全文获取类型
收费全文 | 214篇 |
免费 | 2篇 |
出版年
2018年 | 7篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 82篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2006年 | 1篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 6篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有216条查询结果,搜索用时 31 毫秒
111.
The British Military Covenant can be located in and from many sources and from 2011 onwards in primary legislation. This article argues that the provision of military housing amounts to an early test of how the military covenant is understood and used by those involved in defence policy, and those in the armed forces affected by it. It finds that housing was a prominent feature of how service personnel understood how they were valued, but was not explicitly understood as a covenant issue by those personnel or the officials in charge of the Defence Estates. We locate three reasons for this: (1) the covenant has been poorly translated from aspiration into policy practice, (2) the covenant is unevenly understood across its stakeholders which has the effect of generating disappointment through misaligned expectations, (3) those engaged in the reform process surrounding the Defence Infrastructure Organisation (DIO) saw the covenant as a means to energise reform. Ultimately housing was seen as a dry and technocratic business area and thus an issue ripe for being refracted through the covenant was ultimately left outside of its remit. 相似文献
112.
John E. Morrill 《海军后勤学研究》1966,13(1):49-69
This paper discusses the one-person economic survival game model with a discrete probability distribution for the contribution to surplus variable. The general game model and strategies in these games are examined, and necessary conditions which an undominated, stationary strategy must satisfy are obtained. For a special class of these games a mathematical formulation of the value of the game is given, and examples and theorems which relate to undominated strategies in this class are presented. This paper, in some sense, is a sequel to a portion of a paper by Shubik and Thompson [7] which appeared in this journal. 相似文献
113.
John M. Cozzolino 《海军后勤学研究》1970,17(2):167-181
The subject of this paper is the utilization of the “infant mortality” or decreasing failure rate effect to improve the reliability of repairable devices. Decreasing failure rate implies the possibility that devices which exhibit it can be improved by “burn-in testing” of each unit. Such a test serves to accumulate operating time while shielded from the full costs and consequences of failure. A general formulation of the burn-in test decision for repairable devices is presented and some special cases are solved. A class of models, indexed by the degree of partial replacement present in the repair process, is considered and numerical results for the optimal policy are given for several members of that class. A comparison of those results reveals the profitability of testing increases with the complexity of the repairable device. 相似文献
114.
John M. Cozzolino 《海军后勤学研究》1968,15(3):361-374
The “infant mortality” effect observed in the statistical treatment of reliability consists of a decreasing with age of the conditional probability of equipment failure (failure rate). One widely applicable explanatory hypothesis is that of population heterogeneity. This is developed here as a basis for several specific models of decreasing failure rate processes. Since, in the case of repairable devices, decreasing failure rate is often observed after the occurrence of failure and repair, consideration is extended to include repair in an explicit way. This union of failure and repair models is a fruitful one in view of the interaction between the two processes and gives a complete picture of the life of the device in terms of a stochastic process, usually with non-independent interfailure times. Four models, of particular significance due to their plausibility, mathematical tractability, and frugality of parameterization, are presented. 相似文献
115.
116.
Peter John Brobst 《Defense & Security Analysis》2000,16(2):219-221
117.
John Miltenburg 《海军后勤学研究》1993,40(7):905-924
JIT (just-in-time) is widely regarded as an excellent tool for reducing costs and cycle times, and for improving quality in manufacturing operations. JIT follows a multistep procedure. First, it identifies and prioritizes wastes or non-value-adding activities. Second, it forces these wastes to be removed. MRP (materials requirements planning) can identify the same wastes and prioritize them in the same way that JIT does, by using data from the MRP database and master production schedule, and a waste identification model. In this article, a model is developed which describes the process by which the classic JIT system identifies and prioritizes waste. An equivalent MRP waste identification model is then developed for the production environment of the classic JIT system. (The classic JIT system was developed to produce many products having low to medium volumes.) The results developed here can be extended to other production environments where adaptations of the classic JIT system are used. An example, taken from an actual application, is presented to illustrate the models and the equivalence of JIT and MRP as systems for identifying and prioritizing wastes in manufacturing. © 1993 John Wiley & Sons, Inc. 相似文献
118.
Modification of algorithms designed for scalar computing, to take advantage of vector processing, raises several challenges. This article presents the vectorization of the primal simplex based network algorithm and results in a 50% improvement in computational time. One of the major contributors to this improvement is the matching of the size of the pricing candidate list to the vector register size. The side constraints are relaxed into a single surrogate constraint. The single constraint network algorithm is vectorized and used as the basis for solving large-scale constrained network problems. Computational experiments are presented which illustrate the vectorization of the network code as well as the ability of the surrogate constraint approach to deal with large constrained network problems. 相似文献
119.
John M. Auger 《海军后勤学研究》1991,38(4):511-529
An infiltrator, starting at a safe base, tries to pass, undetected by a guard and within a time limit, along one of k nonintersecting arcs to a safe destination. Optimal strategies and the value are obtained for this discrete zero-sum search-evasion game. 相似文献
120.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency. 相似文献