全文获取类型
收费全文 | 543篇 |
免费 | 12篇 |
出版年
2021年 | 13篇 |
2019年 | 10篇 |
2018年 | 8篇 |
2017年 | 5篇 |
2016年 | 10篇 |
2014年 | 9篇 |
2013年 | 81篇 |
2012年 | 5篇 |
2009年 | 11篇 |
2007年 | 16篇 |
2005年 | 4篇 |
2004年 | 7篇 |
2003年 | 9篇 |
2002年 | 13篇 |
2001年 | 7篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 10篇 |
1997年 | 11篇 |
1996年 | 10篇 |
1995年 | 9篇 |
1994年 | 8篇 |
1993年 | 12篇 |
1992年 | 10篇 |
1991年 | 14篇 |
1990年 | 14篇 |
1989年 | 21篇 |
1988年 | 17篇 |
1987年 | 13篇 |
1986年 | 17篇 |
1985年 | 7篇 |
1984年 | 8篇 |
1983年 | 6篇 |
1982年 | 11篇 |
1981年 | 10篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1978年 | 11篇 |
1977年 | 10篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 10篇 |
1973年 | 9篇 |
1972年 | 4篇 |
1971年 | 8篇 |
1970年 | 8篇 |
1969年 | 8篇 |
1968年 | 3篇 |
1967年 | 6篇 |
1948年 | 4篇 |
排序方式: 共有555条查询结果,搜索用时 15 毫秒
191.
This article deals with the problem of scheduling jobs with random processing times on single machine in order to minimize the expected variance of job completion times. Sufficient conditions for the existence of V-shaped optimal sequences are derived separately for general and ordered job processing times. It is shown that when coefficient of variation of random processing times are bounded by a certain value, an optimal sequence is V-shaped. © 1997 John Wiley & Sons, Inc. 相似文献
192.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
193.
Constructing a strict total order for alternatives characterized by multiple criteria: An extension
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Akram Dehnokhalaji Pekka J. Korhonen Murat Köksalan Nasim Nasrabadi Diclehan Tezcaner Öztürk Jyrki Wallenius 《海军后勤学研究》2014,61(2):155-163
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014 相似文献
194.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally. 相似文献
195.
Richard B. Streeter Guy W. Hagen Edward E. Patenaude Dennis K. Killinger 《Defence and Peace Economics》2013,24(6):569-587
This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense. 相似文献
196.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion. 相似文献
197.
198.
Irvin R. Lindemuth 《The Nonproliferation Review》2013,20(3):483-507
Post-Cold War “lab-to-lab” collaborations on unclassified scientific issues between U.S. and Russian nuclear weapons laboratories set the stage for bilateral cooperation in materials control and other nuclear areas. They also became the major element in a cooperative process initiated by a Presidential Decision Directive to ensure Russia's compliance with the Comprehensive Nuclear-Test-Ban Treaty. These collaborations have always been highly favored by leaders of the Russian nuclear weapons complex—the same leaders who oversee Russia's participation in various government-to-government programs. This article reviews these collaborations and examines the possibility that U.S. rebuffs of Russian proposals and the U.S. failure to keep promises of expanded collaboration could contribute to Russia's reluctance in major programs and even lead to a return to nuclear testing by Russia. The author argues that a renewed U.S. commitment to the process should be an immediate goal of the Obama administration and is an essential step in re-engaging Russia to solve the nuclear problems remaining from the Cold War. Steps for doing so are recommended. 相似文献
199.
200.