首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   89篇
  免费   3篇
  2021年   2篇
  2017年   4篇
  2015年   2篇
  2013年   16篇
  2011年   1篇
  2010年   1篇
  2008年   1篇
  2007年   2篇
  2006年   3篇
  2004年   2篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   1篇
  1996年   3篇
  1994年   4篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1989年   2篇
  1988年   1篇
  1987年   4篇
  1985年   1篇
  1984年   2篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   3篇
  1978年   1篇
  1976年   5篇
  1975年   5篇
  1974年   1篇
  1973年   1篇
  1972年   3篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1967年   1篇
排序方式: 共有92条查询结果,搜索用时 15 毫秒
21.
We consider preventive transshipments between two stores in a decentralized system with two demand subperiods. Replenishment orders are made before the first subperiod, and the stores may make transshipments to one another between the subperiods. We prove that the transshipment decision has a dominant strategy, called a control‐band conserving transfer policy, under which each store chooses a quantity to transship in or out that will keep its second‐subperiod starting inventory level within a range called a control band. We prove that the optimal replenishment policy is a threshold policy in which the threshold depends on the capacity level at the other store. Finally, we prove that there does not exist a transfer price that coordinates the decentralized supply chain. Our research also explains many of the differences between preventive and emergency transshipments, including differences in the optimal transfer policies and the existence or nonexistence of transfer prices that coordinate the system. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
22.
This article deals with the problem of scheduling jobs with random processing times on single machine in order to minimize the expected variance of job completion times. Sufficient conditions for the existence of V-shaped optimal sequences are derived separately for general and ordered job processing times. It is shown that when coefficient of variation of random processing times are bounded by a certain value, an optimal sequence is V-shaped. © 1997 John Wiley & Sons, Inc.  相似文献   
23.
Jihadist violence is typically associated with being particularly indiscriminate. Often, as in variations of the ‘new terrorism’ thesis, this characteristic is proposed to correspond in some way to its other attributes such as its globalised, decentralised and ‘postmodern’ religious nature. Recent work appears to give more substance to such claims, by claiming to show a relationship between indiscriminate violence and decentralised group organisation. However, in this paper we show, based on an analysis of jihadist targeting in Western Europe and America from 2001 to 2013, that targeting choices by jihadists unconnected to organised militant groups have in fact been consistently more, rather than less discriminate in their targeting choices than their better-integrated peers. Drawing on this finding, as well as a broader reading of jihadist targeting discourses, we argue for a more complex understanding of the relationship between radicalisation, extremist ideology, decentralisation, and targeting choice.  相似文献   
24.

This paper explores some of the key issues associated with the restructuring of the defence industry. A comparison is made between the US and the European Defence Industrial Bases in terms of the drivers for change and the paradigms within which change has taken place. Having shown that some very important differences exist, the paper then explores the approaches that have been adopted for industry consolidation and references them to the academic literature on mergers and acquisitions (M&As) and strategic alliances (SAs). Given that most of the key defence players recognise the need to be global players, the paper presents an argument that the European firms’ experience of operating with a wide range of forms of corporate alliance will serve them in good stead for operating on a global defence scale. US firms, in contrast, have focused largely on M&A activity.  相似文献   
25.
ABSTRACT

South Africa's nuclear disarmament is a unique historical case, notable in part for the dramatic shift from deception to cooperation. The unprecedented transparency it demonstrated in order to convince the international community of the veracity of their disarmament is heralded as an exemplar for verifiable denuclearization. Less known is how this case affords insights into how a nuclear weapon program can be clandestinely hidden by the ambiguity provided by an otherwise completely legitimate, peaceful, nuclear energy program. Using a variety of open sources, including newly declassified internal South African and US government reports, it can be shown that South Africa employed a variety of deceptive tactics before it disarmed, and even for nearly two years after becoming a signatory to the Treaty on the Non-Proliferation of Nuclear Weapons. This article reviews that information to derive instructive lessons on the lengths that a nuclear proliferant state might go to conceal its true capabilities and intentions, and to thwart international discovery of the existence and full extent of an existing—or, in this case, a former—nuclear weapon program.  相似文献   
26.
27.
28.
29.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013  相似文献   
30.
Scholars disagree on the prevailing focus on insurgent ideology. Some claim that the dominant Marxist ideology of the Cold War era has been supplanted by a new focus on ethnic and national identity. Others claim that many insurgencies were always focused on identity, but the Cold War and superpower antipathies distorted perceptions of insurgencies as politically-economically focused. Yet the heart of the matter is that analysts are not faced with an ‘either/or’ proposition.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号