首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12篇
  免费   0篇
  2018年   1篇
  2016年   1篇
  2013年   3篇
  1999年   1篇
  1989年   2篇
  1980年   1篇
  1974年   2篇
  1973年   1篇
排序方式: 共有12条查询结果,搜索用时 463 毫秒
1.
A basic problem in scheduling involves the sequencing of a set of independent tasks at a single facility with the objective of minimizing mean tardiness. Although the problem is relatively simple, the determination of an optimal sequence remains a challenging combinatorial problem. A number of algorithms have been developed for finding solutions, and this paper reports a comparative evaluation of these procedures. Computer programs for five separate algorithms were written and all were run on a data base designed to highlight computational differences. Optimizing algorithms developed by Emmons and by Srinivasan appeared to be particularly efficient in the comparative study.  相似文献   
2.
This paper examines heuristic solution procedures for scheduling jobs on a single machine to minimize the maximum lateness in the presence of setup times between different job families. It reviews the state of knowledge about the solution of this problem, which is known to be difficult to solve in general, and examines natural solution approaches derived from some of the underlying theory. The emphasis is on the design and computational evaluation of new heuristic procedures. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 978–991, 1999  相似文献   
3.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
4.
UNDER THE RADAR?     
Missile Contagion: Cruise Missile Proliferation and the Threat to International Security, by Dennis M. Gormley. Praeger Security International, 2008. 272 pages, $54.95.  相似文献   
5.
6.
Book reviews     
Soviet Nuclear Strategy from Stalin to Gorbachev: a Revolution in Soviet Military and Political Thinking. By Honore M. Catudal. Mansell, London (1988), ISBN 0–7201–2000–4, £25.00

The Military: More Than Just a Job? Edited by Charles C. Moskos and Frank R. Wood. Pergamon‐Brassey's, London (1988), ISBN 0–08–034321‐X, £17.00 ($30.00)

Douglas Haig, 1861–1928. By Gerard J. de Groot. Unwin Hyman, London (1988), ISBN 004 4401922, £20.00

Defence Policy Making. A Comparative Analysis. Edited by G. M. Dillon. Leicester University Press, Leicester (1988), ISBN 0–715–1268–5, £10.95

The Future of U.K. Air Power. Edited by P. Sabin. Brassey's, London (1988), ISBN 0–08–035825‐X (hardcover), 0–08–036256–7 (flexicover), hardcover £18.95 ($34.00), flexicover £9.95 ($17.95)  相似文献   

7.
After 15 years of war in Afghanistan and Iraq, many now see ‘small-footprint’ security force assistance (SFA) – training, advising and equipping allied militaries – as an alternative to large US ground-force commitments. Yet, its actual military efficacy has been little studied. This paper seeks to fill this gap. We find important limitations on SFA’s military utility, stemming from agency problems arising from systematic interest misalignment between the US and its typical partners. SFA’s achievable upper bound is modest and attainable only if US policy is intrusive and conditional, which it rarely is. For SFA, small footprints will usually mean small payoffs.  相似文献   
8.
This paper deals with the sequencing problem of minimizing linear delay costs with parallel identical processors. The theoretical properties of this m-machine problem are explored, and the problem of determining an optimum scheduling procedure is examined. Properties of the optimum schedule are given as well as the corresponding reductions in the number of schedules that must be evaluated in the search for an optimum. An experimental comparison of scheduling rules is reported; this indicates that although a class of effective heuristics can be identified, their relative behavior is difficult to characterize.  相似文献   
9.
Izbrannye Proizvedennia. By M. V. Frunze. Moscow (1957)  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号