全文获取类型
收费全文 | 255篇 |
免费 | 10篇 |
出版年
2020年 | 3篇 |
2019年 | 14篇 |
2018年 | 9篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 8篇 |
2014年 | 7篇 |
2013年 | 83篇 |
2011年 | 8篇 |
2010年 | 2篇 |
2009年 | 3篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 3篇 |
1999年 | 5篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 3篇 |
1972年 | 4篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有265条查询结果,搜索用时 15 毫秒
71.
72.
Command and Control (C2) in a military setting can be epitomized in battles‐of‐old when commanders would seek high ground to gain superior spatial‐temporal information; from this vantage point, decisions were made and relayed to units in the field. Although the fundamentals remain, technology has changed the practice of C2; for example, enemy units may be observed remotely, with instruments of varying positional accuracy. A basic problem in C2 is the ability to track an enemy object in the battlespace and to forecast its future position; the (extended) Kalman filter provides a straightforward solution. The problem changes fundamentally if one assumes that the moving object is headed for an (unknown) location, or waypoint. This article is concerned with the new problem of estimation of such a waypoint, for which we use Bayesian statistical prediction. The computational burden is greater than an ad hoc regression‐based estimate, which we also develop, but the Bayesian approach has a big advantage in that it yields both a predictor and a measure of its variability. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
73.
Many important problems in Operations Research and Statistics require the computation of nondominated (or Pareto or efficient) sets. This task may be currently undertaken efficiently for discrete sets of alternatives or for continuous sets under special and fairly tight structural conditions. Under more general continuous settings, parametric characterisations of the nondominated set, for example through convex combinations of the objective functions or ε‐constrained problems, or discretizations‐based approaches, pose several problems. In this paper, the lack of a general approach to approximate the nondominated set in continuous multiobjective problems is addressed. Our simulation‐based procedure only requires to sample from the set of alternatives and check whether an alternative dominates another. Stopping rules, efficient sampling schemes, and procedures to check for dominance are proposed. A continuous approximation to the nondominated set is obtained by fitting a surface through the points of a discrete approximation, using a local (robust) regression method. Other actions like clustering and projecting points onto the frontier are required in nonconvex feasible regions and nonconnected Pareto sets. In a sense, our method may be seen as an evolutionary algorithm with a variable population size. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
74.
75.
We consider order-quantity/reorder-point inventory models where the availability of supply is subject to random fluctuations. We use concepts from renewal reward processes to develop average cost objective function models for single, two, and multiple suppliers. Identifying the regenerative cycle for each problem aids the development of the cost function. In the case of two suppliers, spectral theory is used to derive explicit expressions for the transient probabilities of a four-state continuous-time Markov chain representing the status of the system. These probabilities are used to compute the exact form of the average cost expression. For the multiple-supplier problem, assuming that all the suppliers have similar availability characteristics, we develop a simple model and show that as the number of suppliers becomes large, the model reduces to the classical EOQ model. © 1996 John Wiley & Sons, Inc. 相似文献
76.
With the recent trend toward just-in-time deliveries and reduction of inventories, many firms are reexamining their inventory and logistics policies. Some firms have dramatically altered their inventory, production, and shipping policies with the goal of reducing costs and improving service. Part of this restructuring may involve a specific contract with a trucking company, or it may entail establishing in-house shipping capabilities. This restructuring, however, raises new questions regarding the choice of optimal trucking capacity, shipping frequency, and inventory levels. In this study, we examine a two-level distribution system composed of a warehouse and a retailer. We assume that demand at the retailer is random. Since the warehouse has no advance notice of the size of the retailer order, inventory must be held there as well as at the retailer. We examine inventory policies at both the warehouse and the retailer, and we explicitly consider the trucking capacity, and the frequency of deliveries from the warehouse to the retailer. Both linear and concave fixed transportation costs are examined. We find the optimal base stock policies at both locations, the optimal in-house or contracted regular truck capacity, and the optimal review period (or, equivalently, delivery frequency). For the case of normally distributed demand we provide analytical results and numerical examples that yield insight into systems of this type. Some of our results are counterintuitive. For instance, we find some cases in which the optimal truck capacity decreases as the variability of demand increases. In other cases the truck capacity increases with variability of demand. © 1993 John Wiley & Sons, Inc. 相似文献
77.
Christian Leuprecht Joseph Szeman David B. Skillicorn 《Contemporary Security Policy》2019,40(3):382-407
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity. 相似文献
78.
David J. Galbreath 《Defence Studies》2019,19(1):49-61
This paper looks at the impact of military technology diffusion on military assistance operations (MAO), in the United States known as Security Force Assistance or SFA. The discussion looks conceptually at the role of technological change and how it interacts with martial cultures in military assistant operations. I argue that growing trends in science and technology suggest potential conflicts between culture and technology. Relying on a culture-technology model drawn from anthropology, the paper contends that new technologies will present increasing challenges for the emerging MAO landscape. The paper will illustrate that the techno-science gap will continue to grow as innovations such as robotics, sensors, and networks continue to develop. Finally, the paper will look at ways to overcome this conflict between culture and technology. 相似文献
79.
David H. Ucko 《战略研究杂志》2019,42(3-4):448-479
Despite the emphasis in doctrine and academia that counterinsurgency is in its essence political, these operations are all too commonly discussed and approached as primarily military endeavors. Informed by the need to refocus counterinsurgency studies, this article revisits a foundational case of the canon – the Malayan Emergency – to discuss its political (i.e., not military) unfolding. The analysis distinguishes itself by emphasizing the diplomatic processes, negotiations, and deals that gave strategic meaning to the military operations underway. In so doing, the article also generates insight on the use of leverage and elite bargains in creating new political settlements and bringing insurgent conflicts to an end. 相似文献
80.
Ebru K. Bish Thin‐Yin Leong Chung‐Lun Li Jonathan W. C. Ng David Simchi‐Levi 《海军后勤学研究》2001,48(5):363-385
We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP‐hard and develop a heuristic algorithm based on formulating the problem as an assignment problem. The effectiveness of the heuristic is analyzed from both worst‐case and computational points of view. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 363–385, 2001 相似文献