首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   152篇
  免费   3篇
  2020年   1篇
  2019年   8篇
  2018年   3篇
  2017年   8篇
  2016年   2篇
  2015年   2篇
  2014年   5篇
  2013年   47篇
  2012年   2篇
  2011年   1篇
  2010年   4篇
  2009年   3篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   1篇
  2002年   3篇
  2001年   8篇
  2000年   3篇
  1999年   1篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   4篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有155条查询结果,搜索用时 15 毫秒
91.
This note examines estimation of the traffic intensity in an M/G/1 queue. We show that the ratio of sample mean service times to the sample mean interarrival times has undesirable sampling properties. To remedy this, two alternative estimators are introduced. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
92.
How is collective defence by players affected when they face a threat from an intelligent attacker rather than a natural threat? This paper analyses this question using a game-theoretic model. Facing an intelligent attacker has an effect if players move first and visibly set their defence strategies, thereby exposing any players who do not defend, and if the attacker is, moreover, not able to commit to a random attack. Depending on the parameters of the game, the presence of an intelligent attacker either increases the probability that players jointly defend (where such joint defence either does or does not constitute a utilitarian optimum), or decreases the probability that players jointly defend (even though joint defence is a utilitarian optimum).  相似文献   
93.
In this article, we present a multistage model to optimize inventory control decisions under stochastic demand and continuous review. We first formulate the general problem for continuous stages and use a decomposition solution approach: since it is never optimal to let orders cross, the general problem can be broken into a set of single‐unit subproblems that can be solved in a sequential fashion. These subproblems are optimal control problems for which a differential equation must be solved. This can be done easily by recursively identifying coefficients and performing a line search. The methodology is then extended to a discrete number of stages and allows us to compute the optimal solution in an efficient manner, with a competitive complexity. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 32–46, 2016  相似文献   
94.
95.
Notes     
  相似文献   
96.
This article demonstrates that assurances and carrots accompanied credible threats every time Western coercion succeeded in Bosnia. This finding is hardly surprising as it merely confirms earlier research on coercive diplomacy, but it is nevertheless important because the crucial role played by assurances and carrots has been completely ignored in most analyses to date. It also has important policy implications at a time when Western, and particularly American, policy‐makers tend to ignore this fact at their peril. US policy towards Iraq and Western policy towards Yugoslavia have been based almost exclusively on the stick in recent years, and its lack of success is therefore not surprising. If Western policy‐makers had learned the right lessons from Bosnia, they would have known that strategies coupling credible threats with credible assurances and carrots would have been more likely to succeed.  相似文献   
97.
98.
99.
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society.  相似文献   
100.
This article introduces maximum cooperative purchasing (MCP)‐situations, a new class of cooperative purchasing situations. Next, an explicit alternative mathematical characterization of the nucleolus of cooperative games is provided. The allocation of possible cost savings in MCP‐situations, in which the unit price depends on the largest order quantity within a group of players, is analyzed by defining corresponding cooperative MCP‐games. We show that a decreasing unit price is a sufficient condition for a nonempty core: there is a set of marginal vectors that belong to the core. The nucleolus of an MCP‐game can be derived in polynomial time from one of these marginal vectors. To show this result, we use the new mathematical characterization for the nucleolus for cooperative games. Using the decomposition of an MCP‐game into unanimity games, we find an explicit expression for the Shapley value. Finally, the behavior of the solution concepts is compared numerically. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 607–624, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号