首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   96篇
  免费   10篇
  国内免费   9篇
  2021年   4篇
  2020年   2篇
  2019年   13篇
  2018年   9篇
  2017年   5篇
  2016年   5篇
  2015年   3篇
  2014年   4篇
  2013年   31篇
  2012年   2篇
  2011年   3篇
  2010年   2篇
  2009年   1篇
  2008年   3篇
  2007年   4篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2001年   2篇
  2000年   6篇
  1999年   4篇
  1998年   1篇
  1997年   3篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
  1986年   1篇
排序方式: 共有115条查询结果,搜索用时 171 毫秒
21.
Book reviews     
Managing International Conflict, From Theory to Practice: a Teaching Tool Using CASCON by Lincoln P. Bloomfield and Allen Moulton, New York: St Martin's Press, 1997, ISBN 0-312-13675-7 (pbk), £18.99.

The American Century: the Rise and Decline of the United States as a World Power by Donald W. White, London: Yale University Press, 1997, ISBN 0-300-05721-0 (hbk), £25.

Humanitarian Intervention in Contemporary Conflict by Oliver Ramsbotham and Tom Woodhouse, Cambridge: Blackwell, 1996.

The US Military/NGO Relationship in Humanitarian Interventions by Chris Seiple, Peacekeeping Institute, Center for Strategic Leadership, US Army War College, 1996.

Uncivil Wars: International Security and the New Internal Conflicts by Donald M. Snow, London: Lynne Rienner Publishers, 1996, ISBN 1-55587-655-2 (pbk), £15.50, ISBN 1-55587-648-X (hbk), £33.50.

Intelligence Power in Peace and War by Michael Herman, Royal Institute for International Affairs, Cambridge: Cambridge University Press, 1996, ISBN 0-521-56231-7 (hbk), £50, ISBN 0-521-56636 (pbk), £16.95.

UK Eyes Alpha: Inside British Intelligence by Mark Urban, London: Faber and Faber, 1996, ISBN 0-571-17689-5 (hbk), £16.99.

New Cloak, Old Dagger by Michael Smith, London: Victor Gollancz, 1996, ISBN 0-575-06150-2 (hbk), £20.

Conversion Survey 1997: Global Disarmament and Disposal of Surplus Weapons by Bonn International Center for Conversion, Oxford: Oxford University Press, 1997.

Plutonium and Highly Enriched Uranium 1996: World Inventories, Capabilities and Policies by David Albright, Frans Berkhout and William Walker, Oxford: SIPRI and Oxford University Press, 1997.

The Wars of Eduard Shevardnadze by Carolyn McGiffert Ekedahl and Melvin A. Goodman, University Park, PA: Penn State University Press, 1997.  相似文献   
22.
An important aspect of supply chain management is dealing with demand and supply uncertainty. The uncertainty of future supply can be reduced if a company is able to obtain advance capacity information (ACI) about future supply/production capacity availability from its supplier. We address a periodic‐review inventory system under stochastic demand and stochastic limited supply, for which ACI is available. We show that the optimal ordering policy is a state‐dependent base‐stock policy characterized by a base‐stock level that is a function of ACI. We establish a link with inventory models that use advance demand information (ADI) by developing a capacitated inventory system with ADI, and we show that equivalence can only be set under a very specific and restrictive assumption, implying that ADI insights will not necessarily hold in the ACI environment. Our numerical results reveal several managerial insights. In particular, we show that ACI is most beneficial when there is sufficient flexibility to react to anticipated demand and supply capacity mismatches. Further, most of the benefits can be achieved with only limited future visibility. We also show that the system parameters affecting the value of ACI interact in a complex way and therefore need to be considered in an integrated manner. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
23.
We consider a single-machine problem of scheduling n independent jobs to minimize makespan, in which the processing time of job Jj grows by wj with each time unit its start is delayed beyond a given common critical date d. This processing time is pj if Jj starts by d. We show that this problem is NP-hard, give a pseudopolynomial algorithm that runs in time and O(nd) space, and develop a branch-and-bound algorithm that solves instances with up to 100 jobs in a reasonable amount of time. We also introduce the case of bounded deterioration, where the processing time of a job grows no further if the job starts after a common maximum deterioration date D > d. For this case, we give two pseudopolynomial time algorithms: one runs in O(n2d(D − d) time and O(nd(D − d)) space, the other runs in pj)2) time and pj) space. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 511–523, 1998  相似文献   
24.
Since the introduction of flexible manufacturing systems, researchers have investigated various planning and scheduling problems faced by the users of such systems. Several of these problems are not encountered in more classical production settings, and so‐called tool management problems appear to be among the more fundamental ones of these problems. Most tool management problems are hard to solve, so that numerous approximate solution techniques have been proposed to tackle them. In this paper, we investigate the quality of such algorithms by means of worst‐case analysis. We consider several polynomial‐time approximation algorithms described in the literature, and we show that all these algorithms exhibit rather poor worst‐case behavior. We also study the complexity of solving tool management problems approximately. In this respect, we investigate the interrelationships among tool management problems, as well as their relationships with other well‐known combinatorial problems such as the maximum clique problem or the set covering problem, and we prove several negative results on the approximability of various tool management problems. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 445–462, 1999  相似文献   
25.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
26.
This article intends to explain the outstanding sequence of success and failure exhibited by the FARC, the main Colombian guerrilla since the 1980s. It claims that such sequence is unintelligible unless the adoption by the FARC of a militaristic organizational blueprint at its 1982 7th Conference is taken into account. By building itself like an army, the FARC could boost its combat capacity, maintain its structural integrity, and develop powerful mechanisms that held the whole structure together. At the same time, the militarization of the FARC also entailed significant risks and costs like political isolation and high personnel turnover. After describing the militaristic blueprint, the article compares the FARC with other irregular forces that operated in the Colombian context – a comparison which is important to understand the specificity of the FARC trajectory, as well as the benefits and costs involved in it. The analysis highlights the critical role of organizational dimensions in the explanation of civil war outcomes, and suggests that at least for some problems organizational dynamics should be observed at a low level of granularity.  相似文献   
27.
The rise of China has been fuelled by a massive military modernisation programme relying, in large part, on the acquisition of foreign military equipment. The question of how the world’s major powers define their arms transfer policies towards China is therefore crucially important. This article makes two original contributions. First, drawing on neoclassical realism, it proposes an explanatory framework integrating international and domestic factors to explain variations in major powers’ arms transfers. Second, based on a large body of elite interviews and diplomatic cables, it offers the first comprehensive comparison of American, British, French and Russian arms transfer policies towards China since the end of the Cold War.  相似文献   
28.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox.  相似文献   
29.
30.
探讨了虚拟全球战争空间的概念及组成结构,提出虚拟全球战争空间经济系统建模与仿真的思路,给出了经济系统仿真模型的结构与算法,并建立了虚拟全球战争空间某地区经济系统的仿真模型原型,进行了有关的仿真实验和仿真结果分析.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号