimal resource allocation requires simply that the absolute value of the marginal factor cost of repair services divided by the marginal factor cost of end products be equal to the arrival rate of end products to repair. The model is applied to the problem of determining the resources required to support an operating level of Navy F-4 aircraft.  相似文献   
3.
This paper presents a quantitative index of the level of risk assumed by a contractor in various contract type situations. The definition includes expression of real world uncertainty and contractor's utility for money. Examples are given for the major contract types and special applications are discussed.  相似文献   
4.
Although cycling in the simplex method has long been known, a number of theoretical questions concerning cycling have not been fully answered. One of these, stated in [3], is to find the smallest example of cycling, and Beale's example with three equations and seven variables is conjectured to be the smallest one. The exact bounds on dimensions of cycling examples are established in this paper. We show that Beale's example is the smallest one which cycles at a non-optimal solution, that a smaller one can cycle at the optimum, and that, in general (including the completely degenerate case), a cycling example must have at least two equations, at least six variables, and at least three non-basic variables. Examples and geometries are given for the extreme cases, showing that the bounds are sharp.  相似文献   
5.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   
6.
7.
In this paper we study the impact of cancellations of customer orders on an inventory system. We develop a periodic review (s, S) inventory model with Poisson demands, deterministic demand leadtimes and supply leadtimes. When no set up cost is present for replenishment, the behavior of the system cost can be studied analytically. For the case with a fixed set up cost, we derive the operating characteristics of the model via an embedded Markov chain analysis. Based on this, we formulate the total cost function and suggest a two‐phase approach to optimization. Our model can be used to compute cancellation fees and to evaluate the impacts of various conditions of cancellation. We find that cancellations, as major sources of inventory information distortion, increase total system costs, and the magnitude of the cost impact depends on the probability of cancellation and the expected cancellation time. Other relevant lessons and insights are also discussed. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 213–231, 1999  相似文献   
8.
A manpower planning model is presented that exploits the longitudinal stability of manpower cohorts. The manpower planning process is described. An infinite horizon linear program for calculating minimum cost manpower input plans is presented and found to have a straightforward solution in a great many cases and to yield an easily implemented approximation technique in other cases.  相似文献   
9.
Since 9/11, counterinsurgency is back in fashion; the ‘war on terror’ has even been branded a ‘global counterinsurgency’. However the context within which counterinsurgency originally arose is critical to understanding the prospects for its present success; the radically changed environment in which it is currently being conducted casts into considerable doubt the validity of the doctrine's application by many national militaries currently ‘rediscovering’ this school of military thought today. Above all, classical counterinsurgency was a profoundly imperial, state-centric phenomenon; consequently it only rarely faced the thorny issue of sovereignty and legitimacy which bedevils and may doom these same efforts today.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号