全文获取类型
收费全文 | 383篇 |
免费 | 5篇 |
专业分类
388篇 |
出版年
2021年 | 5篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 5篇 |
2017年 | 9篇 |
2016年 | 10篇 |
2015年 | 10篇 |
2014年 | 7篇 |
2013年 | 65篇 |
2012年 | 11篇 |
2011年 | 19篇 |
2010年 | 5篇 |
2009年 | 13篇 |
2008年 | 7篇 |
2007年 | 9篇 |
2006年 | 7篇 |
2005年 | 7篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 5篇 |
1999年 | 8篇 |
1996年 | 8篇 |
1995年 | 3篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 12篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 12篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1974年 | 5篇 |
1973年 | 2篇 |
1972年 | 8篇 |
1971年 | 5篇 |
1970年 | 8篇 |
1969年 | 4篇 |
1968年 | 4篇 |
1967年 | 5篇 |
1966年 | 3篇 |
排序方式: 共有388条查询结果,搜索用时 15 毫秒
291.
Lawrence E. Cline 《Defense & Security Analysis》2019,35(3):241-260
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities. 相似文献
292.
Ana E. Juncos 《Contemporary Security Policy》2018,39(1):95-118
ABSTRACTAttempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar. 相似文献
293.
We consider the effects of cueing in a cooperative search mission that involves several autonomous agents. Two scenarios are discussed: one in which the search is conducted by a number of identical search‐and‐engage vehicles and one where these vehicles are assisted by a search‐only (reconnaissance) asset. The cooperation between the autonomous agents is facilitated via cueing, i.e., the information transmitted to the agents by a searcher that has just detected a target. The effect of cueing on the target detection probability is derived from first principles using a Markov chain analysis. In particular, it is demonstrated that the benefit of cueing on the system's effectiveness is bounded. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
294.
In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security systems. This paper formulates problems that model multiple sets of flights originating from multiple stations (e.g., airports, terminals), where the objective is to optimize a baggage screening performance measure subject to a finite amount of resources. These measures include uncovered flight segments (UFS) and uncovered passenger segments (UPS). Three types of multiple station security problems are identified and their computational complexity is established. The problems are illustrated on two examples that use data extracted from the Official Airline Guide. The examples indicate that the problems can provide widely varying solutions based on the type of performance measure used and the restrictions imposed by the security device allocations. Moreover, the examples suggest that the allocations based on the UFS measure also provide reasonable solutions with respect to the UPS measure; however, the reverse may not be the case. This suggests that the UFS measure may provide more robust screening device allocations. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
295.
We consider the problem of safely and swiftly navigating through a spatial arrangement of potential hazard detections in which each detection has associated with it a probability that the detection is indeed a true hazard. When in close proximity to a detection, we assume the ability—for a cost—to determine whether or not the hazard is real. Our approach to this problem involves a new object, the random disambiguation path (RDP), which is a curve‐valued random variable parametrized by a binary tree with particular properties. We prove an admissibility result showing that there is positive probability that the use of an RDP reduces the expected traversal length compared to the conventional shortest zero‐risk path, and we introduce a practically computable additive‐constant approximation to the optimal RDP. The theoretical considerations are complemented by simulation and example. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
296.
Models for integrated production and demand planning decisions can serve to improve a producer's ability to effectively match demand requirements with production capabilities. In contexts with price‐sensitive demands, economies of scale in production, and multiple capacity options, such integrated planning problems can quickly become complex. To address these complexities, this paper provides profit‐maximizing production planning models for determining optimal demand and internal production capacity levels under price‐sensitive deterministic demands, with subcontracting and overtime options. The models determine a producer's optimal price, production, inventory, subcontracting, overtime, and internal capacity levels, while accounting for production economies of scale and capacity costs through concave cost functions. We use polyhedral properties and dynamic programming techniques to provide polynomial‐time solution approaches for obtaining an optimal solution for this class of problems when the internal capacity level is time‐invariant. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
297.
298.
Motivated by the presence of loss‐averse decision making behavior in practice, this article considers a supply chain consisting of a firm and strategic consumers who possess an S‐shaped loss‐averse utility function. In the model, consumers decide the purchase timing and the firm chooses the inventory level. We find that the loss‐averse consumers' strategic purchasing behavior is determined by their perceived gain and loss from strategic purchase delay, and the given rationing risk. Thus, the firm that is cognizant of this property tailors its inventory stocking policy based on the consumers' loss‐averse behavior such as their perceived values of gain and loss, and their sensitivity to them. We also demonstrate that the firm's equilibrium inventory stocking policy reflects both the economic logic of the traditional newsvendor inventory model, and the loss‐averse behavior of consumers. The equilibrium order quantity is significantly different from those derived from models that assume that the consumers are risk neutral and homogeneous in their valuations. We show that the firm that ignores strategic consumer's loss‐aversion behavior tends to keep an unnecessarily high inventory level that leads to excessive leftovers. Our numerical experiments further reveal that in some extreme cases the firm that ignores strategic consumer's loss‐aversion behavior generates almost 92% more leftovers than the firm that possesses consumers’ loss‐aversion information and takes it into account when making managerial decisions. To mitigate the consumer's forward‐looking behavior, we propose the adoption of the practice of agile supply chain management, which possesses the following attributes: (i) procuring inventory after observing real‐time demand information, (ii) enhanced design (which maintains the current production mix but improves the product performance to a higher level), and (iii) customized design (which maintains the current performance level but increases the variety of the current production line to meet consumers’ specific demands). We show that such a practice can induce the consumer to make early purchases by increasing their rationing risk, increasing the product value, or diversifying the product line. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 435–453, 2015 相似文献
299.
300.
This article examines the ship-to-shore transfer of cargo from ships that are located offshore. In these situations, cargo is transferred from the ships to smaller craft, which in turn transport the cargo the remaining distance to shore. These craft cycle back and forth from the ship to the shore until the transfer is complete. Queueing of these craft often occurs, as they must wait at either the ship or the shore for a loading or unloading position to become free. Two different methods of modeling this ship-to-shore transfer of cargo are developed and applied. One is an analytic queueing model and the other is a more traditional simulation model. The analytic model is found to produce results quite similar to the simulation model. Examples are shown that use these models to analyze trade-offs between variables affecting the ship-to-shore transfer of cargo and the total time to transfer a given amount of cargo ashore. © 1994 John Wiley & Sons, Inc. 相似文献