首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
  2020年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2014年   1篇
  2013年   4篇
  2012年   2篇
  2011年   1篇
  2008年   1篇
  2005年   1篇
  2003年   2篇
  2001年   1篇
  1999年   1篇
  1995年   1篇
  1994年   1篇
  1989年   1篇
  1986年   1篇
  1984年   1篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1973年   1篇
  1969年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
11.
12.
This study explores the issues involved in creating a regional security regime in the Middle East using insights from the levels of analysis framework of international relations theory. In doing so, Spiegel focuses on the means which can be implemented in the region in order to improve the prospects for establishing such a regime.  相似文献   
13.
Modeling R&D as standard sequential search, we consider a monopolist who can implement a sequence of technological discoveries during the technology search process: he earns revenue on his installed technology while he engages in R&D to find improved technology. What is not standard is that he has a finite number of opportunities to introduce improved technology. We show that his optimal policy is characterized by thresholds ξi(x): introduce the newly found technology if and only if it exceeds ξi(x) when x is the state of the currently installed technology and i is the number of remaining introductions allowed. We also analyze a nonstationary learning‐by‐doing model in which the monopolist's experience in implementing new technologies imparts increased capability in generating new technologies. Because this nonstationary model is not in the class of monotone stopping problems, a number of surprising results hold and several seemingly obvious properties of the stationary model no longer hold. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
14.
The well‐known generalized assignment problem (GAP) involves the identification of a minimum‐cost assignment of tasks to agents when each agent is constrained by a resource in limited supply. The multi‐resource generalized assignment problem (MRGAP) is the generalization of the GAP in which there are a number of different potentially constraining resources associated with each agent. This paper explores heuristic procedures for the MRGAP. We first define a three‐phase heuristic which seeks to construct a feasible solution to MRGAP and then systematically attempts to improve the solution. We then propose a modification of the heuristic for the MRGAP defined previously by Gavish and Pirkul. The third procedure is a hybrid heuristic that combines the first two heuristics, thus capturing their relative strengths. We discuss extensive computational experience with the heuristics. The hybrid procedure is seen to be extremely effective in solving MRGAPs, generating feasible solutions to more than 99% of the test problems and consistently producing near‐optimal solutions. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 468–483, 2001  相似文献   
15.
Ethno-national territorial disputes typically involve conflicting homeland claims between states and minority ethnic groups. Where such minority ethnic groups have cross-border ethnic kin who themselves constitute a dominant or influential ethnic group in a neighbouring state, separatist goals may take the form of either irredentism or independence. We conjecture that external sympathy for irredentism and independence may vary significantly, and that this variation may be an important influence in situations where secessionist groups and ethnic kin states have a choice between the two goals. Using a bargaining framework that controls for variation in relative power, status quo conditions and minority-side leadership preferences, we present experimental evidence indicating that external audiences are likely to support more confrontational policies in pursuit of independence than in pursuit of irredentism. Our evidence also indicates that independence attracts greater support largely because outsiders perceive it as a more legitimate goal; and that practical efficacy is not important in stimulating sympathy for either independence or irredentism. These results also support a broader argument in the literature on international norms – that such norms receive support not only because they may justify pre-existing goals or interests, but also because they are perceived as having greater legitimacy per se.  相似文献   
16.
In this paper, confidence intervals are given for two quantities of importance related to renewal processes. For each quantity, two confidence intervals are discussed. One confidence interval is given for general, all‐purpose use. Another confidence interval is given which is easier to compute, but not of general use. The case where data are subject to right censorship is also considered. Some numerical comparisons are made. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 638–649, 2003.  相似文献   
17.
18.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
19.
We study joint preventive maintenance (PM) and production policies for an unreliable production‐inventory system in which maintenance/repair times are non‐negligible and stochastic. A joint policy decides (a) whether or not to perform PM and (b) if PM is not performed, then how much to produce. We consider a discrete‐time system, formulating the problem as a Markov decision process (MDP) model. The focus of the work is on the structural properties of optimal joint policies, given the system state comprised of the system's age and the inventory level. Although our analysis indicates that the structure of optimal joint policies is very complex in general, we are able to characterize several properties regarding PM and production, including optimal production/maintenance actions under backlogging and high inventory levels, and conditions under which the PM portion of the joint policy has a control‐limit structure. In further special cases, such as when PM set‐up costs are negligible compared to PM times, we are able to establish some additional structural properties. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号