首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   487篇
  免费   10篇
  2021年   6篇
  2019年   17篇
  2018年   10篇
  2017年   16篇
  2016年   12篇
  2015年   10篇
  2014年   3篇
  2013年   90篇
  2011年   6篇
  2010年   8篇
  2009年   5篇
  2008年   3篇
  2007年   7篇
  2006年   9篇
  2005年   12篇
  2004年   11篇
  2003年   6篇
  2002年   7篇
  2001年   4篇
  2000年   10篇
  1999年   6篇
  1998年   7篇
  1997年   9篇
  1996年   12篇
  1995年   4篇
  1994年   3篇
  1993年   5篇
  1991年   6篇
  1990年   5篇
  1989年   4篇
  1986年   9篇
  1985年   13篇
  1984年   10篇
  1983年   9篇
  1982年   6篇
  1981年   9篇
  1980年   12篇
  1979年   7篇
  1978年   8篇
  1977年   8篇
  1976年   10篇
  1975年   8篇
  1974年   13篇
  1973年   10篇
  1972年   9篇
  1971年   16篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
排序方式: 共有497条查询结果,搜索用时 31 毫秒
391.
In the aftermath of September 11, 2001 and Hurricane Katrina, the United States government has spent tens of billions of dollars to improve the nation's ability to respond to a natural disaster or terrorist attack, but the emphasis on immediate first response has left many long-term environmental, political, and technological challenges unaddressed. Although a dirty bomb attack is unlikely to yield the same amount of physical devastation and death as caused by Katrina or a nuclear weapon, the social, psychological, and economic impact would be enormous. At present, however, the United States lacks the technology necessary to decontaminate a large, densely populated urban area under time, political, and economic constraints. This article reviews past cleanup experiences and current decontamination capabilities to consider the long-term implications of a dirty bomb, identifies weaknesses in America's existing response capabilities, notes possible areas of political friction, and considers the implications of the failure to adequately prepare. Having the appropriate decontamination techniques established and long-term plans in place before an incident occurs will significantly improve the government's ability to protect public and environmental security, establish a viable decontamination strategy, allow residents to return to their homes, and get the local economy back on its feet.  相似文献   
392.
This article examines the relationship between the White House and the US Military Assistance Command, Vietnam (MACV) during President Richard M. Nixon's administration. It argues that dysfunctional civil-military relations between 1969 and 1972 undermined the implementation of a sound military strategy during the United States' withdrawal from South Vietnam as Nixon attempted to achieve ‘peace with honor’ during the Vietnam War's final campaigns. By 1972, the relationship between the White House and MACV headquarters had reached the nadir of civil-military relations during the Southeast Asian conflict and had served to undercut the United States' ability to effectively disengage from a long and bitterly contested war.  相似文献   
393.
The books under review here, by Robert F. Hannigan, John A. Thompson, Trygve Throntveit, and Adam Tooze, offer an interpretation of Wilsonian internationalism and what happened to it in the 1920s. For Tooze and Hannigan, Wilsonianism was primarily a project to attain American predominance in the world. For Throntveit, Wilsonian internationalism constituted a pragmatic yet radical effort to end competitive power politics. Thompson disagrees with these arguments and asserts that the key to understanding US policy lay in how US leaders conceptualized American power. Thompson’s interpretation is especially compelling in explaining why the United States failed to engage itself more assertively in international affairs in the 1920s – a failure Tooze suggests undermined the viability of the postwar international system.  相似文献   
394.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
395.
The Fisher naval revolution of 1904–10 represented a deliberate attempt to achieve defense transformation to bolster Britain's pretensions to global naval supremacy. The vision called for smaller, more capable forces to do the work of larger, more expensive conventional formations. It consisted of three main elements. First, the replacement of the traditional station fleet system for protecting overseas interests by rapid deployment forces comprised of battlecruisers that could be ‘maneuvered’ by wireless to combat specific enemy threats. Second, at home, instead of a sea control strategy based upon a superior battle-fleet, a sea denial strategy based on flotilla defense commanded and controlled from London via wireless. The third element of the Fisher revolution depended upon ‘plunging’, or shaping and directing technological change through a special relationship with armaments firms. A sophisticated information-communications network was integral to the revolution.  相似文献   
396.
397.
Robert S. McNamara [and Brian Van De Mark,] In Retrospect: The Tragedy and Lessons of Vietnam, NewYork:NewYork Times Books, Random House, 1995. Pp.xviii + 414. $27.50. ISBN 08129–2523–8.  相似文献   
398.
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   
399.
A recent article, ‘Rage Against the Machines’, does a disservice to the debate over what explains counterinsurgency (COIN) success. While it establishes a negative correlation between the diffusion of military mechanization in the state system and COIN success, its theoretical argument does not hold up under close scrutiny and its micro-case comparison of two units in Iraq during 2003–2004 ignores obvious counter-examples and factors that influence COIN success, such as leadership. A deeper inquiry would have revealed that there is much more to COIN success than simply not having access to vehicles.  相似文献   
400.
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号