全文获取类型
收费全文 | 375篇 |
免费 | 13篇 |
国内免费 | 1篇 |
出版年
2021年 | 3篇 |
2019年 | 15篇 |
2018年 | 14篇 |
2017年 | 9篇 |
2016年 | 8篇 |
2015年 | 4篇 |
2014年 | 10篇 |
2013年 | 87篇 |
2012年 | 3篇 |
2010年 | 6篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 11篇 |
2004年 | 7篇 |
2003年 | 4篇 |
2002年 | 8篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 8篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 9篇 |
1993年 | 11篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 7篇 |
1988年 | 8篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 8篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1974年 | 5篇 |
1973年 | 7篇 |
1972年 | 4篇 |
1969年 | 3篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 4篇 |
1948年 | 2篇 |
排序方式: 共有389条查询结果,搜索用时 15 毫秒
211.
Banks have found it advantageous to connect their Automated Teller Machines (ATMs) in networks so that customers of one bank may use the ATMs of any bank in the network. When this occurs, an interchange fee is paid by the customer's bank to the one that owns the ATM. These have been set by historic interbank negotiation. The paper investigates how a model based on n-player game theory concepts of Shapley value and nucleolus could be used as an alternative way of setting such fees. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 407–417, 1998 相似文献
212.
The Inspection Game is a multistage game between a customs inspector and a smuggler, first studied by Melvin Dresher and Michael Maschler in the 1960s. An extension allowing the smuggler to act more than once, treated by Sakaguchi in a special case, is solved. Also, a more natural version of Sakaguchi's problem is solved in the special case where the smuggler may act at each stage. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 327–334, 1998 相似文献
213.
Facility location problems in the plane are among the most widely used tools of Mathematical Programming in modeling real-world problems. In many of these problems restrictions have to be considered which correspond to regions in which a placement of new locations is forbidden. We consider center and median problems where the forbidden set is a union of pairwise disjoint convex sets. As applications we discuss the assembly of printed circuit boards, obnoxious facility location and the location of emergency facilities. © 1995 John Wiley & Sons, Inc. 相似文献
214.
Thomas Kmpke 《海军后勤学研究》1995,42(8):1191-1201
The assessment of a Bernoulli utility function is often accomplished by an approximation process which makes use of ever more information on the preference as it is elicited from a decision maker. Simultaneous approximations of the utility function and the underlying distributions are generally not sufficient for the expectations to converge to the expected value of the respective limits. We give various sufficient stability conditions for the expected utility. All these conditions contain some “uniformness”. © 1995 John Wiley & Sons, Inc. 相似文献
215.
216.
Does the United Nations naming and shaming of specific violations of human rights decrease government repression? In this article, we argue that international shaming of specific human rights violations can weaken the target government, bringing new challenges and making the government cessation of repression less feasible. When international naming and shaming campaigns target specific repressive tactics, they increase the costs of some – but not all – means of repression. Using original data on naming and shaming by the United Nations Human Rights Council (HRC), we show that the shaming of one physical integrity violation is jointly associated with decreases in that violation and increases in other violations of human rights. 相似文献
217.
We study stochastic clearing systems with a discrete-time Markovian input process, and an output mechanism that intermittently and instantaneously clears the system partially or completely. The decision to clear the system depends on both quantities and delays of outstanding inputs. Clearing the system incurs a fixed cost, and outstanding inputs are charged a delay penalty, which is a general increasing function of the quantities and delays of individual inputs. By recording the quantities and delays of outstanding inputs in a sequence, we model the clearing system as a tree-structured Markov decision process over both a finite and infinite horizon. We show that the optimal clearing policies, under realistic conditions, are of the on-off type or the threshold type. Based on the characterization of the optimal policies, we develop efficient algorithms to compute parameters of the optimal policies for such complex clearing systems for the first time. We conduct a numerical analysis on the impact of the nonlinear delay penalty cost function, the comparison of the optimal policy and the classical hybrid policy (ie, quantity and age thresholds), and the impact of the state of the input process. Our experiments demonstrate that (a) the classical linear approximation of the cost function can lead to significant performance differences; (b) the classical hybrid policy may perform poorly (as compared to the optimal policies); and (c) the consideration of the state of the input process makes significant improvement in system performance. 相似文献
218.
Thomas Maurer 《Small Wars & Insurgencies》2018,29(2):229-244
This article gives an overall assessment of ISIS’s conventional conduct of combat operations by examining their warfighting functions patterns. In sum, the approach of ISIS comprised fundamental principles: their weapons can be organized into categories, purposeful combination of these forces in keeping with the concept of combined arms combat, and hierarchical command and control executed by experienced commanders. ISIS combat groups combined the elements of formation and firepower as well as movement and mobility. The paper concludes that ISIS obviously had a vast range of conventional capabilities at its disposal and was thus able to conduct major operations. 相似文献
219.
Thomas Mandrup 《African Security Review》2018,27(2):109-128
The security sector reform (SSR) programme in the Democratic Republic of the Congo (DRC) has failed, according to a former high-level member of the United Nations (UN) mission in the DRC, as a large section of the country remains outside government control, and the security institutions of the state continue to constitute one of the predominant sources of insecurity for the local population in a number of ways. Based on several field studies, this article critically scrutinises the SSR of the Congolese National Police (Police nationale congolaise; PNC) and the efforts to reform it between 2004 and 2016. It further attempts to explain why so little progress was made in the SSR of the PNC, despite extensive involvement from donors. The article shows that the instrumental and traditional approach to SSR is partly to blame, because in this case it failed to address the root problems and initiate the needed fundamental reform and reconstruction of the police force. It also shows that reforming local security institutions becomes even more difficult when the local authorities do not support the effort. 相似文献
220.
The malaise that the United States, and the West, have experienced in recent campaigns stems in large part from unclear thinking about war, its political essence, and the strategies needed to join the two. Instead, analysis and response are predicated on entrenched theoretical concepts with limited practical utility. The inadequacy of understanding has spawned new, and not so new, terms to capture unanticipated trends, starting with the re-discovery of “insurgency” and “counterinsurgency” and leading to discussion of “hybrid threats” and “gray-zone” operations. New terminology can help, but the change must go deeper. Challenging analytical orthodoxy, this article sets out a unifying approach for the study of political violence, or more accurately: violent politics. It provides a conceptual foundation that helps to make sense of recent shifts in warfare. In effect, it offers sorely needed theoretical insights into the nature of strategy and guides the process of responding to nontraditional threats. 相似文献