首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   327篇
  免费   82篇
  国内免费   1篇
  410篇
  2021年   2篇
  2020年   1篇
  2019年   13篇
  2018年   5篇
  2017年   16篇
  2016年   21篇
  2015年   16篇
  2014年   23篇
  2013年   69篇
  2012年   15篇
  2011年   24篇
  2010年   23篇
  2009年   20篇
  2008年   22篇
  2007年   31篇
  2006年   21篇
  2005年   15篇
  2004年   18篇
  2003年   14篇
  2002年   15篇
  2001年   10篇
  2000年   11篇
  1999年   2篇
  1994年   1篇
  1990年   2篇
排序方式: 共有410条查询结果,搜索用时 15 毫秒
161.
This paper investigates theoretically and empirically the determinants of military spending in Africa. It specifies a formal model and uses time‐series and cross‐sectional estimations to ascertain the reasons behind variations in military allocations across and within 40 African countries during 1960–1991. The differences in military expenditures appear to reflect a complex of economic, political, and strategic factors at both national and international levels. Strategic considerations are, however, found to be the most important factors in most African countries.  相似文献   
162.
In this paper we develop an empirical model for transnational terrorist activity for a panel consisting of 139 countries over the period 1985–1998. Essentially, we attempt to sketch the profile of the average terrorist attack venue. Our findings suggest that the terrorist attack venue is, on average, characterized by low economic openness, high demographic stress, and a high level of international disputes. Furthermore, we document a strong regional component suggesting the presence of infectious contagion on a spatial level. Our results also support the presence of addictive contagion captured by a strong autoregressive component in each country’s terrorist activity. Finally, we find a weak statistical link between the level of democracy and terrorist activity, although the level of democracy is a significant determinant of the potential under‐reporting bias of terrorist activity.  相似文献   
163.

As we enter the 21st Century, technologies originally developed for defense purposes such as computers and satellite communications appear to have become a driving force behind economic growth in the United States. Paradoxically, almost all previous econometric models suggest that the largely defense‐oriented federal industrial R&;D funding that helped create these technologies had no discernible effect on U.S. industrial productivity growth. This paper addresses this paradox by stressing that defense procurement as well as federal R&;D expenditures were targeted to a few narrowly defined manufacturing sub‐sectors that produced high tech weaponry. Analysis employing data from the NBER Manufacturing Productivity Database and the BEA’ s Input Output tables then demonstrates that defense procurement policies did have significant effects on the productivity performance of disaggregated manufacturing industries because of a process of procurement‐driven technological change.  相似文献   
164.
This paper is intended to complement the existing literature on civil wars. First, it presents a simple theoretical model of conflict that defines a two‐sector economy. In a contested sector, two agents struggle to appropriate the maximum possible fraction of a contestable output. In an uncontested sector, they hold secure property rights over the production of some goods. Agents split their resource endowment between ‘butter’, ‘guns’ and ‘ice‐cream’. Following the theoretical insights the empirical analysis focuses on the relationship between civil wars and different sectors of the economy. In particular, a panel probit specification shows that the incidence of a civil war decreases in the size of manufacturing sector.  相似文献   
165.
We consider the shortest path interdiction problem involving two agents, a leader and a follower, playing a Stackelberg game. The leader seeks to maximize the follower's minimum costs by interdicting certain arcs, thus increasing the travel time of those arcs. The follower may improve the network after the interdiction by lowering the costs of some arcs, subject to a cardinality budget restriction on arc improvements. The leader and the follower are both aware of all problem data, with the exception that the leader is unaware of the follower's improvement budget. The effectiveness of an interdiction action is given by the length of a shortest path after arc costs are adjusted by both the interdiction and improvement. We propose a multiobjective optimization model for this problem, with each objective corresponding to a different possible improvement budget value. We provide mathematical optimization techniques to generate a complete set of strategies that are Pareto‐optimal. Additionally, for the special case of series‐parallel graphs, we provide a dynamic‐programming algorithm for generating all Pareto‐optimal solutions.  相似文献   
166.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly.  相似文献   
167.
We consider the multitasking scheduling problem on unrelated parallel machines to minimize the total weighted completion time. In this problem, each machine processes a set of jobs, while the processing of a selected job on a machine may be interrupted by other available jobs scheduled on the same machine but unfinished. To solve this problem, we propose an exact branch‐and‐price algorithm, where the master problem at each search node is solved by a novel column generation scheme, called in‐out column generation, to maintain the stability of the dual variables. We use a greedy heuristic to obtain a set of initial columns to start the in‐out column generation, and a hybrid strategy combining a genetic algorithm and an exact dynamic programming algorithm to solve the pricing subproblems approximately and exactly, respectively. Using randomly generated data, we conduct numerical studies to evaluate the performance of the proposed solution approach. We also examine the effects of multitasking on the scheduling outcomes, with which the decision maker can justify making investments to adopt or avoid multitasking.  相似文献   
168.
Customer acquisition and customer retention are the most important challenges in the increasingly competitive telecommunications industry. Traditional studies of customer switching always assume that customers are homogeneous, and thus that model customer switching behavior follows a Markov formulation. However, this postulation is obviously inappropriate in most instances. Blumen et al. (Cornell Studies of Industrial and Labor Relations, Cornell University Press, Ithaca, NY, 1955) developed the Mover–Stayer (MS) model, a generalization of the Markov chain model, to relax the requirement of homogeneity and allow the presence of heterogeneity with two different types of individuals—“stayers,” who purchase the same kinds of products or services throughout the entire observation period; and “movers,” who look for variety in products or services over time. There are two purpose of this article. First, we extend the MS model to a Double Mover‐Stayer (DMS) model by assuming the existence of three types of individuals in the market: (1) stable and loyal customers, who have stable usage within the same company; (2) instable but loyal customers, whose usage varies within the same company over time; and (3) disloyal customers, who switch from one company to another to seek for new experiences or/and benefits. We also propose an estimation method for the DMS model. Second, we apply the DMS model to telecommunications data and demonstrate how it can be used for pattern identification, hidden knowledge discovery, and decision making. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
169.
In a caching game introduced by Alpern et al. (Alpern et al., Lecture notes in computer science (2010) 220–233) a Hider who can dig to a total fixed depth normalized to 1 buries a fixed number of objects among n discrete locations. A Searcher who can dig to a total depth of h searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero‐sum game is complicated to analyze even for small values of its parameters, and for the case of 2 hidden objects has been completely solved only when the game is played in up to 3 locations. For some values of h the solution of the game with 2 objects hidden in 4 locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. (Fokkink et al., Search theory: A game theoretic perspective (2014) 85–104). Here we solve the remaining cases of the game with 2 objects hidden in 4 locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are 2 objects hidden in n locations and n→∞, the value of the game is asymptotically equal to h/n for hn/2. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 23–31, 2016  相似文献   
170.
In this article, we present a multistage model to optimize inventory control decisions under stochastic demand and continuous review. We first formulate the general problem for continuous stages and use a decomposition solution approach: since it is never optimal to let orders cross, the general problem can be broken into a set of single‐unit subproblems that can be solved in a sequential fashion. These subproblems are optimal control problems for which a differential equation must be solved. This can be done easily by recursively identifying coefficients and performing a line search. The methodology is then extended to a discrete number of stages and allows us to compute the optimal solution in an efficient manner, with a competitive complexity. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 32–46, 2016  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号