首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3326篇
  免费   82篇
  国内免费   1篇
  2021年   38篇
  2019年   88篇
  2018年   51篇
  2017年   80篇
  2016年   78篇
  2015年   61篇
  2014年   64篇
  2013年   697篇
  2010年   35篇
  2009年   37篇
  2008年   47篇
  2007年   52篇
  2006年   36篇
  2005年   42篇
  2004年   56篇
  2003年   42篇
  2002年   57篇
  1999年   41篇
  1998年   46篇
  1997年   48篇
  1996年   61篇
  1995年   41篇
  1994年   60篇
  1993年   63篇
  1992年   58篇
  1991年   74篇
  1990年   39篇
  1989年   72篇
  1988年   78篇
  1987年   68篇
  1986年   71篇
  1985年   66篇
  1984年   36篇
  1983年   42篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   46篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1970年   40篇
  1969年   40篇
  1968年   34篇
  1967年   33篇
排序方式: 共有3409条查询结果,搜索用时 15 毫秒
301.
We study the supplier relationship choice for a buyer that invests in transferable capacity operated by a supplier. With a long‐term relationship, the buyer commits to source from a supplier over a long period of time. With a short‐term relationship, the buyer leaves open the option of switching to a new supplier in the future. The buyer has incomplete information about a supplies efficiency, and thus uses auctions to select suppliers and determine the contracts. In addition, the buyer faces uncertain demand for the product. A long‐term relationship may be beneficial for the buyer because it motivates more aggressive bidding at the beginning, resulting a lower initial price. A short‐term relationship may be advantageous because it allows switching, with capacity transfer at some cost, to a more efficient supplier in the future. We find that there exists a critical level of the switching cost above which a long‐term relationship is better for the buyer than a short‐term relationship. In addition, this critical switching cost decreases with demand uncertainty, implying a long‐term relationship is more favorable for a buyer facing volatile demand. Finally, we find that in a long‐term relationship, capacity can be either higher or lower than in a short‐term relationship. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
302.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
303.
Extended warranties provide “piece of mind” to a consumer in that product failures which occur after the base warranty expires are rectified at little or no cost. They also provide an additional source of revenue for manufacturers or third‐party providers, such as retailers or insurance providers, and help cultivate consumer loyalty. In this article, we analyze a number of extended warranty contracts which differ in design, including restrictions on deferrals and renewals. With the use of dynamic programming, we compute the optimal strategy for a consumer with perfect information and determine the optimal pricing policy for the provider given the consumer's risk characterization. We also provide insight into when different contracts should be issued. Finally, we illustrate how profits can be dramatically increased by offering menus of warranty contracts, as opposed to stand alone contracts, with the use of integer programming. Surprisingly, risk‐taking consumers provide the greatest benefit to offering menus. These insights can help a company develop a comprehensive warranty planning strategy for given products or product lines. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
304.
305.
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance.  相似文献   
306.
ABSTRACT

In the decades following independence from Spain, ‘civil wars’ ravaged the newly established polities in South America. Former vice-regal capitals inherited a larger portion of the colonial administration and had larger economic resources and a hegemonic project they were able to have permanent and professional armed forces, capable of leading the offensive and giving battle following the European rules of military art. The central hypothesis of this work is that there is a necessary relationship between the shape of these asymmetrical conflicts, their outcome and the political territorial configuration of each country in post-revolutionary Spanish America. When permanent armies took over from local militias, the capital kept the integrity of its territories and there was a tendency towards political centralization. When this did not happen and the militias managed to find a way to defeat their centralizing enemies, the local powers had an opportunity to renegotiate their participation in the political body, and sought to maintain their independence, which was manifest in federal agreements, otherwise a process of territorial fragmentation began. More than a difference between regular and irregular forces there was one between intermittent, and permanent mobilization.  相似文献   
307.
We consider scheduling a set of jobs with deadlines to minimize the total weighted late work on a single machine, where the late work of a job is the amount of processing of the job that is scheduled after its due date and before its deadline. This is the first study on scheduling with the late work criterion under the deadline restriction. In this paper, we show that (i) the problem is unary NP‐hard even if all the jobs have a unit weight, (ii) the problem is binary NP‐hard and admits a pseudo‐polynomial‐time algorithm and a fully polynomial‐time approximation scheme if all the jobs have a common due date, and (iii) some special cases of the problem are polynomially solvable.  相似文献   
308.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances.  相似文献   
309.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
310.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号