首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   4篇
  2020年   2篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2015年   3篇
  2014年   1篇
  2013年   5篇
  2011年   1篇
  2009年   2篇
  2007年   1篇
  2005年   1篇
  2002年   2篇
排序方式: 共有22条查询结果,搜索用时 125 毫秒
1.
2.
3.
This article describes daily and monthly transactional and in-store display data of a large supermarket from January to October in 2019 associated with 28 757 stock-keeping units (SKUs) in 5 categories and 41 subcategories. The database contains five parts, including information about each SKU, in-store display, daily sales, inventory, and replenishment. We also propose some research questions related to assortment planning, pricing, inventory management, and customer behavior. Researchers are welcome to develop data-driven models or other innovative methods to address these questions or other practical problems using this database.  相似文献   
4.
The basic narrative of bargaining theory predicts that, all else equal, anarchy favors concessions to challengers who demonstrate the will and ability to escalate against defenders. For this reason, post-9/11 political science research explained terrorism as rational strategic behavior for non-state challengers to induce government compliance given their constraints. Over the past decade, however, empirical research has consistently found that neither escalating to terrorism nor with terrorism helps non-state actors to achieve their demands. In fact, escalating to terrorism or with terrorism increases the odds that target countries will dig in their political heels, depriving the non-state challengers of their given preferences. These empirical findings across disciplines, methodologies, as well as salient global events raise important research questions, with implications for counterterrorism strategy.  相似文献   
5.
6.
The UN asks governments to report key figures of their annual military budgets with the aim of creating trust among member states. This goal can only be achieved if the data reported is accurate. However, although there are many reasons for governments to falsify data, the UN does not check for manipulation. In this paper, we apply Benford’s law to the military expenditure data of 27 states taken from the UN register. Our analysis of the first digits shows that the states with the greatest deviations from the expected Benford distribution and therefore the lowest data quality are the USA and the UK.  相似文献   
7.
We review the operations research/management science literature on data-driven methods in retail operations. This line of work has grown rapidly in recent years, thanks to the availability of high-quality data, improvements in computing hardware, and parallel developments in machine learning methodologies. We survey state-of-the-art studies in three core aspects of retail operations—assortment optimization, order fulfillment, and inventory management. We then conclude the paper by pointing out some interesting future research possibilities for our community.  相似文献   
8.
This article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and policymakers’ efforts to make accurate decisions regarding the deployment of cyberweapons. First, laying out the life cycle of a cyberweapon, I argue that these offensive capabilities are both different in ‘degree’ and in ‘kind’ compared with other regarding their temporary ability to cause harm or damage. Second, I develop six propositions which indicate that not only technical features, inherent to the different types of cyber capabilities – that is, the type of exploited vulnerability, access and payload – but also offender and defender characteristics explain differences in transitoriness between cyberweapons. Finally, drawing out the implications, I reveal that the transitory nature of cyberweapons benefits great powers, changes the incentive structure for offensive cyber cooperation and induces a different funding structure for (military) cyber programs compared with conventional weapon programs. I also note that the time-dependent dynamic underlying cyberweapons potentially explains the limited deployment of cyberweapons compared to espionage capabilities.  相似文献   
9.
When an unreliable supplier serves multiple retailers, the retailers may compete with each other by inflating their order quantities in order to obtain their desired allocation from the supplier, a behavior known as the rationing game. We introduce capacity information sharing and a capacity reservation mechanism in the rationing game and show that a Nash equilibrium always exists. Moreover, we provide conditions guaranteeing the existence of the reverse bullwhip effect upstream, a consequence of the disruption caused by the supplier. In contrast, we also provide conditions under which the bullwhip effect does not exist. In addition, we show that a smaller unit reservation payment leads to more bullwhip and reverse bullwhip effects, while a large unit underage cost results in a more severe bullwhip effect. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 203–216, 2017  相似文献   
10.
The existing product line design literature devotes little attention to the effect of demand uncertainty. Due to demand uncertainty, the supply‐demand mismatch is inevitable which leads to different degrees of lost sales depending on the configuration of product lines. In this article, we adopt a stylized two‐segment setup with uncertain market sizes and illustrate the interplay between two effects: risk pooling that mitigates the impact of demand uncertainty and market segmentation that facilitates consumer differentiation. Compared to downward substitution, inducing bidirectional substitution through product line decisions including quality levels and prices can yield greater risk pooling effects. However, we show that the additional benefit from the risk pooling effect cannot compensate for the reduced market segmentation effect. We demonstrate that the presence of demand uncertainty can reduce the benefit of market segmentation and therefore the length of product lines in terms of the difference between products. We also propose three heuristics that separate product line and production decisions; each of these heuristics corresponds to one particular form of demand substitution. Our numerical studies indicate that the best of the three heuristics yields performance that is close to optimality. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 143–157, 2015  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号