首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   5篇
  国内免费   4篇
  270篇
  2025年   1篇
  2024年   3篇
  2023年   5篇
  2022年   2篇
  2021年   7篇
  2020年   14篇
  2019年   12篇
  2018年   10篇
  2017年   16篇
  2016年   9篇
  2015年   9篇
  2014年   18篇
  2013年   35篇
  2012年   11篇
  2011年   17篇
  2010年   10篇
  2009年   14篇
  2008年   11篇
  2007年   9篇
  2006年   17篇
  2005年   8篇
  2004年   5篇
  2003年   1篇
  2002年   5篇
  2001年   1篇
  2000年   2篇
  1999年   3篇
  1997年   2篇
  1995年   2篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有270条查询结果,搜索用时 15 毫秒
251.
网格中资源发现机制是把资源提供者和资源请求者联系起来的重要环节.在分析分层分布式分群监控体系结构和现有资源发现机制的基础上,提出将集中式目录服务、资源路由表和移动代理三种机制相结合的网格资源发现机制.实验验证该机制在小范围内查找具有性能高效的特点,而在大范围内查找减少了资源发现代理的分发数量,降低了系统消息的负载,进而降低了网络资源的占用.  相似文献   
252.
目前对警戒雷达抗干扰能力的研究大多以效能评估为主,具体探测范围要通过雷达抗干扰实验实际测量获得,不仅成本高、测量数据量大.而且不易实现.针对现代战争中警戒雷达所处的复杂电子干扰环境,给出了机动警戒雷达被多个远距离支援干扰机干扰时探测范围的实时仿真计算方法,对警戒雷达的威力范围或者干扰的压制范围作出定量估算,在这对于研究远距离支援干扰的时机方法和评估雷达的抗干扰性能均具有重要意义.该方法已应用于模拟训练系统中,并获得了令人满意的效果.  相似文献   
253.
    
Consider a set of product variants that are differentiated by some secondary attributes such as flavor, color, or size. The retailer's problem is to jointly determine the set of variants to include in her product line (“assortment”), together with their prices and inventory levels, so as to maximize her expected profit. We model the consumer choice process using a multinomial logit choice model and consider a newsvendor type inventory setting. We derive the structure of the optimal assortment for some important special cases, including the case of horizontally differentiated items, and propose a dominance relationship for the general case that simplifies the search for an optimal assortment. We also discuss structural properties of the optimal prices. Finally, motivated by our analytical results, we propose a heuristic solution procedure, which is shown to be quite effective through a numerical study. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
254.
    
This paper derives optimal policies for when to hire, train, and lay off employees in service organizations when worker productivity appreciates deterministically or stochastically under constant, monotonic, and cyclic service demand. The model, an extension of the machine replacement problem from the engineering economy literature, uses infinite horizon linear programming to produce optimal personnel planning strategies and dual prices that characterize the workforce's economic value. The effect of employee attrition is also considered. In its valuation of human assets, unlike pure accounting approaches that only try to measure, this paper proposes an approach to capture the interaction between firm decisions pertaining to human resources and human resource value. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
255.
    
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   
256.
    
Washington's growing reliance upon international private security companies (PSCs) will lead to these firms becoming prominent vehicles in the prosecution of the counterinsurgency in Iraq. This shift, however, risks labeling PSCs as mercenaries and presents considerable challenges regarding the control of non-state violence. Moreover, tradeoffs exist regarding the different nationalities of PSC personnel. Utilization of personnel from the developed world risks compromising the capabilities of Special Operations Forces. Additionally, shifts in casualty recognition amongst US policymakers and the media suggest that the private option is becoming politically salient and thus less useful. Many developing world states are increasingly concerned about how the global outsourcing of security sector expertise risks their stability and ability to execute coherent policy. Finally, the employment of Iraqis in PSCs sends mixed messages to the Iraqi populace about the need for and the effectiveness of a cohesive and responsible indigenous security sector.

Frankly, I'd like to see the government get out of war altogether and leave the whole feud to private industry.

[Catch-22 – Major Milo Minderbinder]  相似文献   
257.
    
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   
258.
    
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion.  相似文献   
259.
潜艇使用自航式声诱饵防御声自导鱼雷模型研究   总被引:2,自引:0,他引:2  
针对潜艇如何使用自航式声诱饵防御声自导鱼雷,分析了自航式声诱饵的初始航向范围,并建立了相应的防御模型.然后采用线性规划方法,求取最优的潜艇规避角度和诱饵航向.最后时典型态势进行仿真计算,结果表明,采用该方法得出的结果与实际作战基本符合,从而验证了模型的正确性.  相似文献   
260.
信息对抗行动是陆军作战的重要行动之一,对陆军作战进程和结局影响重大。通过对信息进攻、信息防御和信息保障等主要内容的定性与定量分析,建立评估指标体系、评估数学模型,得出综合评估结果,为指挥员和指挥机关筹划后续行动提供可靠依据,使效果评估工作更加合理准确。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号