首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   426篇
  免费   18篇
  国内免费   1篇
  2021年   6篇
  2019年   12篇
  2018年   13篇
  2017年   8篇
  2016年   9篇
  2015年   7篇
  2014年   10篇
  2013年   98篇
  2012年   5篇
  2011年   5篇
  2010年   5篇
  2009年   4篇
  2008年   5篇
  2007年   4篇
  2006年   8篇
  2005年   7篇
  2004年   5篇
  2003年   6篇
  2002年   4篇
  2000年   3篇
  1998年   4篇
  1997年   6篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   11篇
  1992年   8篇
  1991年   8篇
  1989年   10篇
  1988年   7篇
  1987年   6篇
  1986年   7篇
  1985年   10篇
  1984年   8篇
  1983年   4篇
  1982年   6篇
  1981年   4篇
  1980年   9篇
  1979年   7篇
  1978年   8篇
  1976年   8篇
  1975年   10篇
  1974年   8篇
  1973年   11篇
  1972年   6篇
  1971年   4篇
  1970年   6篇
  1969年   5篇
  1968年   5篇
  1967年   3篇
排序方式: 共有445条查询结果,搜索用时 15 毫秒
281.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
282.
283.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   
284.
In this article, we focus on relatively new maintenance and operational scheduling challenges that are faced by the United States Air Force concerning low‐observable (LO) or stealth aircraft. The LO capabilities of an aircraft degrade stochastically as it flies, making it difficult to make maintenance scheduling decisions. Maintainers can address these damages, but must decide, which aircraft should be put into maintenance, and for how long. Using data obtained from an active duty Air Force F‐22 wing and interviews with Air Force maintainers and program specialists, we model this problem as a generalization of the well‐known restless multiarmed bandit superprocess. Specifically, we use an extension of the traditional model to allow for actions that require varying lengths of time, and generate two separate index policies from a single model; one for maintenance actions and one for the flying action. These index policies allow maintenance schedulers to intuitively, quickly, and effectively rank a fleet of aircraft based on each aircraft's LO status and decide, which aircraft should enter into LO maintenance and for how long, and which aircraft should be used to satisfy daily sortie requirements. Finally, we present extensive data‐driven, detailed simulation results, where we compare the performance of the index policies against policies currently used by the Air Force, as well as some other possible more naive heuristics. The results indicate that the index policies significantly outperform existing policies in terms of fully mission capable (FMC) rates. In particular, the experiments highlight the importance of coordinated maintenance and flying decisions. © 2015 Wiley Periodicals, Inc. 62:60–80, 2015  相似文献   
285.
ABSTRACT

This article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict.  相似文献   
286.
287.
A large collection of captured documents from the very highest levels of the Iraqi government offers a chance to gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. This paper explores some of the perceptions and misperceptions that Saddam Hussein took away from the 1991 Gulf War and shows how they affected his decisionmaking on the eve of the war in 2003. It concludes with some thoughts on the policy implications of these findings.  相似文献   
288.
Abstract

Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed.  相似文献   
289.
A response to John Stone, Dale Peterson, and Gary McGraw on cyber war.  相似文献   
290.
NATO officials have cited various reasons for conducting their air campaign in Kosovo. Though not emphasised as much, the concern that NATO's credibility was at stake stood out as the most paramount on the basis of logical comparison. In fact, NATO intervened in Kosovo primarily to maintain its credibility as the Trans- Atlantic's only multilateral security mechanism because its continued existence depended on it. While NATO's search for its new role in the post-Cold War strategic environment has been fraught with several problems, the inclination towards collective security and crisis management has placed it in a position of proactive military obligation. Predictably, NATO's venture in the Balkans this time around has had various implications on its future prospects as an organisation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号