首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   275篇
  免费   10篇
  2021年   4篇
  2019年   7篇
  2018年   5篇
  2017年   6篇
  2016年   6篇
  2014年   8篇
  2013年   52篇
  2011年   2篇
  2010年   4篇
  2009年   6篇
  2008年   3篇
  2007年   2篇
  2006年   3篇
  2005年   5篇
  2004年   4篇
  2003年   3篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   3篇
  1998年   5篇
  1997年   7篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   8篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   3篇
  1988年   12篇
  1987年   5篇
  1986年   6篇
  1985年   9篇
  1984年   8篇
  1983年   2篇
  1982年   2篇
  1981年   3篇
  1980年   7篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   3篇
  1974年   6篇
  1973年   2篇
  1972年   2篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1967年   2篇
排序方式: 共有285条查询结果,搜索用时 31 毫秒
221.
How much does the United States care about nonproliferation? Recent scholarship suggests that the fear of spreading nuclear weapons was central to the US grand strategy in the Cold War. In one important case, however, this argument does not hold. This article draws on theoretical debates and newly declassified archives to demonstrate the primacy of geopolitics over nonproliferation in Washington’s policy toward India and Pakistan. Despite their rhetoric, Democratic and Republican leaders consistently relegated nonproliferation to the backburner whenever it conflicted with other strategic goals. Moreover, they inadvertently encouraged proliferation in South Asia at three inter-connected levels: technology, security, and identity.  相似文献   
222.
The nature of crime and conflict is rapidly evolving. Postmodern war is increasingly influenced by non-traditional and irregular combatants: non-state soldiers. These actors are exploiting technology and networked doctrine to spread their influence across traditional geographic boundaries. This emphasis on non-traditional actors accompanies a shift in political and social organization. This shift may well be a shift in state form: from nation-state to market-state. This transition is fueled by rapid developments in technology and the adoption of network organizational forms. Conflict during this transition blurs the distinctions between and among crime, terrorism and warfare. This essay explores the dynamics of terrorism, crime and private armies during this epochal shift.  相似文献   
223.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t.  相似文献   
224.
In this article we present an approach to determine the initially unspecified weights in an additive measurable multiattribute value function. We formulate and solve a series of nonlinear programming problems which (1) incorporate whatever partial information concerning the attribute weights or overall relative value of alternatives the decision maker chooses to provide, yet (2) yield a specific set of weights as a result. Although each formulation is rather easily solved using the nonlinear programming software GINO (general interactive optimizer), solutions in closed form dependent on a single parameter are also provided for a number of these problems.  相似文献   
225.
In this article we study the problem of scheduling independent tasks, each of which requires the simultaneous availability of a set of prespecified processors, with the objective of minimizing the maximum completion time. We propose a graph-theoretical approach and identify a class of polynomial instances, corresponding to comparability graphs. We show that the scheduling problem is polynomially equivalent to the problem of extending a graph to a comparability graph whose maximum weighted clique has minimum weight. Using this formulation we show that in some cases it is possible to decompose the problem according to the canonical decomposition of the graph. Finally, a general solution procedure is given that includes a branch-and-bound algorithm for the solution of subproblems which can be neither decomposed nor solved in polynomial time. Some examples and computational results are presented. © 1994 John Wiley & Sons, Inc.  相似文献   
226.
Bounds for P(X + X ⩽ k2σ) are given where X1 and X2 are independent normal variables having zero means and variances σ, σ, respectively. This is generalized when X1 and X2 are dependent variables with known covariance matrix.  相似文献   
227.
A carrier battle group is operating in an area where it is subject to attack by enemy aircraft. It is anticipated that air raids will occur in large waves. The uncertain time between raids is available for the replenishment of supplies. We consider the problem of how best to schedule ammunition replenishment during this period. The theory of Gittins indices provides the technical background to the development of a range of models which yield a hierarchy of index-based heuristics for replenishment. One such heuristic is assessed computationally in a more realistic scenario than is explicitly allowed for by the models.  相似文献   
228.
This article formulates an analytic model of just-in-time purchasing contracts and compares the minimum cost solution with the cost attainable through vertical integration. The models use standard inventory theory cost parameters and decision variables. The results quantify the increase in cost of buying an item rather than making it. Optimal incentives are characterized when JIT purchasing contracts are used. When JIT purchasing is implemented, buffer inventories are typically reduced. This inventory reduction makes on-time delivery critical to the buyer; yet timeliness is controlled by the supplier. As an incentive to provide on-time delivery, the buyer offers the supplier a bonus for on-time delivery. The supplier chooses a flow time allowance based upon the bonus offered. First- and second-order conditions are characterized in general, and examples are provided for exponentially and uniformly distributed flow times. The delivery timeliness obtainable in a vertically integrated firm is determined and compared with timeliness obtainable between separate firms. This comparison indicates that buyers who choose to purchase materials from a separate firm are more likely to experience late deliveries. The relationship between the value of the bonus and the proportion of on-time deliveries is also considered. The bonus required to achieve the same probability of on-time delivery as under vertical integration is also determined. © 1993 John Wiley & Sons, Inc.  相似文献   
229.
This article generalizes the model for the economic design of x̄-control charts of Duncan [4], starting from the more recent papers of Lorenzen and Vance [8] and Banerjee and Rahim [3]. The classical model of Duncan [4] and its several extensions including the unified model of Lorenzen and Vance [8] assumed exponentially distributed in-control periods and provided uniform sampling schemes. Banerjee and Rahim [3], however, assumed a Weibull-distributed in-control period having an increasing failure rate and used variable sampling intervals. The present article is an extension of the work of Banerjee and Rahim [3], where a general distribution of in-control periods having an increasing failure rate is assumed and the possibility of age-dependent repair before failure is considered. Several different truncated and nontruncated probability models are chosen. It is proposed that economic benefits can be achieved by adopting a nonuniform inspection scheme and by truncating a production cycle when it attains a certain age. Numerical examples are presented to support this proposition. Finally, the effect of model specification in the choice of failure mechanism is investigated. © 1993 John Wiley & Sons, Inc.  相似文献   
230.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号