全文获取类型
收费全文 | 391篇 |
免费 | 6篇 |
出版年
2021年 | 7篇 |
2019年 | 8篇 |
2018年 | 6篇 |
2017年 | 3篇 |
2016年 | 8篇 |
2015年 | 2篇 |
2014年 | 7篇 |
2013年 | 63篇 |
2012年 | 3篇 |
2009年 | 4篇 |
2007年 | 13篇 |
2005年 | 2篇 |
2004年 | 3篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 10篇 |
1995年 | 3篇 |
1994年 | 7篇 |
1993年 | 11篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 15篇 |
1987年 | 7篇 |
1986年 | 14篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 10篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 9篇 |
1978年 | 8篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 4篇 |
1974年 | 8篇 |
1973年 | 5篇 |
1972年 | 3篇 |
1971年 | 7篇 |
1970年 | 6篇 |
1969年 | 5篇 |
1967年 | 5篇 |
1948年 | 4篇 |
排序方式: 共有397条查询结果,搜索用时 15 毫秒
391.
Tûba Aktaran‐Kalaycı Christos Alexopoulos Nilay Tanık Argon David Goldsman James R. Wilson 《海军后勤学研究》2007,54(4):397-410
We formulate exact expressions for the expected values of selected estimators of the variance parameter (that is, the sum of covariances at all lags) of a steady‐state simulation output process. Given in terms of the autocovariance function of the process, these expressions are derived for variance estimators based on the simulation analysis methods of nonoverlapping batch means, overlapping batch means, and standardized time series. Comparing estimator performance in a first‐order autoregressive process and the M/M/1 queue‐waiting‐time process, we find that certain standardized time series estimators outperform their competitors as the sample size becomes large. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
392.
Mustapha Bouhtou Alexander Grigoriev Stan van Hoesel Anton F. van der Kraaij Frits C.R. Spieksma Marc Uetz 《海军后勤学研究》2007,54(4):411-420
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
393.
We consider a manufacturer (i.e., a capacitated supplier) that produces to stock and has two classes of customers. The primary customer places orders at regular intervals of time for a random quantity, while the secondary customers request a single item at random times. At a predetermined time the manufacturer receives advance demand information regarding the order size of the primary customer. If the manufacturer is not able to fill the primary customer's demand, there is a penalty. On the other hand, serving the secondary customers results in additional profit; however, the manufacturer can refuse to serve the secondary customers in order to reserve inventory for the primary customer. We characterize the manufacturer's optimal production and stock reservation policies that maximize the manufacturer's discounted profit and the average profit per unit time. We show that these policies are threshold‐type policies, and these thresholds are monotone with respect to the primary customer's order size. Using a numerical study we provide insights into how the value of information is affected by the relative demand size of the primary and secondary customers. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
394.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last. 相似文献
395.
ABSTRACTThis paper examines the importance of closer co-operation in defence-related procurement. Led by the decision that Belgium will lead the procurement of 12 Mine CounterMeasures Vessels (MCMV), the case of a potential Belgian naval construction cluster is discussed. The feasibility of a potential cluster is investigated by looking at key elements of a successful naval construction cluster, the Dutch naval construction cluster, and comparing those key elements to the current Belgian situation. Forming a sustainable Belgian naval construction cluster will be difficult. Most of the procurement process of the MCMVs is set on a European tender. In the long run, due to the absence of both a launching customer and leader firms, no party is able to carry the cluster with investments and knowledge spill-overs. In order to keep public support for large defence-related investments, clustering around the MCMV integration system and proactive cluster support is recommended. 相似文献
396.
ABSTRACTIn recent years, an upward trend in terrorist attacks has mirrored an increase in suicide attacks. According to our preliminary analysis, the events of September 11th marked a sea change in the number of terrorist attacks. While a rich literature has evaluated why terrorists participate in suicide attacks, none have considered the uptick in volume after 9/11, and fewer yet have considered how female fighters may be contributing to this. We evaluate how both structural and female-specific factors affect the likelihood of female fighter suicide attacks. Recent literature discovered a trend in terrorist groups using females as suicide bombers due to cultural norms that permit them to get closer to targets. We test our theory using data from the Chicago Project on Security and Threats Suicide Attack Database (CPOST-SAD) and various datasets from the Quality of Government (QOG) compendium for the 1986–2016 time period. We construct a series of models that consider both female-specific and structural factors that could explain variation in the number of female suicide attacks. Our results indicate that our models encompass relatively stable patterns. Female political empowerment, female educational attainment, and female employment rates are significant and positive in our post-9/11 models, indicating that they may increase female suicide attacks. Democracy is a relevant structural factor and generally yields a positive effect on female suicide attacks across both time periods and multiple models. Ethnic fractionalization is significant in both time periods but yields a negative effect before 9/11 and a positive effect in the later period. 相似文献
397.
ABSTRACTNo issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited. 相似文献