全文获取类型
收费全文 | 152篇 |
免费 | 3篇 |
出版年
2020年 | 1篇 |
2019年 | 8篇 |
2018年 | 3篇 |
2017年 | 8篇 |
2016年 | 2篇 |
2015年 | 2篇 |
2014年 | 5篇 |
2013年 | 47篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 3篇 |
2001年 | 8篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1982年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1968年 | 1篇 |
1967年 | 3篇 |
排序方式: 共有155条查询结果,搜索用时 15 毫秒
91.
This note examines estimation of the traffic intensity in an M/G/1 queue. We show that the ratio of sample mean service times to the sample mean interarrival times has undesirable sampling properties. To remedy this, two alternative estimators are introduced. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
92.
How is collective defence by players affected when they face a threat from an intelligent attacker rather than a natural threat? This paper analyses this question using a game-theoretic model. Facing an intelligent attacker has an effect if players move first and visibly set their defence strategies, thereby exposing any players who do not defend, and if the attacker is, moreover, not able to commit to a random attack. Depending on the parameters of the game, the presence of an intelligent attacker either increases the probability that players jointly defend (where such joint defence either does or does not constitute a utilitarian optimum), or decreases the probability that players jointly defend (even though joint defence is a utilitarian optimum). 相似文献
93.
In this article, we present a multistage model to optimize inventory control decisions under stochastic demand and continuous review. We first formulate the general problem for continuous stages and use a decomposition solution approach: since it is never optimal to let orders cross, the general problem can be broken into a set of single‐unit subproblems that can be solved in a sequential fashion. These subproblems are optimal control problems for which a differential equation must be solved. This can be done easily by recursively identifying coefficients and performing a line search. The methodology is then extended to a discrete number of stages and allows us to compute the optimal solution in an efficient manner, with a competitive complexity. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 32–46, 2016 相似文献
94.
95.
96.
Peter Viggo Jakobsen 《战略研究杂志》2013,36(2):1-22
This article demonstrates that assurances and carrots accompanied credible threats every time Western coercion succeeded in Bosnia. This finding is hardly surprising as it merely confirms earlier research on coercive diplomacy, but it is nevertheless important because the crucial role played by assurances and carrots has been completely ignored in most analyses to date. It also has important policy implications at a time when Western, and particularly American, policy‐makers tend to ignore this fact at their peril. US policy towards Iraq and Western policy towards Yugoslavia have been based almost exclusively on the stick in recent years, and its lack of success is therefore not surprising. If Western policy‐makers had learned the right lessons from Bosnia, they would have known that strategies coupling credible threats with credible assurances and carrots would have been more likely to succeed. 相似文献
97.
98.
99.
Peter M. Sales 《Small Wars & Insurgencies》2013,24(1):93-97
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society. 相似文献
100.
This article introduces maximum cooperative purchasing (MCP)‐situations, a new class of cooperative purchasing situations. Next, an explicit alternative mathematical characterization of the nucleolus of cooperative games is provided. The allocation of possible cost savings in MCP‐situations, in which the unit price depends on the largest order quantity within a group of players, is analyzed by defining corresponding cooperative MCP‐games. We show that a decreasing unit price is a sufficient condition for a nonempty core: there is a set of marginal vectors that belong to the core. The nucleolus of an MCP‐game can be derived in polynomial time from one of these marginal vectors. To show this result, we use the new mathematical characterization for the nucleolus for cooperative games. Using the decomposition of an MCP‐game into unanimity games, we find an explicit expression for the Shapley value. Finally, the behavior of the solution concepts is compared numerically. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 607–624, 2013 相似文献