首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   1篇
  2017年   1篇
  2015年   1篇
  2013年   7篇
  1971年   1篇
排序方式: 共有10条查询结果,搜索用时 140 毫秒
1
1.
We consider a loss system with a fixed budget for servers. The system owner's problem is choosing the price, and selecting the number and quality of the servers, in order to maximize profits, subject to a budget constraint. We solve the problem with identical and different service rates as well as with preemptive and nonpreemptive policies. In addition, when the policy is preemptive, we prove the following conservation law: the distribution of the total service time for a customer entering the slowest server is hyperexponential with expectation equal to the average service rate independent of the allocation of the capacity. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 81–97, 2015  相似文献   
2.
This article analyzes the quality of the Egyptian and Israeli intelligence advice and decision-making process in the October 1973 War as key factors that determined its course. Following a background to the subject, we focus on the 9–13 October standstill stage, in which Sadat decided, despite his generals’ advice, to renew the Egyptian offensive. Effective Israeli intelligence collection about the coming attack, which was well used by the decision-makers, saved Israel from accepting an undesired ceasefire. The result was the 14 October failed Egyptian offensive that turned the tide of the war and led to Israeli military achievements at the war’s final stage  相似文献   
3.
Uri Tor 《战略研究杂志》2017,40(1-2):92-117
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence.  相似文献   
4.
A stochastic production-maximizing problem with transportation constraints is considered where the production rates, Rij, of man i — job j combinations are random variables rather than constants. It is shown that for the family of Weibull distributions (of which the Exponential is a special case) with scale parameters λij and shape parameter β, the plan that maximizes the expected rate of the entire line is obtained by solving a deterministic fixed charge transportation problem with no linear costs and with “set-up” cost matrix ‖λij‖.  相似文献   
5.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   
6.
According to common wisdom, the Golan provides Israel with an ideal platform for its warning stations as well as the best available defense line against a massive Syrian ground attack. Challenging this belief, this article compares the present situation with an alternative defined by (a) a complete Israeli withdrawal from the Golan, (b) a complete demilitarization of the evacuated territory, and (c) considerable limitations on Syrian military presence in the area between the Golan and Damascus. The article reaches two conclusions. First, that a combination of means, primarily airborne and space‐based platforms, can effectively answer Israel's northern intelligence needs. Second, the security arrangements set above, combined with recent revolutionary military technologies and its relative advantage in this domain, offer Israel an effective ‐ in some respects even a better ‐ alternative, to the present defense line.  相似文献   
7.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   
8.
9.
10.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号