首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   586篇
  免费   16篇
  2021年   5篇
  2019年   12篇
  2018年   5篇
  2017年   18篇
  2016年   13篇
  2015年   15篇
  2014年   16篇
  2013年   117篇
  2012年   5篇
  2011年   5篇
  2010年   8篇
  2009年   12篇
  2007年   6篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   5篇
  2002年   11篇
  2000年   7篇
  1999年   6篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1994年   16篇
  1993年   14篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   15篇
  1988年   16篇
  1987年   15篇
  1986年   17篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   10篇
  1971年   4篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有602条查询结果,搜索用时 468 毫秒
481.
This article considers the determination of the optimal base-stock inventory policy for the newsboy inventory model when there is uncertainty about either or both of its basic cost inputs: either Cu, the marginal cost of an undersupply mistake, or Co, the marginal cost of an oversupply mistake. Such uncertainties often arise in implementing the newsboy model, especially with respect to Cu, whose value depends mostly on the often-imponderable economic consequences of a lost sale or backorder. Given this uncertainty, we use decision theory to propose and analyze two measures of policy “goodness” and two base-stock selection criteria, which in combination provide four alternative “optimal” base-stock policies. Formulas and/or conditions defining each alternative policy are provided. Our empirical study indicates that the recommended policy can be quite sensitive to the measure/criterion chosen, and that the consequences of the wrong choice can be quite considerable.  相似文献   
482.
This paper considers a problem of warranty reserving, namely, the current practice of setting aside part of a product revenue to meet future claims arising from the warranty. We define a Compound Poisson stochastic model for warranty claims and reserve and obtain, using a sample paths technique, the long-run probability distribution of a warranty reserves, managed under alternative warranties and reserve policies.  相似文献   
483.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t.  相似文献   
484.
The problem considered in this article is a generalization of the familiar makespan problem, in which n jobs are allocated among m parallel processors, so as to minimize the maximum time (or cost) on any processor. Our problem is more general, in that we allow the processors to have (a) different initial costs, (b) different utilization levels before new costs are incurred, and (c) different rates of cost increase. A heuristic adapted from the bin-packing problem is shown to provide solutions which are close to optimal as the number of iterations is allowed to increase. Computational testing, over a large number of randomly generated problem instances, suggests that heuristic errors are, on average, very small.  相似文献   
485.
A general model for the failure of fibrous composite materials is described. It is shown to contain some of the well-known models in the literature. The composite material is viewed as a coherent system of independent identically distributed component strengths. Under the assumption that the applied load is redistributed “homotonically” to the unfailed components upon the failure of a component (an individual fiber segment) and that the distributions of component strengths are IFRA, it is shown that the system (composite) strength distribution is also IFRA. Examples are given using carbon reinforced composite data to illustrate the IFRA property.  相似文献   
486.
The two purposes of this article are to illustrate the power and simplicity of level crossing analysis and to present a conservation identity for M/G/1 priority queues with server vacations. To illustrate the use of level crossing analysis we apply it to preemptive (resume) priority M/G/1 queues with single- and multiple-server vacations considered by Kella and Yechiali (1986) and to non-preemptive priority M/M/c queues considered by Kella and Yechiali (1985). The conservation identity presented here states that the ratios of mean waiting times in an M/G/1 queue with and without server vacation policies are independent of the service discipline for first come first served, shortest processing time, shortest processing time within generations and non-preemptive priority service disciplines.  相似文献   
487.
ABSTRACT

The Chinese People’s Liberation Army (PLA) is halfway through a multi-decade modernization process. It has begun a major restructuring effort as it shifts its focus from a traditional continental defensive posture to a more maritime-oriented emphasis. In order to create more balanced joint force, it has adjusted the structure of its highest command organization, the Central Military Commission; abolished the former four General Departments and seven Military Regions; created five new joint Theater Commands and service-level commands for the Army and Rocket Force; and is reducing the size of its active duty force by 300,000 personnel. While seeking to overcome numerous internal obstacles, the PLA continues to develop and improve its capabilities to conduct integrated joint operations to deter a variety of threats to China’s sovereignty and territory and, if deterrence fails, to win informationized local war.  相似文献   
488.
In a military intervention, do surges work? I compare the failed ‘surge’ in Vietnam, the repulse of the Easter Invasion in 1972, as a means of assessing the more ambiguous surges in Iraq and Afghanistan. I identify four features of a surge for this analysis: the military dimensions and strategy of the surging forces, the military capabilities of the host forces, the political vitality and will of the host country, and the political commitment in the domestic politics of the intervener. I find that the last feature is the most critical; and, in all three surges, the American political commitment was lacking.  相似文献   
489.
The relationship between economic growth and military expenditure has been the subject of a large literature in defence economics. This study analyses the influence of military expenditures on economic growth in a global perspective for the time period 2000–2010 taking spatial dimension into account. The augmented Solow model is employed to investigate the defence-growth nexus using the cross-sectional data relating to 128 countries. Following a traditional regression analysis, spatial variations in the relationships are examined utilizing different spatial econometric specifications estimated by maximum likelihood. The regressions are compared with each other via likelihood ratio tests, and the spatial Durbin model is found to be the most appropriate one suggesting that the typical least-squares model is misspecified. Empirical evidence indicates that military expenditure has a positive effect on economic growth with a significant spatial dependence for the time period under consideration.  相似文献   
490.
Qualitative studies of terrorist movements frequently highlight the importance of diaspora communities as important factors in producing and sustaining terrorist activity in countries. The underlying theoretical argument is that bifurcation of tight-knit minority communities between countries nurtures separatist or irredentist sentiments among affected community members, thus prompting terrorist activity, while minority community members in other countries might mobilize financial and political resources to support terrorist activity among their compatriots. In this study, we empirically test whether transnational dispersion, versus domestic concentration, of minority communities in countries produces higher incidents of terrorism. Conducting a series of negative binomial estimations on a reshaped database of around 170 countries from 1981 to 2006, derived from the Minorities at Risk database and the Global Terrorism Database, we determine that both transnational dispersion of kin minority communities and domestic concentration of minorities within countries increase terrorism and that transnational dispersion is a particularly robust predictor of terrorist attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号