首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   236篇
  免费   24篇
  国内免费   15篇
  2021年   6篇
  2020年   10篇
  2019年   9篇
  2018年   14篇
  2017年   14篇
  2016年   9篇
  2015年   7篇
  2014年   32篇
  2013年   40篇
  2012年   7篇
  2011年   28篇
  2010年   19篇
  2009年   13篇
  2008年   15篇
  2007年   13篇
  2006年   18篇
  2005年   4篇
  2004年   4篇
  2003年   1篇
  2001年   1篇
  1998年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有275条查询结果,搜索用时 15 毫秒
241.
Characteristically, a small subset of operational problems admit risk neutrality when contingent claims methodology were used in their analysis. That is, for the majority of manufacturing and production problems, operating cash flows are not directly linked to prices of traded assets. However, to the extent that correlations can be estimated, the methodology's applicability to a broader set of operational problems is supported. Our article addresses this issue with the objective of extending the use of contingent claims techniques to a larger set of operational problems. In broad terms, this objective entails a partial equilibrium approach to the problem of valuing uncertain cash flows. To this end, we assume risk aversion and cast our approach within Merton's intertemporal capital asset pricing model. In this context, we formulate a “generic” production valuation model that is framed as an exercise in stochastic optimal control. The model is versatile in its characterization and can easily be adapted to accommodate a wide‐ranging set of risk‐based operational problems where the underlying sources of uncertainty are not traded. To obtain results, the model is recast as a stochastic dynamic program to be solved numerically. The article addresses a number of fundamental issues in the analysis risk based decision problems in operations. First, in the approach provided, decisions are analyzed under a properly defined risk structure. Second, the process of analysis leads to suitably adjusted probability distributions through which, appropriately discounted expectations are derived. Third, through consolidating existing concepts into a standard and adaptable framework, we extend the applicability of contingent claims methodology to a broader set of operational problems. The approach is advantageous as it obviates the need for exogenously specifying utility functions or discount rates.© 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
242.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
243.
Washington's growing reliance upon international private security companies (PSCs) will lead to these firms becoming prominent vehicles in the prosecution of the counterinsurgency in Iraq. This shift, however, risks labeling PSCs as mercenaries and presents considerable challenges regarding the control of non-state violence. Moreover, tradeoffs exist regarding the different nationalities of PSC personnel. Utilization of personnel from the developed world risks compromising the capabilities of Special Operations Forces. Additionally, shifts in casualty recognition amongst US policymakers and the media suggest that the private option is becoming politically salient and thus less useful. Many developing world states are increasingly concerned about how the global outsourcing of security sector expertise risks their stability and ability to execute coherent policy. Finally, the employment of Iraqis in PSCs sends mixed messages to the Iraqi populace about the need for and the effectiveness of a cohesive and responsible indigenous security sector.

Frankly, I'd like to see the government get out of war altogether and leave the whole feud to private industry.

[Catch-22 – Major Milo Minderbinder]  相似文献   
244.
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   
245.
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   
246.
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion.  相似文献   
247.
电子证据相较于传统证据,其具有的独有特征,给公安边防情报部门确认其证明力带来了困难.分析公安边防情报工作中电子证据的概念、特征和来源,探讨公安边防情报工作中电子证据的认定和保障问题.  相似文献   
248.
以探索装备保障的信息化决策与控制方法为目的,从基于效果作战的观点出发,利用概念模型,从OODA环的相互作用、混沌现象和自同步及蜂群效应3个方面,研究了网络中心条件下装备保障指挥决策与体系控制的激励与响应模式,并得出了相关结论,以此为基础提出了装备保障指挥决策与体系控制的3项建议.  相似文献   
249.
This article assesses South Africa's 20 years of democracy, which has frequently been bedevilled by local protests. This article is particularly interested in those unrest incidents that have been distinct for one reason or another. In South Africa, the surge in local unrest incidents is often linked to police behaviour, which has become increasingly militant and brutal when quelling protests. While the right to protest is constitutional, the damage caused during protest action can be immense owing to acts of violence. Protestors' resorting to violent protest action is often linked to increased frustrations as a result of the government's inability to live up to the expectations of marginalised and poor communities. While this article draws primarily on existing scholarly debates focusing on social protests, the primary objective is to examine the impact of unrest incidents on local protests in post-apartheid South Africa. The article further argues that ‘spaces’ for participation in local governance should be created so that citizens can become architects of development and their own future.  相似文献   
250.
SHADOW WARS     
The Secret War with Iran: The 30-Year Clandestine Struggle Against the World's Most Dangerous Terrorist Power, by Ronen Bergman. Free Press, 2008. 432 pages, $28

Fallout: The True Story of the CIA's Secret War on Nuclear Trafficking, by Catherine Collins and Douglas Frantz. Free Press, 2011. 304 pages, $26.

The Twilight War: The Secret History of America's Thirty-Year War with Iran, by David Crist. Penguin Press, 2012. 638 pages, $36.

Israel vs. Iran: The Shadow War, by Yaakov Katz and Yoaz Hendel. Potomac Books Inc., 2012. 254 pages, $30.

Spies Against Armageddon: Inside Israel's Secret Wars, by Dan Raviv. Levant, 2012. 356 pages, $17.

Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, by David E. Sanger. Crown Publishers, 2012. 476 pages, $28.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号