首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   4篇
  2022年   1篇
  2021年   1篇
  2019年   5篇
  2018年   9篇
  2017年   4篇
  2016年   4篇
  2015年   3篇
  2014年   4篇
  2013年   48篇
  2011年   1篇
  2009年   1篇
  2008年   2篇
  2007年   2篇
  2006年   3篇
  2005年   5篇
  2004年   3篇
  2003年   3篇
  2002年   2篇
  2001年   1篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1989年   3篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   3篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1974年   2篇
  1973年   3篇
  1972年   1篇
  1970年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有142条查询结果,搜索用时 15 毫秒
91.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
92.
93.
In a caching game introduced by Alpern et al. (Alpern et al., Lecture notes in computer science (2010) 220–233) a Hider who can dig to a total fixed depth normalized to 1 buries a fixed number of objects among n discrete locations. A Searcher who can dig to a total depth of h searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero‐sum game is complicated to analyze even for small values of its parameters, and for the case of 2 hidden objects has been completely solved only when the game is played in up to 3 locations. For some values of h the solution of the game with 2 objects hidden in 4 locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. (Fokkink et al., Search theory: A game theoretic perspective (2014) 85–104). Here we solve the remaining cases of the game with 2 objects hidden in 4 locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are 2 objects hidden in n locations and n→∞, the value of the game is asymptotically equal to h/n for hn/2. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 23–31, 2016  相似文献   
94.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
95.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   
96.
In this article, we focus on relatively new maintenance and operational scheduling challenges that are faced by the United States Air Force concerning low‐observable (LO) or stealth aircraft. The LO capabilities of an aircraft degrade stochastically as it flies, making it difficult to make maintenance scheduling decisions. Maintainers can address these damages, but must decide, which aircraft should be put into maintenance, and for how long. Using data obtained from an active duty Air Force F‐22 wing and interviews with Air Force maintainers and program specialists, we model this problem as a generalization of the well‐known restless multiarmed bandit superprocess. Specifically, we use an extension of the traditional model to allow for actions that require varying lengths of time, and generate two separate index policies from a single model; one for maintenance actions and one for the flying action. These index policies allow maintenance schedulers to intuitively, quickly, and effectively rank a fleet of aircraft based on each aircraft's LO status and decide, which aircraft should enter into LO maintenance and for how long, and which aircraft should be used to satisfy daily sortie requirements. Finally, we present extensive data‐driven, detailed simulation results, where we compare the performance of the index policies against policies currently used by the Air Force, as well as some other possible more naive heuristics. The results indicate that the index policies significantly outperform existing policies in terms of fully mission capable (FMC) rates. In particular, the experiments highlight the importance of coordinated maintenance and flying decisions. © 2015 Wiley Periodicals, Inc. 62:60–80, 2015  相似文献   
97.
ABSTRACT

This article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict.  相似文献   
98.
A large collection of captured documents from the very highest levels of the Iraqi government offers a chance to gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. This paper explores some of the perceptions and misperceptions that Saddam Hussein took away from the 1991 Gulf War and shows how they affected his decisionmaking on the eve of the war in 2003. It concludes with some thoughts on the policy implications of these findings.  相似文献   
99.
Abstract

Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed.  相似文献   
100.
A response to John Stone, Dale Peterson, and Gary McGraw on cyber war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号