全文获取类型
收费全文 | 152篇 |
免费 | 3篇 |
出版年
2020年 | 1篇 |
2019年 | 8篇 |
2018年 | 3篇 |
2017年 | 8篇 |
2016年 | 2篇 |
2015年 | 2篇 |
2014年 | 5篇 |
2013年 | 47篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 3篇 |
2001年 | 8篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1982年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1968年 | 1篇 |
1967年 | 3篇 |
排序方式: 共有155条查询结果,搜索用时 31 毫秒
131.
通过研究椭圆曲线群,给出基于其上的2个零知识证明方案,这2个方案均使得甲方向乙方宣称自己拥有某种信息,并通过互动证明使其确信具有该信息,但同时还未泄漏该信息。 相似文献
132.
Peter De Waal 《海军后勤学研究》1993,40(5):719-731
In this article we discuss a processor sharing queueing model for a stored program controlled telephone exchange. The model incorporates the effects of both call requests and operator tasks on the load of the processor. Newly arriving call requests and operator tasks can either be admitted or rejected and for this decision the state of the queue at the moment of arrival is available as information. To guarantee a high level of service, we formulate a constrained optimization problem. Two types of access control, viz., partitioning policies and sharing policies, are considered. The optimization problem is solved for partitioning policies and the performance of both types of policies is compared. © 1993 John Wiley & Sons, Inc. 相似文献
133.
Peter C. Fishbur 《海军后勤学研究》1992,39(6):741-755
Necessary and sufficient conditions are specified for a general theory of additive measurement that presumes very little set-theoretic structure. The theory is illustrated for numerical representations in extensive, conjoint, difference, threshold, expected utility, probability, ambiguity, and subset measurement. © 1992 John Wiley & Sons, Inc. 相似文献
134.
十六大明确了新的分配原则即“生产要素按贡献参与分配原则”,这是我国收入分配理论和政策方面的革命性突破。弄清楚这一原则的确切含义、实施原因、分配形式、实现途径以及它与按劳分配之间的关系,对充分调动社会各方面的积极性,优化资源配置,切实保障广大群众的切身利益有着十分重大的意义。 相似文献
135.
136.
China’s rapid economic growth is facilitating massive increases in its military spending and causing increased security concerns in Asia and the Western Pacific. But there is uncertainty over how large China’s military spending is relative to other countries, or how fast it is growing in real terms. We address this issue by deriving a relative military cost price index based on the relative unit costs of inputs. We find that China’s real military spending is much larger than suggested by exchange rate comparisons, and even larger than standard purchasing power parity comparisons. We also find, however, that the real growth of China’s military spending has been smaller than conventionally thought. This is due to rapidly growing wages in China and the large share of personnel in China’s military budget. 相似文献
137.
138.
To manage their assets at an enterprise level, defense organizations have turned to portfolio theory for the planning, analysis and management of their military forces and materiel. Despite being well established in the commercial sector, the application of portfolio approaches in defense is problematic. The vexatious question for defense of how to define and measure benefits arising is complicated by the increased utility and effectiveness achieved through networking of military forces and the equipment they use. The authors discuss the challenges for defense in using a portfolio approach and propose a conceptual model for dealing with the effects arising from networking with information and communications technologies. 相似文献
139.
140.
Peter J. Phillips 《Defence and Peace Economics》2013,24(6):403-414
Security measures are said to increase the price of terrorism. This price has not been hitherto defined in an economically meaningful way. This paper provides a precise definition by treating the terrorists’ resource endowment as a parcel of contingent claims to political influence with a price equal to the summed value of those contingent claims in potential states of the world. Equipped with this definition, an equilibrium model of the price of terrorism is deployed. Important insights are gained into the effect of terrorists’ risk aversion at the level of the price of terrorism in different states of the world and the theoretical conclusion is reached that higher security is associated with a lower price of terrorism rather than a higher price. The implications for policy are discussed. 相似文献