首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   223篇
  免费   2篇
  2018年   7篇
  2017年   7篇
  2016年   8篇
  2015年   2篇
  2014年   4篇
  2013年   82篇
  2012年   2篇
  2011年   1篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2005年   5篇
  2004年   1篇
  2003年   4篇
  2002年   5篇
  2000年   3篇
  1999年   3篇
  1998年   1篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   4篇
  1993年   5篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   4篇
  1988年   1篇
  1987年   6篇
  1986年   4篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   6篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
  1974年   3篇
  1972年   3篇
  1971年   3篇
  1970年   2篇
  1969年   4篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有225条查询结果,搜索用时 15 毫秒
121.
The British Military Covenant can be located in and from many sources and from 2011 onwards in primary legislation. This article argues that the provision of military housing amounts to an early test of how the military covenant is understood and used by those involved in defence policy, and those in the armed forces affected by it. It finds that housing was a prominent feature of how service personnel understood how they were valued, but was not explicitly understood as a covenant issue by those personnel or the officials in charge of the Defence Estates. We locate three reasons for this: (1) the covenant has been poorly translated from aspiration into policy practice, (2) the covenant is unevenly understood across its stakeholders which has the effect of generating disappointment through misaligned expectations, (3) those engaged in the reform process surrounding the Defence Infrastructure Organisation (DIO) saw the covenant as a means to energise reform. Ultimately housing was seen as a dry and technocratic business area and thus an issue ripe for being refracted through the covenant was ultimately left outside of its remit.  相似文献   
122.
123.
124.
The object of this article is to investigate the risk-pooling effect of depot stock in two-echelon distribution system in which the depot serves n retailers in parallel, and to develop computationally tractable optimization procedures for such systems. The depot manager has complete information about stock levels and there are two opportunities to allocate stock to the retailers within each order cycle. We identify first- and second-order aspects to the risk-pooling effect. In particular, the second-order effect is the property that the minimum stock available to any retailer after the second allocation converges in probability to a constant as the number of retailers in the system increases, assuming independence of the demands. This property is exploited in the development of efficient procedures to determine near-optimal values of the policy parameters.  相似文献   
125.
JIT (just-in-time) is widely regarded as an excellent tool for reducing costs and cycle times, and for improving quality in manufacturing operations. JIT follows a multistep procedure. First, it identifies and prioritizes wastes or non-value-adding activities. Second, it forces these wastes to be removed. MRP (materials requirements planning) can identify the same wastes and prioritize them in the same way that JIT does, by using data from the MRP database and master production schedule, and a waste identification model. In this article, a model is developed which describes the process by which the classic JIT system identifies and prioritizes waste. An equivalent MRP waste identification model is then developed for the production environment of the classic JIT system. (The classic JIT system was developed to produce many products having low to medium volumes.) The results developed here can be extended to other production environments where adaptations of the classic JIT system are used. An example, taken from an actual application, is presented to illustrate the models and the equivalence of JIT and MRP as systems for identifying and prioritizing wastes in manufacturing. © 1993 John Wiley & Sons, Inc.  相似文献   
126.
Modification of algorithms designed for scalar computing, to take advantage of vector processing, raises several challenges. This article presents the vectorization of the primal simplex based network algorithm and results in a 50% improvement in computational time. One of the major contributors to this improvement is the matching of the size of the pricing candidate list to the vector register size. The side constraints are relaxed into a single surrogate constraint. The single constraint network algorithm is vectorized and used as the basis for solving large-scale constrained network problems. Computational experiments are presented which illustrate the vectorization of the network code as well as the ability of the surrogate constraint approach to deal with large constrained network problems.  相似文献   
127.
An infiltrator, starting at a safe base, tries to pass, undetected by a guard and within a time limit, along one of k nonintersecting arcs to a safe destination. Optimal strategies and the value are obtained for this discrete zero-sum search-evasion game.  相似文献   
128.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   
129.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号