首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   476篇
  免费   8篇
  484篇
  2021年   7篇
  2019年   12篇
  2018年   6篇
  2017年   9篇
  2016年   8篇
  2015年   3篇
  2014年   9篇
  2013年   99篇
  2012年   4篇
  2010年   3篇
  2009年   5篇
  2007年   13篇
  2004年   3篇
  2003年   7篇
  2002年   6篇
  2001年   3篇
  2000年   5篇
  1999年   3篇
  1998年   10篇
  1997年   9篇
  1996年   11篇
  1995年   5篇
  1994年   7篇
  1993年   12篇
  1992年   10篇
  1991年   9篇
  1990年   11篇
  1989年   19篇
  1988年   17篇
  1987年   9篇
  1986年   15篇
  1985年   9篇
  1984年   4篇
  1983年   3篇
  1982年   11篇
  1981年   6篇
  1980年   7篇
  1979年   9篇
  1978年   9篇
  1977年   6篇
  1976年   6篇
  1975年   4篇
  1974年   8篇
  1973年   5篇
  1972年   3篇
  1971年   8篇
  1970年   7篇
  1969年   6篇
  1967年   9篇
  1948年   4篇
排序方式: 共有484条查询结果,搜索用时 15 毫秒
61.
62.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
63.
64.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   
65.
An approximation for analyzing transient and nonstationary two-priority non-preemptive queueing systems is presented. This system has a three-dimensional state space, and through use of state-space partitioning in conjunction with use of conditional surrogate distributions with constant parameters an approximation is designed. Regardless of system capacity K, the approximation requires the numerical solution of only ten differential equations, compared to the K2 + K+1 Kolmogorov-forward equations required for the classic solution. Time-dependent approximations of the mean number of entities of type i and of the probability of a type-i entity being in service are obtained. Empirical test results over a wide range of systems indicate the approximation is quite accurate.  相似文献   
66.
In this article we try to identify appropriate solution procedures for different types of multiechelon production planning problems. We conduct an extensive computational study on uncapacitated multiechelon production planning problems with serial and assembly types of bill-of-material structures. Problems are formulated as both single-source fixed charge network problems and as multicommodity flow problems with fixed charges. Solution procedures considered are branch and cut, Lagrangean relaxation (for the network formulation), and branch and bound (for the multicommodity formulation). Three hundred problems with various problem structures are tested. Our conclusions suggest the best approach for each type of problem structure. © 1997 John Wiley & Sons, Inc.  相似文献   
67.
The Joint Replenishment Problem (JRP) involves production planning for a family of items. The items have a coordinated cost structure whereby a major setup cost is incurred whenever any item in the family is produced, and an item-specific minor setup cost is incurred whenever that item is produced. This paper investigates the performance of two types of cyclical production schedules for the JRP with dynamic demands over a finite planning horizon. The cyclical schedules considered are: (1) general cyclical schedules—schedules where the number of periods between successive production runs for any item is constant over the planning horizon—and (2) power-of-two schedules—a subset of cyclical schedules for which the number of periods between successive setups must be a power of 2. The paper evaluates the additional cost incurred by requiring schedules to be cyclical, and identifies problem characteristics that have a significant effect on this additional cost. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 577–589, 1997.  相似文献   
68.
69.
70.
Calculations for large Markovian finite source, finite repair capacity two-echelon repairable item inventory models are shown to be feasible using the randomization technique and a truncated state space approach. More complex models (involving transportation pipelines, multiple-item types and additional echelon levels) are also considered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号