首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
  2019年   1篇
  2018年   1篇
  2016年   1篇
  2013年   2篇
  2012年   1篇
  2009年   1篇
  2008年   1篇
排序方式: 共有8条查询结果,搜索用时 78 毫秒
1
1.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
2.
In this article, we study a two‐level lot‐sizing problem with supplier selection (LSS), which is an NP‐hard problem arising in different production planning and supply chain management applications. After presenting various formulations for LSS, and computationally comparing their strengths, we explore the polyhedral structure of one of these formulations. For this formulation, we derive several families of strong valid inequalities, and provide conditions under which they are facet‐defining. We show numerically that incorporating these valid inequalities within a branch‐and‐cut framework leads to significant improvements in computation. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 647–666, 2017  相似文献   
3.
In 1951, the French created a special unit in Indochina, the Groupement de Commandos Mixtes Aéroportés (GCMA), to deal with the unconventional side of Vietminh strategy. Its initial purpose was to destroy Vietminh subversion of the rural population and not to harass Vietminh units. The GCMA developed an efficient process of swiftly taking control of large zones in the Vietminh rear areas through the use of native contact Special Mission teams. These infiltrated the population, gathered intelligence, and established guerrilla bands. This process enabled the GCMA to increase its strength dramatically through this specialised native recruitment to 14,000 men during the latter half of 1953. An important lesson from this experience is that the isolated teams were militarily weak and thus vulnerable to any concerted Vietminh offence. Counterinsurgency thus cannot be successful without an effective coordination between conventional and unconventional forces to counter this vulnerability.  相似文献   
4.
As Canada's military mission in Afghanistan winds down and the country faces several years of fiscal austerity, all of Canada's major political parties are agreed that Canadian defence budgets must stay level or be cut. This comes at a time when the defence department is slated to replace the Canadian Forces’ (CF) major equipment fleets. Canada's defence establishment thus faces some critical decisions. One option is to try to maintain its expeditionary capabilities across all three services: army, navy and air force. Absent substantial new infusions of funds, however, this approach is likely to lead to an overall and largely chaotic reduction of capabilities. Another option is to make some difficult choices as to which expeditionary capabilities to maintain as part of a strategic review of Canada's future military needs. Such an option would ensure that Canada has at least some military capacities which can reliably be devoted to the most demanding international operations, while maintaining those capabilities required for domestic duties and North American defence. Pursuing this option would accord with the new North Atlantic Treaty Organization Strategic Concept and the call for “Smart Defense” within the Alliance. This article assesses the arguments for and against the option of specialising Canada's future defence capabilities and explores scenarios as to what a future CF may look like.  相似文献   
5.
6.
Abstract

Libya in 2011 witnessed a real process of political change, though different from all the policy-oriented jargon equating transition with a teleological transition to democracy. Due to the resilience of the Qadhafi regime in power and with the essential role of NATO intervention, the process was eased out by a eight-month civil war. Governance in post-Qadhafi Libya was not done through the rebuilding of centralized authorities. But it took the specific form of the emergence of multiple non-state actors embedded in local dynamics and then connected with weakened central authorities that had access to the huge Libyan resources. That raised complex questions about the quality of this mode of governance, especially at a time of pressing problems for Libya and its neighbors, whether direct ones (Tunisia, Egypt, Mali) or farther countries across the Mediterranean sea: terrorism with the expansion of Da’esh into the country and flows of refugees crossing Libya’s uncontrolled borders and flowing into Italy and then Europe by thousands.  相似文献   
7.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
8.
We study the scheduling situation in which a set of jobs subjected to release dates and deadlines are to be performed on a single machine. The objective is to minimize a piecewise linear objective function ∑jFj where Fj(Cj) corresponds to the cost of the completion of job j at time Cj. This class of function is very large and thus interesting both from a theoretical and practical point of view: It can be used to model total (weighted) completion time, total (weighted) tardiness, earliness and tardiness, etc. We introduce a new Mixed Integer Program (MIP) based on time interval decomposition. Our MIP is closely related to the well‐known time‐indexed MIP formulation but uses much less variables and constraints. Experiments on academic benchmarks as well as on real‐life industrial problems show that our generic MIP formulation is efficient. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号