全文获取类型
收费全文 | 268篇 |
免费 | 10篇 |
专业分类
278篇 |
出版年
2020年 | 4篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 5篇 |
2016年 | 8篇 |
2015年 | 7篇 |
2014年 | 9篇 |
2013年 | 80篇 |
2012年 | 2篇 |
2011年 | 9篇 |
2010年 | 2篇 |
2009年 | 3篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 3篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 3篇 |
1999年 | 5篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1983年 | 4篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 6篇 |
1971年 | 4篇 |
1970年 | 3篇 |
1969年 | 2篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 2篇 |
排序方式: 共有278条查询结果,搜索用时 0 毫秒
81.
82.
We consider a version of the famous bin-packing problem where the cost of a bin is a concave function of the number of items in the bin. We analyze the problem from an average-case point of view and develop techniques to determine the asymptotic optimal solution value for a variety of functions. We also describe heuristic techniques that are asymptotically optimal. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 673–686, 1997 相似文献
83.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism. 相似文献
84.
85.
The assignment of personnel to teams is a fundamental managerial function typically involving several objectives and a variety of idiosyncratic practical constraints. Despite the prevalence of this task in practice, the process is seldom approached as an optimization problem over the reported preferences of all agents. This is due in part to the underlying computational complexity that occurs when intra-team interpersonal interactions are taken into consideration, and also due to game-theoretic considerations, when those taking part in the process are self-interested agents. Variants of this fundamental decision problem arise in a number of settings, including, for example, human resources and project management, military platooning, ride sharing, data clustering, and in assigning students to group projects. In this article, we study an analytical approach to “team formation” focused on the interplay between two of the most common objectives considered in the related literature: economic efficiency (i.e., the maximization of social welfare) and game-theoretic stability (e.g., finding a core solution when one exists). With a weighted objective across these two goals, the problem is modeled as a bi-level binary optimization problem, and transformed into a single-level, exponentially sized binary integer program. We then devise a branch-cut-and-price algorithm and demonstrate its efficacy through an extensive set of simulations, with favorable comparisons to other algorithms from the literature. 相似文献
86.
Many important problems in Operations Research and Statistics require the computation of nondominated (or Pareto or efficient) sets. This task may be currently undertaken efficiently for discrete sets of alternatives or for continuous sets under special and fairly tight structural conditions. Under more general continuous settings, parametric characterisations of the nondominated set, for example through convex combinations of the objective functions or ε‐constrained problems, or discretizations‐based approaches, pose several problems. In this paper, the lack of a general approach to approximate the nondominated set in continuous multiobjective problems is addressed. Our simulation‐based procedure only requires to sample from the set of alternatives and check whether an alternative dominates another. Stopping rules, efficient sampling schemes, and procedures to check for dominance are proposed. A continuous approximation to the nondominated set is obtained by fitting a surface through the points of a discrete approximation, using a local (robust) regression method. Other actions like clustering and projecting points onto the frontier are required in nonconvex feasible regions and nonconnected Pareto sets. In a sense, our method may be seen as an evolutionary algorithm with a variable population size. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
87.
Henry Sokolski 《The Nonproliferation Review》2013,20(1):179-184
Atomic Assistance: How “Atoms for Peace” Programs Cause Nuclear Insecurity, by Matthew Fuhrmann, Cornell University Press, 2012, 344 pages, $29.95. 相似文献
88.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献
89.
Doctor David J. Kilcullen 《战略研究杂志》2013,36(4):597-617
This article suggests that the War on Terrorism is actually a campaign against a globalized Islamist 1 insurgency. Therefore, counterinsurgency approaches are more relevant to the present conflict than traditional terrorism theory. Indeed, a counterinsurgency approach would generate subtly, but substantially different, policy choices in prosecuting the war against Al Qaeda. Based on this analysis, the article proposes a strategy of ‘disaggregation’ that seeks to dismantle, or break, the links in the global jihad.2 Like containment in the Cold War, disaggregation would provide a unifying strategic conception for the war – a conception that has been somewhat lacking to date. 相似文献
90.
Africa is arguably the most important regional setting for United Nations peacekeeping challenges. In the 1990s, extensive efforts have been made by the United Nations in the fleld of peacekeeping with the speciflc aim of reducing the levels of conflicts on the continent. Another significant development relates to the fact that organisations in Africa have started to feature as important peacekeeping instruments in recent years as it is increasingly being accepted that there is a need for such institutions to take care of their own security requirements. However, a key issue at stake is the need to achieve greater consistency with regard to third-party intervention in African conflicts. A look at the more glaring examples of multinational operations in the name of peace and security gives a sense of the magnitude and difficulties often experienced during such endeavours. In addition, both past and current operations have brought to light certain perspectives and lessons that require careful analysis and study. In this article, an overview is given of some of the perils and challenges associated with multinational operations in the realm of peace and security. Specifically, the focus is on Africa and on key issues and challenges regarding the strategic and operational management of such operations in view of the need to consider a more integrated approach towards multinational operations in support of peace and security in Africa. 相似文献