首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   443篇
  免费   5篇
  2020年   5篇
  2019年   6篇
  2018年   11篇
  2017年   13篇
  2016年   14篇
  2015年   5篇
  2014年   6篇
  2013年   146篇
  2011年   4篇
  2010年   5篇
  2009年   4篇
  2005年   9篇
  2004年   3篇
  2003年   6篇
  2002年   7篇
  2001年   3篇
  2000年   4篇
  1999年   5篇
  1998年   4篇
  1997年   6篇
  1996年   4篇
  1995年   8篇
  1994年   7篇
  1993年   8篇
  1992年   10篇
  1991年   12篇
  1990年   3篇
  1989年   7篇
  1988年   3篇
  1987年   12篇
  1986年   7篇
  1985年   7篇
  1984年   4篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   5篇
  1979年   3篇
  1978年   10篇
  1977年   3篇
  1976年   5篇
  1975年   5篇
  1974年   9篇
  1973年   4篇
  1972年   4篇
  1971年   4篇
  1970年   5篇
  1969年   4篇
  1968年   4篇
  1967年   3篇
排序方式: 共有448条查询结果,搜索用时 0 毫秒
391.
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated.  相似文献   
392.
393.
394.
We formulate exact expressions for the expected values of selected estimators of the variance parameter (that is, the sum of covariances at all lags) of a steady‐state simulation output process. Given in terms of the autocovariance function of the process, these expressions are derived for variance estimators based on the simulation analysis methods of nonoverlapping batch means, overlapping batch means, and standardized time series. Comparing estimator performance in a first‐order autoregressive process and the M/M/1 queue‐waiting‐time process, we find that certain standardized time series estimators outperform their competitors as the sample size becomes large. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
395.
The use of conventional armed forces in a deterrent role merits close consideration. Instability in weak or failing states can have global ramifications, while efforts to build stability take time. In principle, conventional deterrence can be used to buy the time required for such stabilization efforts. Attempts at deterrence will, however, need to overcome credibility problems stemming from the technical limitations associated with conventional armed forces, and with the likely requirement for multiple external actors to deter multiple intrastate audiences. While deterrence might work under certain circumstances, it will not play as central a role in strategy as it did during the Cold War.  相似文献   
396.
Passenger prescreening is a critical component of aviation security systems. This paper introduces the Multilevel Allocation Problem (MAP), which models the screening of passengers and baggage in a multilevel aviation security system. A passenger is screened by one of several classes, each of which corresponds to a set of procedures using security screening devices, where passengers are differentiated by their perceived risk levels. Each class is defined in terms of its fixed cost (the overhead costs), its marginal cost (the additional cost to screen a passenger), and its security level. The objective of MAP is to assign each passenger to a class such that the total security is maximized subject to passenger assignments and budget constraints. This paper shows that MAP is NP‐hard and introduces a Greedy heuristic that obtains approximate solutions to MAP that use no more than two classes. Examples are constructed using data extracted from the Official Airline Guide. Analysis of the examples suggests that fewer security classes for passenger screening may be more effective and that using passenger risk information can lead to more effective security screening strategies. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
397.
398.
399.
Quantity discounts are considered in the context of the single-period inventory model known as “the newsboy problem.” It is argued that the behavioral implications of the all-units discount schedule are more complex and interesting than the literature has suggested. Consideration of this behavior and the use of marginal analysis lead to a new method for solving this problem that is both conceptually simpler and more efficient than the traditional approach. This marginal-cost solution procedure is described graphically, an algorithm is presented, and an example is used to demonstrate that this solution procedure can be extended easily to handle complex discount schedules, such as some combined (simultaneously applied) purchasing and transportation cost discount schedules.  相似文献   
400.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号