全文获取类型
收费全文 | 638篇 |
免费 | 13篇 |
出版年
2021年 | 11篇 |
2020年 | 6篇 |
2019年 | 25篇 |
2018年 | 18篇 |
2017年 | 16篇 |
2016年 | 16篇 |
2015年 | 15篇 |
2014年 | 12篇 |
2013年 | 153篇 |
2009年 | 6篇 |
2008年 | 7篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 10篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 6篇 |
2000年 | 8篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 19篇 |
1996年 | 11篇 |
1994年 | 13篇 |
1992年 | 7篇 |
1991年 | 16篇 |
1990年 | 7篇 |
1989年 | 9篇 |
1988年 | 10篇 |
1987年 | 15篇 |
1986年 | 12篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 8篇 |
1982年 | 11篇 |
1981年 | 5篇 |
1980年 | 8篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1975年 | 9篇 |
1974年 | 7篇 |
1973年 | 13篇 |
1972年 | 7篇 |
1971年 | 7篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 7篇 |
1967年 | 5篇 |
排序方式: 共有651条查询结果,搜索用时 15 毫秒
361.
In this paper an inventory model with several demand classes, prioritised according to importance, is analysed. We consider a lot‐for‐lot or (S ? 1, S) inventory model with lost sales. For each demand class there is a critical stock level at and below which demand from that class is not satisfied from stock on hand. In this way stock is retained to meet demand from higher priority demand classes. A set of such critical levels determines the stocking policy. For Poisson demand and a generally distributed lead time, we derive expressions for the service levels for each demand class and the average total cost per unit time. Efficient solution methods for obtaining optimal policies, with and without service level constraints, are presented. Numerical experiments in which the solution methods are tested demonstrate that significant cost reductions can be achieved by distinguishing between demand classes. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 593–610, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10032 相似文献
362.
We present an algorithm for solving a specially structured nonlinear integer resource allocation problem. This problem was motivated by a capacity planning study done at a large Health Maintenance Organization in Texas. Specifically, we focus on a class of nonlinear resource allocation problems that involve the minimization of a convex function over one general convex constraint, a set of block diagonal convex constraints, and bounds on the integer variables. The continuous variable problem is also considered. The continuous problem is solved by taking advantage of the structure of the Karush‐Kuhn‐Tucker (KKT) conditions. This method for solving the continuous problem is then incorporated in a branch and bound algorithm to solve the integer problem. Various reoptimization results, multiplier bounding results, and heuristics are used to improve the efficiency of the algorithms. We show how the algorithms can be extended to obtain a globally optimal solution to the nonconvex version of the problem. We further show that the methods can be applied to problems in production planning and financial optimization. Extensive computational testing of the algorithms is reported for a variety of applications on continuous problems with up to 1,000,000 variables and integer problems with up to 1000 variables. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 770–792, 2003. 相似文献
363.
In this article, we study the Shewhart chart of Q statistics proposed for the detection of process mean shifts in start‐up processes and short runs. Exact expressions for the run‐length distribution of this chart are derived and evaluated using an efficient computational procedure. The procedure can be considerably faster than using direct simulation. We extend our work to analyze the practice of requiring multiple signals from the chart before responding, a practice sometimes followed with Shewhart charts. The results show that waiting to receive multiple signals severely reduces the probability of quickly detecting shifts in certain cases, and therefore may be considered a risky practice. Operational guidelines for practitioners implementing the chart are discussed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
364.
Mafa M Sejanamane 《African Security Review》2016,25(3):288-302
After inconclusive elections in 2012, Lesotho had a coalition government for the first time, made up of three political parties that had a narrow majority in parliament. The new government, however, faced several challenges, some of which were of its own making. The agreement among the three parties was to literally divide the government into three parts, leading to a continuous stalemate in its operation; the most serious consequence was the prorogation of parliament and the resultant attempted coup. The flight of the prime minister to South Africa and his return under a Southern African Development Community (SADC) security detail provided a short-term solution to Lesotho's security crisis. Under Cyril Ramaphosa's mediation, the prorogued parliament was conditionally opened and the election date set for 28 February 2015. However, the security dilemma – whereby the prime minister, who is also minister of defence, has no control over the military – remains. When elections are held, there does not seem to be a guarantee that they will be held in peace; moreover, there are now fears that the losers will not accept the results of the elections because of the security vacuum in Lesotho. This article argues that peace can only be salvaged by enhanced SADC security before, during and after the elections. It argues that the SADC mission should remain beyond the elections to oversee the constitutional changes that are necessary for ensuring long-term stability. On their own, Lesotho politicians are unlikely to be able to work together in order to move the country forward. 相似文献
365.
