首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   112篇
  免费   2篇
  2020年   1篇
  2019年   5篇
  2018年   2篇
  2017年   6篇
  2016年   1篇
  2015年   1篇
  2014年   5篇
  2013年   46篇
  2012年   1篇
  2010年   2篇
  2009年   1篇
  2007年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   2篇
  1992年   3篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有114条查询结果,搜索用时 15 毫秒
41.
This article develops a methodology for testing constant exchange risk properties and identifying an appropriate form for a decision maker's utility function. These risk properties characterize six different utility functions which are sums of products of polynomials and exponential functions. Such functional forms are commonly used in decision analysis applications. The practical advantage of this methodology is that these constant exchange risk properties eliminate the usual arbitrariness in the selection of a parametric utility function and often reduce the data requirements for subsequent estimation. The procedure is straightforward to apply. The decision maker need only provide certainty equivalents for two-outcome gambles and determine the more-preferred gamble in paired comparisons. The technical details of the procedure can be handled by interactive computer software.  相似文献   
42.
Three different solutions to a very simple transfer pricing problem are outlined and contrasted. These are labeled by their authors: Hirshleifer, Enzer, and Ronen and McKinney. Weaknesses associated with each solution are pointed out.  相似文献   
43.
Proposed is a Heuristic Network (HN) Procedure for balancing assembly lines. The procedure uses simple heuristic rules to generate a network which is then traversed using a shortest route algorithm to obtain a heuristic solution. The advantages of the HN Procedure are: a) it generally yields better solutions than those obtained by application of the heuristics, and b) sensitivity analysis with different values of cycle time is possible without having to regenerate the network. The rationale for its effectiveness and its application to problems with paralleling are presented. Computational experience with the procedure on up to 50 task test problems is provided.  相似文献   
44.
Book reviews     
The Balkanization of the West: The Confluence of Postmodernism and Postcommunism By Stjepan G. Mestrovic, Routledge, London (1994). ISBN: 0-414-08755-4, Price £40.00 hardback, £13.99 paperback.

A Naval History of World War I By Professor Paul G. Halpern, UCL Press, 1994. pp. 624 ISBN 1-85728-295-7. Price £25.00

Arms Watch - SIPRI Report on the First Year of the UN Register of Conventional Arms By Edward J. Laurance, Siemon T. Wezeman and Herbert Wulf, Oxford University Press for SIPRI (1993) ISBN 019-829-1795, Price £25.00 hardback, £16.50 paperback.

A League of Airmen By J. A. Winnefeld, (Ed.), RAND, Santa Monica, ISBN 08330-1503-6, Price $30.00 (Hardcover) $15.00 (Softcover)  相似文献   
45.
In this paper a stochastically constrained replacement model is formulated. This model determines a sequence of replacement dates such that the total “current account” cost of all future costs and capital expenditures over an infinite time horizon for the n initial incumbent machines is minimized subject to the constraints that an expected number of machines are in a chosen utility class at any point in time. We then indicate one possible solution method for the model.  相似文献   
46.
47.
On-site verification of ICBMs in the context of an arms control agreement might involve a situation where an inspector would choose one or more of a number of identical areas to inspect and would have confidence that the other areas had the same characteristics. This article considers optimal attack and defense of missiles deceptively based in a number of identical areas. The attacker may allocate warheads across areas as he desires and uniformly within areas. The defender may allocate interceptors across areas as he desires and either uniformly or preferentially within areas. The effect of restricting the defender to uniform allocation across areas is explored for various assumptions. Robustness of surviving missiles with respect to the number of attacking warheads is studied. Results are presented for a wide range of cases.  相似文献   
48.
A theory of additive utilities is discussed for cases where the set X, on which an individual's preference-indifference relation is defined, is a subset of the Cartesian product of n finite sets. A number of potential applications of additive utilities in decision making are presented.  相似文献   
49.
Pakistan confronts numerous domestic security challenges including jihadist extremism, Sunni-Shi'a sectarian violence, drug trafficking, illegal commodity smuggling, endemic corruption, and systemic problems with the provision of justice and law enforcement. While much has been written about US military assistance to the Government of Pakistan (GOP) and the ever-evolving political relations between the two countries, basic questions of highest policy significance related to Pakistan's internal security have never been fully studied or considered. This essay begins to address these empirical lacunae. It first provides a comprehensive examination of Pakistan's internal security environment and the effectiveness of the GOP's criminal justice structures in dealing with these challenges. The paper then goes on to assess the impact and utility of the current suite of US law enforcement assistance in helping to fortify Pakistan's domestic security environment. The study raises a number of difficult questions pertinent to the long-term impact of this support, particularly in terms of its effect on fostering a viable, accountable and transparent system of civilian governance and policing.  相似文献   
50.
Much of the literature on the decolonization of Namibia is set in a narrative mode and demonizes one or the other of the protagonists. This article, organized in a topical fashion, concerns the diplomatic, military, and economic facets of the Namibian war and draws upon the literature of comparable twentieth century colonial and anti-colonial wars in Algeria, Angola, Kenya, Mozambique, the Philippines, South Africa, Vietnam and Zimbabwe. It explores the changing discourse of legitimacy concerning independence for Namibia, the conduct of insurgency and counterinsurgency in the bush war, and economic aspects of that war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号