首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
管理学   7篇
人口学   2篇
社会学   5篇
统计学   7篇
  2021年   1篇
  2020年   3篇
  2018年   1篇
  2016年   1篇
  2015年   2篇
  2013年   3篇
  2012年   1篇
  2011年   2篇
  2009年   1篇
  2008年   1篇
  2003年   1篇
  2002年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有21条查询结果,搜索用时 15 毫秒
1.
Vendor managed inventory systems are becoming increasingly popular. An important issue in implementing a vendor managed inventory scheme is the contracting terms that dictate the ownership of the inventory and the responsibility of inventory replenishment decisions. Thus the performance of a vendor managed system crucially depends on these terms and on how inventory‐related costs are shared in a supply chain. We consider a system where a manufacturer supplies a single product to a retailer who faces random demand in a competitive market. The retailer incurs a fixed cost per order, inventory holding cost, and a penalty cost for a stockout (unsatisfied demand is back‐ordered). Further, the manufacturer incurs a penalty cost when there is a stockout at the retailer and a fixed replenishment cost. We assume that the players are rational and act noncooperatively. We compare the performance of retailer managed inventory systems, where the retailer places orders and makes replenishment decisions, with vendor managed inventory systems, wherein the vendor or manufacturer makes inventory and replenishment decisions. Specifically, in the vendor managed inventory system, we propose and evaluate holding cost subsidy‐type contracts on inventories offered by the retailer to improve system performance. We evaluate this contract in the context of three widely used inventory systems—deterministic economic order quantity, continuous review (Q, r) policies, and periodic review policies—and show when such contracts may improve channel performance.  相似文献   
2.
Population Research and Policy Review - The issue of population ageing is no longer exclusively centred on developed countries. Empirical studies have proven that the rise in the proportion of the...  相似文献   
3.
In this paper we study the robustness of the likelihood ratio, circular mean and circular trimmed mean test functionals in the context of tests of hypotheses regarding the mean direction of circular normal and wrapped normal distributions. We compute the level and power breakdown properties of the three test functionals and compare them. We find that the circular trimmed mean test functional has the best robustness properties for both the above-mentioned distributions. The level and power properties of the test statistics corresponding to these functionals are also studied. Two examples with real data are given for illustration. We also consider the problem of testing the mean direction of the von-Mises–Fisher distribution on the unit sphere and explore the robustness properties of the spherical mean direction and likelihood ratio test functionals.  相似文献   
4.
In this study, we examined the relationship between individualism collectivism orientations of potential job seekers and their reactions toward alternative human resource management (HRM) practices in the areas of selection, performance appraisal, reward system, career system, and employment security. Using several subdimensions of individualism collectivism, we found many significant relationships between individualism collectivism orientations and preferences for alternative human resource management practices that might affect the effectiveness of alternative HRM practices.  相似文献   
5.
We look at a simple service system with two servers serving arriving jobs (single class). Our interest is in examining the effect of routing policies on servers when they care about fairness among themselves, and when they can endogenously choose capacities in response to the routing policy. Therefore, we study the two‐server game where the servers’ objective functions have a term explicitly modeling fairness. Moreover, we focus on four commonly seen policies that are from one general class. Theoretical results concerning the existence and uniqueness of the Nash equilibrium are proved for some policies. Further managerial insights are given based on simulation studies on servers’ equilibrium/off‐equilibrium behaviors and the resulting system efficiency performance under different policies.  相似文献   
6.
This study explores the empirical grounds for bridging the gender gap between liberation theories of female crime by integrating selected concepts from strain and liberation theses to explain female delinquency and gender differences in delinquency. Additive and interactive analyses were conducted with a sample of 1,613 adolescents. The findings provide little support for combining liberation and strain, primarily because of the inadequacy of liberated attitudes for strongly and consistently differentiating female delinquency. Strain, however, differed for males and females but was consistently and positively related to delinquency for both groups.  相似文献   
7.
In this paper, we present closed-form expressions, wherever possible, or devise algorithms otherwise, to determine the expectation and variance of a given schedule on a single machine. We consider a variety of completion time and due date-based objectives. The randomness in the scheduling process is due to variable processing times with known means and variances of jobs and, in some cases, a known underlying processing time distribution. The results that we present in this paper can enable evaluation of a schedule in terms of both the expectation and variance of a performance measure considered, and thereby, aid in obtaining a stable schedule. Additionally, the expressions and algorithms that are presented, can be incorporated in existing scheduling algorithms in order to determine expectation-variance efficient schedules.  相似文献   
8.
In this paper we study the robustness of the directional mean (a.k.a. circular mean) for different families of circular distributions. We show that the directional mean is robust in the sense of finite standardized gross error sensitivity (SB-robust) for the following families: (1) mixture of two circular normal distributions, (2) mixture of wrapped normal and circular normal distributions and (3) mixture of two wrapped normal distributions. We also show that the directional mean is not SB-robust for the family of all circular normal distributions with varying concentration parameter. We define the circular trimmed mean and prove that it is SB-robust for this family. In general the property of SB-robustness of an estimator at a family of probability distributions is dependent on the choice of the dispersion measure. We introduce the concept of equivalent dispersion measures and prove that if an estimator is SB-robust for one dispersion measure then it is SB-robust for all equivalent dispersion measures. Three different dispersion measures for circular distributions are considered and their equivalence studied.  相似文献   
9.
Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data.  相似文献   
10.
Fourteen evaluations of UNICEF and UNAIDS HIV/AIDS programmes underwent a quality control process called ‘meta-evaluation’, which is an evaluation of the quality of the evaluation. This process of evaluating an evaluation is considered professional good practice by African Evaluation Associations and Networks, as well as the American, Canadian, German, Korean, Swiss and other national professional associations of evaluators. The quality control criteria used were the African Evaluation Guidelines—a list of 30 quality-enhancing standards that can be used as a checklist by evaluators to ensure that evaluation studies are performed well. These quality control criteria can also be applied retrospectively as a quality control method, to assess completed evaluation studies. The results of this quality control review process, for the 14 papers in this issue of Evaluation and Program Planning, are presented and discussed. An indication of a possible area of weakness in HIV/AIDS programme evaluation emerges from this analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号