首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   0篇
  2021年   2篇
  2019年   1篇
  2018年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   2篇
  2013年   22篇
  2008年   1篇
  2006年   2篇
  2005年   1篇
  2004年   2篇
  2003年   2篇
  2000年   1篇
  1998年   2篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
  1991年   1篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1980年   2篇
  1978年   1篇
  1977年   5篇
  1976年   1篇
  1973年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有77条查询结果,搜索用时 15 毫秒
1.
The waiting time in the random order service G/M/m queue is studied. For the Laplace transform we obtain a simpler representation than previously available. For the moments, an explicit recursive algorithm is given and carried out numrically for some cases. This gives rise to the conjecture that the waiting-time distributio can be approximated by the one for M/M/m after a suitable change of scale.  相似文献   
2.
This paper attempts to resolve the existing confusion concerning missing operations. Scheduling problems are classified in two groups: (i) null-continuous (NC)—comprising the problems where an optimal schedule remains optimal on replacement of arbitrarily small processing times (existing operations) with zeros (missing operations); (ii) null-discontinuous (NDC)—comprising those problems which are not null-continuous.  相似文献   
3.
Jobs with known processing times and due dates have to be processed on a machine which is subject to a single breakdown. The moment of breakdown and the repair time are independent random variables. Two cases are distinguished with reference to the processing time preempted by the breakdown (no other preemptions are allowed): (i) resumption without time losses and (ii) restart from the beginning. Under certain compatible conditions, we find the policies which minimize stochastically the number of tardy jobs.  相似文献   
4.
A company wishes to estimate or predict its financial exposure in a reporting period of length T (typically one quarter) because of warranty claims. We propose a fairly general random measure model which allows computation of the Laplace transform of the total claim made against the company in the reporting interval due to warranty claims. When specialized to a Poisson process of both sales and warranty claims, statistical estimation of relevant quantities is possible. The methodology is illustrated by analyzing automobile sales and warranty claims data from a large car manufacturer for a single car model and model year. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
5.
Despite its many institutional and political weaknesses and limitations, the African Union (AU) has been developing a variety of tools and mechanisms to respond effectively to complex disasters and emergencies (both natural and manmade) by building up a comprehensive regional security architecture. Furthermore, it has become the first and only regional or international organisation to enshrine the principle of ‘responsibility to protect’ (R2P) in its Constitutive Act. This regional approach to and formal endorsement of the R2P principle allowed it to assume a particular place in the promotion of peace and security in its area. This article aims to critically assess the effectiveness of the AU on the African continent by exploring its real capacity in preventing and responding to emergencies and violent conflicts, and therefore in rendering the principle of R2P operational. The article argues that the formalisation of principles does not necessarily mean their effective implementation. The organisation's use of the R2P principle is also greatly conditioned by internal and external factors.  相似文献   
6.
This paper describes the most common presently used methods for detecting uranium and plutonium isotopes after their introduction to environment. Known isotope ratios of U and Pu in different nuclear events are important tool for characterizing the sources of nuclear material. Detection techniques both in field and in laboratory are presented, as well as different models that can be used for identifying the origin and age of the nuclear material. Identification of the source of nuclear material in environmental samples is needed for estimating the quality and quantity of the nuclear hazard. This information is essential in risk assessment and crisis management, in chemical, biological, radiological and nuclear (CBRN) research after e.g. a terrorist attack, in radioecology and environmental radioactivity research.  相似文献   
7.
8.
This essay locates the West African region in the context of the post-9/11 discourses on terrorism and counter-terrorism, particularly as it relates to the global war on terror. It identifies and analyses the issues and challenges that flow from the integration of West Africa into hegemonic transnational/globalised security arrangements, and the ways in which the emerging state (militaristic) and globalised security framework could reinforce or, paradoxically, undermine regional, intranational human and environmental security in one of Africa's most troubled regions. It critically examines the possibility of a terrorist threat in the region and analyses the global stakes involved in integrating West Africa into the global war on terror. On this basis, it concludes that zero-sum, militarist, globally driven solutions may fail to address the historical, political, and socio-economic roots of a possible terrorist threat in West Africa.  相似文献   
9.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously.  相似文献   
10.
The Australia Group's (AG's) contributions toward stemming global proliferation of chemical and biological weapons of mass destruction over the last 20 years are noted, in addition to the group's complementary role in effectively supporting the purpose and objectives of the Chemical Weapons Convention (CWC). This report also outlines the organizational and operational means that help accomplish the AG mission and notes the U.S. Congress’ recognition of the role of the AG in countering chemical and biological weapons proliferation. Addressing criticism by some CWC states parties that question the AG's role in nonproliferation, the author also highlights the AG's expanded reach since September 2001 over terrorist activity. Finally,the article identifies a challenge the AG now faces in furthering its objectives and offers a possible solution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号