首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   306篇
  免费   5篇
  2021年   4篇
  2019年   8篇
  2018年   5篇
  2017年   4篇
  2015年   4篇
  2014年   4篇
  2013年   56篇
  2010年   4篇
  2009年   3篇
  2008年   7篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   4篇
  2002年   3篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   4篇
  1994年   3篇
  1993年   4篇
  1992年   5篇
  1991年   8篇
  1990年   5篇
  1989年   8篇
  1988年   11篇
  1987年   7篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   4篇
  1978年   6篇
  1977年   5篇
  1976年   5篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   3篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
  1966年   6篇
排序方式: 共有311条查询结果,搜索用时 31 毫秒
241.
Data envelopment analysis (DEA) is a method for measuring the efficiency of peer decision making units (DMUs). This tool has been utilized by a number of authors to examine two‐stage processes, where all the outputs from the first stage are the only inputs to the second stage. The current article examines and extends these models using game theory concepts. The resulting models are linear, and imply an efficiency decomposition where the overall efficiency of the two‐stage process is a product of the efficiencies of the two individual stages. When there is only one intermediate measure connecting the two stages, both the noncooperative and centralized models yield the same results as applying the standard DEA model to the two stages separately. As a result, the efficiency decomposition is unique. While the noncooperative approach yields a unique efficiency decomposition under multiple intermediate measures, the centralized approach is likely to yield multiple decompositions. Models are developed to test whether the efficiency decomposition arising from the centralized approach is unique. The relations among the noncooperative, centralized, and standard DEA approaches are investigated. Two real world data sets and a randomly generated data set are used to demonstrate the models and verify our findings. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
242.
In this article we explore how two competing firms locate and set capacities to serve time‐sensitive customers. Because customers are time‐sensitive, they may decline to place an order from either competitor if their expected waiting time is large. We develop a two‐stage game where firms set capacities and then locations, and show that three types of subgame perfect equilibria are possible: local monopoly (in which each customer is served by a single firm, but some customers may be left unserved), constrained local monopoly (in which firms serve the entire interval of customers but do not compete with each other), and constrained competition (in which firms also serve the entire interval of customers, but now compete for some customers). We perform a comparative statics analysis to illustrate differences in the equilibrium behavior of a duopolist and a coordinated monopolist. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
243.
Decades of scholarship have warned against using historical analogies for policymaking. But the Taliban insurgency appears, on the surface, to confirm the usefulness of historical analogies to the British and Soviet wars in Afghanistan. I review the use of analogies for the war in Afghanistan and argue the analogies were historically unsound and strategically unhelpful. In fact, their effect on policy helped create the conditions for the very insurgency policymakers most hoped to avoid. The Taliban insurgency did not occur because of the presence of too many foreign troops and aid workers, but because there were too few.  相似文献   
244.
We solve the problem of optimal allocation of weapons to targets in the presence of layered regional defenses. The general solution technique is an integer program transformable to a minimum-cost network flow. This model assumes the defense has perfect weapons. Results of a small sample scenario are included. Additionally, a representative attrition algorithm is described and the two models combined to form a hybrid algorithm. The hybrid algorithm allows for less-than-perfect weapons while maintaining optimality.  相似文献   
245.
T identical exponential lifetime components out of which G are initially functioning (and B are not) are to be allocated to N subsystems, which are connected either in parallel or in series. Subsystem i, i = 1,…, N, functions when at least Ki of its components function and the whole system is maintained by a single repairman. Component repair times are identical independent exponentials and repaired components are as good as new. The problem of the determination of the assembly plan that will maximize the system reliability at any (arbitrary) time instant t is solved when the component failure rate is sufficiently small. For the parallel configuration, the optimal assembly plan allocates as many components as possible to the subsystem with the smallest Ki and allocates functioning components to subsystems in increasing order of the Ki's. For the series configuration, the optimal assembly plan allocates both the surplus and the functioning components equally to all subsystems whenever possible, and when not possible it favors subsystems in decreasing order of the Ki's. The solution is interpreted in the context of the optimal allocation of processors and an initial number of jobs in a problem of routing time consuming jobs to parallel multiprocessor queues. © John Wiley & Sons, Inc. Naval Research Logistics 48: 732–746, 2001  相似文献   
246.
247.
In clinical circles, the concept of “moral injury” has rapidly gained traction. Yet, from a moral philosophical point of view the concept is less clear than is suggested. That is, in current conceptualizations of moral injury, trauma’s moral dimension seems to be understood in a rather mechanistic and individualized manner. This article makes a start in developing an adequately founded conceptualization of the role of morality in deployment-related distress. It does so by reviewing and synthesizing insights from different disciplines into morality and trauma. This discussion will lead to three positions: (1) values and norms are by definition characterized by conflict, (2) moral conflict may entail important social dimensions, and (3) moral conflict may lead to altered beliefs about previously held values. These insights provide important steps in further developing conceptions of the role of morality in deployment-related suffering.  相似文献   
248.
We consider stochastic scheduling models which have the natural character that jobs improve while being processed, but deteriorate (and may possibly leave the system altogether) while processing is diverted elsewhere. Such restless bandit problems are shown to be indexable in the sense of Whittle. A numerical study which elucidates the strong performance of the resulting index policy is complemented by a theoretical study which demonstrates the optimality of the index policy under given conditions and which develops performance guarantees for the index heuristic more generally. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 706–721, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10036  相似文献   
249.
The problem considered in this article is a generalization of the familiar makespan problem, in which n jobs are allocated among m parallel processors, so as to minimize the maximum time (or cost) on any processor. Our problem is more general, in that we allow the processors to have (a) different initial costs, (b) different utilization levels before new costs are incurred, and (c) different rates of cost increase. A heuristic adapted from the bin-packing problem is shown to provide solutions which are close to optimal as the number of iterations is allowed to increase. Computational testing, over a large number of randomly generated problem instances, suggests that heuristic errors are, on average, very small.  相似文献   
250.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号