首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   477篇
  免费   12篇
  2021年   11篇
  2019年   20篇
  2018年   10篇
  2017年   10篇
  2016年   11篇
  2015年   11篇
  2014年   9篇
  2013年   93篇
  2011年   4篇
  2009年   5篇
  2008年   5篇
  2007年   5篇
  2006年   5篇
  2005年   9篇
  2004年   8篇
  2003年   6篇
  2002年   6篇
  2001年   4篇
  2000年   7篇
  1999年   4篇
  1998年   8篇
  1997年   15篇
  1996年   7篇
  1994年   10篇
  1992年   4篇
  1991年   13篇
  1990年   4篇
  1989年   7篇
  1988年   7篇
  1987年   14篇
  1986年   8篇
  1985年   6篇
  1984年   5篇
  1983年   8篇
  1982年   8篇
  1981年   5篇
  1980年   7篇
  1979年   11篇
  1978年   7篇
  1977年   8篇
  1976年   7篇
  1975年   7篇
  1974年   7篇
  1973年   12篇
  1972年   7篇
  1971年   6篇
  1970年   7篇
  1969年   6篇
  1968年   5篇
  1967年   5篇
排序方式: 共有489条查询结果,搜索用时 31 毫秒
381.
The literature on how European states have adapted to the post-cold war security environment ffocuses invariably on different understandings of military transformation, a process which is seen as inherently different from other forms of organizational change. However, as this paper argues, new management practices, going back to the introduction of so-called New Public Management (NPM) reforms throughout Europe in the 1980s, have eventually penetrated also the last bastion of the old state – the defense sector. Taking a critical approach to the idea of military transformation and existing theories of military change, the paper demonstrates how other international developments have pushed towards what may be seen as a “normalization” of Europe’s defense sectors. This has important implications for how we approach and understand change in contemporary defense organizations.  相似文献   
382.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   
383.
384.
This article discusses the behavior of three continuous sampling plans: continuous sampling plan 1 (CSP 1) and continuous sampling plan 2 (CSP 2) developed by Dodge [5] and Dodge and Torrey [7], and multilevel continuous sampling plan 2 (MLP 2) developed by Lieberman and Solomon [11], when the quality of successive units in a continuous production process follows a two-state time-homogeneous Markov chain. We first derive the average outgoing quality (AOQ) expressions of these plans. Exact procedures for determining the average outgoing quality limit (AOQL) can be obtained only for CSP 1. For CSP 2 and MLP 2 plans, iterative procedures have been used to obtain the AOQL contours. For these plans, it is assumed that the serial correlation coefficient between the two consecutive random variables of the Markov chain is known. In addition, estimation procedures for the coefficient are given. We show that if the serial correlation coefficient of the Markov chain is positive (negative), the AOQL is increased (decreased) as compared to the case when the successive units in the production process follows a Bernoulli pattern. Let r denote the number of production units examined in succession which are found to be of good quality and k denote the inverse of the sampling fraction employed when quality is good. Then if r and k are sufficiently small, it is observed from the graph that, for small departures of the serial correlation coefficient from zero, the AOQL values do not differ significantly for each of the three plans; whereas for sufficiently large values of r and k, the AOQL values differ significantly. Various aspects of these plans, such as their operating characteristics 2 (OC 2) and the serial correlation coefficient, are discussed.  相似文献   
385.
This article deals with the solution of convex quadratic programs by iteratively solving a master problem and a subproblem as proposed previously by Sacher. The approach has the advantage that the subproblems are linear programs so that advantage can be taken of existing schemes for solving large linear problems. At each step in solving the master problem, a closed-form solution can be specified so that the procedure is well suited for solving large quadratic programs and can take advantage of the constraint structure.  相似文献   
386.
A brief historical overview of the development of multiple criteria decision making (MCDM) in the USSR during the last fifteen years is presented. Soviet MCDM research is reviewed. Several applications of MCDM methodology in the USSR are described. Long-term trends in the research and application of MCDM in the Soviet Union are discussed.  相似文献   
387.
A model which allows the prediction of long-term average report rates against an array of radio emitters by a scanning sensor is presented. The model is based on Markov renewal theory.  相似文献   
388.
In this article we extend the work of Mehrez and Stulman [5] on the expected value of perfect information (EVPI) to the expected value of sample information (EVSI) for a class of economic problems dealing with the decision to reject or accept an investment project. It is shown that shifting the mean of the underlying a priori distribution of X, the project's monetary value from zero in either direction will decrease the associated EVSI of Y, the random sampled information. A theorem is then presented which gives an upper bound on the EVSI over all distributions of Y, as well as the structure of the posterior mean E[X|Y] for which this upper bound is achieved. Finally, the case where E[X|Y] is linear in Y is discussed and its performance compared with that of the optimal case.  相似文献   
389.
Traditional inventory systems treat all demands of a given item equally. This approach is optimal if the penalty costs of all customers are the same, but it is not optimal if the penalty costs are different for different customer classes. Then, demands of customers with high penalty costs must be filled before demands of customers with low penalty costs. A commonly used inventory policy for dealing with demands with different penalty costs is the critical level inventory policy. Under this policy demands with low penalty costs are filled as long as inventory is above a certain critical level. If the inventory reaches the critical level, only demands with high penalty costs are filled and demands with low penalty costs are backordered. In this article, we consider a critical level policy for a periodic review inventory system with two demand classes. Because traditional approaches cannot be used to find the optimal parameters of the policy, we use a multidimensional Markov chain to model the inventory system. We use a sample path approach to prove several properties of this inventory system. Although the cost function is not convex, we can build on these properties to develop an optimization approach that finds the optimal solution. We also present some numerical results. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
390.
We consider the problem of determining the capacity to assign to each arc in a given network, subject to uncertainty in the supply and/or demand of each node. This design problem underlies many real‐world applications, such as the design of power transmission and telecommunications networks. We first consider the case where a set of supply/demand scenarios are provided, and we must determine the minimum‐cost set of arc capacities such that a feasible flow exists for each scenario. We briefly review existing theoretical approaches to solving this problem and explore implementation strategies to reduce run times. With this as a foundation, our primary focus is on a chance‐constrained version of the problem in which α% of the scenarios must be feasible under the chosen capacity, where α is a user‐defined parameter and the specific scenarios to be satisfied are not predetermined. We describe an algorithm which utilizes a separation routine for identifying violated cut‐sets which can solve the problem to optimality, and we present computational results. We also present a novel greedy algorithm, our primary contribution, which can be used to solve for a high quality heuristic solution. We present computational analysis to evaluate the performance of our proposed approaches. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 236–246, 2016  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号