全文获取类型
收费全文 | 363篇 |
免费 | 14篇 |
国内免费 | 1篇 |
出版年
2021年 | 5篇 |
2019年 | 10篇 |
2018年 | 7篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 7篇 |
2013年 | 80篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 6篇 |
2009年 | 5篇 |
2008年 | 4篇 |
2007年 | 5篇 |
2006年 | 6篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 8篇 |
1994年 | 6篇 |
1993年 | 9篇 |
1992年 | 7篇 |
1991年 | 7篇 |
1989年 | 9篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 9篇 |
1984年 | 5篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 4篇 |
1980年 | 8篇 |
1979年 | 7篇 |
1978年 | 10篇 |
1977年 | 3篇 |
1976年 | 9篇 |
1975年 | 10篇 |
1974年 | 6篇 |
1973年 | 8篇 |
1972年 | 5篇 |
1971年 | 4篇 |
1970年 | 5篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 3篇 |
排序方式: 共有378条查询结果,搜索用时 15 毫秒
121.
Polling systems are used to model a wide variety of real-world applications, for example, telecommunication and material handling systems. Consequently, there is continued interest in developing efficient algorithms to analyze the performance of polling systems. Recent interest in the optimization of these systems has brought up the need for developing very efficient techniques for analyzing their waiting times. This article presents the Individual Station technique for cyclic polling systems. The technique possesses the following features: (a) it allows the user to compute the mean waiting time at a selected station independent of the mean waiting time computations at other stations, and (b) its complexity is low and independent of the system utilization. In addition the technique provides explicit closed-form expressions for (i) the mean waiting times in a system with 3 stations, and (ii) the second moment of the waiting times in a system with 2 stations, for an exhaustive service system. © 1996 John Wiley & Sons, Inc. 相似文献
122.
Studied here is the problem of evaluating the formation of coalitions in cooperative games by considering its internal and external effects. Our analysis is based upon a formal theory of the quotient game and the use of multilinear extensions to compute the Shapley value and the coalitional value. When it applies to simple games, a series of interesting results is obtained. © 1996 John Wiley & Sons, Inc. 相似文献
123.
Why did the United States fail to stop Israeli acquisition of nuclear weapons? Existing research argues that patrons such as the U.S. should have an easy time halting proliferation by militarily and economically vulnerable clients. Nevertheless, Israel acquired nuclear weapons with relatively little American opposition. Utilizing extensive primary source research, we argue that problematic intelligence-policy relations hindered U.S. efforts to arrest Israeli proliferation as (1) policymakers often gave mixed guidance to the intelligence community, resulting in (2) limited information on Israeli efforts that reinforced policy ambiguity. The results carry implications for understanding the dynamics of nuclear proliferation and intelligence-policy relations. 相似文献
124.
This article analyzes a class of stochastic contests among multiple players under risk‐averse exponential utility. In these contests, players compete over the completion of a task by simultaneously deciding on their investment, which determines how fast they complete the task. The completion time of the task for each player is assumed to be an exponentially distributed random variable with rate linear in the player's investment and the completion times of different players are assumed to be stochastically independent. The player that completes the task first earns a prize whereas the remaining players earn nothing. The article establishes a one‐to‐one correspondence between the Nash equilibrium of this contest with respect to risk‐averse exponential utilities and the nonnegative solution of a nonlinear equation. Using the properties of the latter, it proves the existence and the uniqueness of the Nash equilibrium, and provides an efficient method to compute it. It exploits the resulting representation of the equilibrium investments to determine the effects of risk aversion and the differences between the outcome of the Nash equilibrium and that of a centralized version.© 2016 Wiley Periodicals, Inc. Naval Research Logistics 66:4–14, 2019 相似文献
125.
Daniel Meier 《Small Wars & Insurgencies》2018,29(3):515-536
AbstractSince the end of the civil war in 1990, the Lebanese second Republic has experienced a dual security governance in the southern borderland region. Up to the Syrian military withdrawal in 2005, the territorial and functional ‘areas of limited statehood’ between the State and Hizbullah worked as a cooperation. After the Syrian withdrawal, various forms of cooperation appeared, raising the theoretical interest for the ‘mediated state’ framework. It is conceptualizing the cooperation between the state and the non-state actor as an interdependency – with case study ranging from the marking of the Blue Line to the struggle against the jihadists groups. 相似文献
126.
We consider the problem of efficiently scheduling deliveries by an uncapacitated courier from a central location under online arrivals. We consider both adversary‐controlled and Poisson arrival processes. In the adversarial setting we provide a randomized (3βΔ/2δ ? 1) ‐competitive algorithm, where β is the approximation ratio of the traveling salesman problem, δ is the minimum distance between the central location and any customer, and Δ is the length of the optimal traveling salesman tour overall customer locations and the central location. We provide instances showing that this analysis is tight. We also prove a 1 + 0.271Δ/δ lower‐bound on the competitive ratio of any algorithm in this setting. In the Poisson setting, we relax our assumption of deterministic travel times by assuming that travel times are distributed with a mean equal to the excursion length. We prove that optimal policies in this setting follow a threshold structure and describe this structure. For the half‐line metric space we bound the performance of the randomized algorithm in the Poisson setting, and show through numerical experiments that the performance of the algorithm is often much better than this bound. 相似文献
127.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
128.
This article investigates the relationship between U.S. overseas troops and the willingness of the citizens of host states to fight for their country. The study joins the long-running debate about burden-sharing and free-riding among U.S. allies. Unlike most previous empirical studies, we focus on non-material or intangible measures of the underlying concepts. Our dependent variable estimates the proportion of citizens expressing a willingness to fight for their country. Scores at the aggregate-national as well as the individual level are shaped by the presence of U.S. military forces, which act as a “tripwire” signaling credible security commitments. This increases opportunities of (non-material) free-riding. We present both bivariate and multivariate analyses covering the period 1981–2014 to test this supposition. Findings indicate that once U.S. troop levels reach a certain threshold (between 100 and 500 troops), citizens’ willingness to fight drops significantly. This likely reflects non-material free-riding. 相似文献
129.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities. 相似文献
130.