Terence M Mashingaidze 《African Security Review》2016,25(4):378-392
This study is an exploration of the use of technology-mediated interventions by the Zimbabwe Peace Project (ZPP) in checkmating the country’s insidious culture of political violence and impunity. It disentangles the ZPP’s strategies and the composite reactions they triggered from state functionaries and the aligned security apparatus. The ZPP exploited and deployed an Internet-circulated monthly newsletter, bulk short message service (SMS) alerts, smartphones, radio and Facebook to shine a spotlight on injustice. It is argued that the ZPP’s whistle-blowing strategies used against human rights violators were not necessarily intended to secure immediate perpetrator conviction; rather, they were a partial but exigent attempt at using perpetrator exposure to reveal extralegal activities and checkmate the country’s culture of impunity. The ZPP’s cybernetic naming and shaming strategies embarrassed some offenders, as evidenced by the intelligence operatives and the police’s constant harassment and arrests of ZPP-affiliated activists. The state-controlled media compounded this pressure by casting aspersions on the ZPP’s bona fides, labelling it a foreign-funded organisation that was attempting to destabilise the country. Finally, this study is informed by a broad evidentiary base that includes ZPP reports on its e-archive, oral interviews, policy documents and newspaper accounts. 相似文献
366.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level. 相似文献
367.
Like airlines and hotels, sports teams and entertainment venues can benefit from revenue management efforts for their ticket sales. Teams and entertainment venues usually offer bundles of tickets early in their selling horizon and put single‐event tickets on sale at a later date; these organizations must determine the best time to offer individual tickets because both types of ticket sales consume the same fixed inventory. We model the optimal a priori timing decision for a seller with a fixed number of identical tickets to switch from selling the tickets as fixed bundles to individual tickets to maximize the revenue realized before the start of the performance season. We assume that bundle and single‐ticket customers each arrive according to independent, nonhomogeneous Markovian death processes with a linear death rate that can vary over time and that the benefit from selling a ticket in a package is higher than from selling the ticket individually. We characterize the circumstances in which it is optimal for the seller to practice mixed bundling and when the seller should only sell bundles or individual tickets, and we establish comparative statics for the optimal timing decision for the special case of constant customer arrival rates. We extend our analytical results to find the optimal time for offering two groups of tickets with high and low demand. Finally, we apply the timing model to a data set obtained from the sports industry. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
368.
Factor screening is performed to eliminate unimportant factors so that the remaining important factors can be more thoroughly studied in later experiments. Controlled sequential bifurcation (CSB) and controlled sequential factorial design (CSFD) are two new screening methods for discrete‐event simulations. Both methods use hypothesis testing procedures to control the Type I Error and power of the screening results. The scenarios for which each method is most efficient are complementary. This study proposes a two‐stage hybrid approach that combines CSFD and an improved CSB called CSB‐X. In Phase 1, a prescreening procedure will estimate each effect and determine whether CSB‐X or CSFD will be used for further screening. In Phase 2, CSB‐X and CSFD are performed separately based on the assignment of Phase 1. The new method usually has the same error control as CSB‐X and CSFD. The efficiency, on the other hand, is usually much better than either component method. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
369.
In this article, we construct and analyze an original database of overseas Chinese equity oil investments (EOI) in order to assess the relative importance of economic and geopolitical factors in determining the type of countries that are most likely to receive those investments. We find that China's national oil companies (NOCs) choose to make considerable investments in certain oil rich countries while ignoring others. We develop and examine ‘economic opportunity’ and ‘geopolitical relevance’ explanations of Chinese EOI. The economic explanation assumes that Chinese oil companies operate autonomously despite the fact that they are state owned, and that they seek international experience in countries offering less competition but more risk. The geopolitical explanation suggests that Chinese equity oil investments are developed and coordinated by the central government as part of a geopolitical strategy that is designed to bypass the so-called ‘Malacca Dilemma’ and deepen security ties with oil-rich states through the conduct of oil diplomacy. We argue that Chinese EOI tends to reflect both corporate interests and government priorities, and that it generates more liabilities rather than benefits for China. 相似文献
370.