首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   644篇
  免费   15篇
  659篇
  2021年   11篇
  2019年   16篇
  2018年   13篇
  2017年   12篇
  2016年   12篇
  2015年   11篇
  2014年   6篇
  2013年   101篇
  2011年   6篇
  2010年   8篇
  2009年   11篇
  2007年   11篇
  2006年   9篇
  2005年   13篇
  2004年   13篇
  2003年   7篇
  2002年   9篇
  2001年   9篇
  2000年   13篇
  1999年   8篇
  1998年   8篇
  1997年   12篇
  1996年   14篇
  1995年   11篇
  1994年   12篇
  1993年   8篇
  1992年   9篇
  1991年   18篇
  1990年   12篇
  1989年   16篇
  1988年   12篇
  1987年   15篇
  1986年   14篇
  1985年   11篇
  1984年   13篇
  1983年   9篇
  1982年   7篇
  1981年   12篇
  1980年   13篇
  1979年   10篇
  1978年   12篇
  1977年   13篇
  1976年   10篇
  1975年   7篇
  1974年   13篇
  1973年   11篇
  1972年   11篇
  1971年   14篇
  1969年   7篇
  1968年   6篇
排序方式: 共有659条查询结果,搜索用时 9 毫秒
51.
52.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances.  相似文献   
53.
Since declaring their nuclear weapons capabilities in 1998, India and Pakistan have engaged in three major crises that each threatened to escalate into war. In each crisis, the USA engaged in active diplomacy to dissuade the South Asian rivals from taking escalatory actions. Previous literature on the crises has described the American role, but has not theorized third-party involvement in a nuclearized regional rivalry. We apply Timothy Crawford’s pivotal deterrence theory to the nuclearized India–Pakistan conflict, and extend the original theory to cover the novel condition of a non-superpower nuclear dyad, in the context of a single-superpower international system. We find that America’s pivotal deterrence generally enhanced stability in the India–Pakistan crises, and unlike in pre-nuclear South Asia, other great powers supported American diplomacy. However, we suggest that future regional crises between nuclear rivals, in South Asia or elsewhere, may present greater challenges for pivotal deterrence.  相似文献   
54.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
55.
This article analyses the main challenges and future prospects of creating United Nations (UN) rapid reaction mechanisms, particularly in the light of past attempts and current discussions about a “UN Vanguard Force” in the wake of the High-Level Panel on Peace Operations report. The article reviews major initiatives (in particular lessons from the Standby High Readiness Brigade for UN Operations) and assesses the main achievements, failures, and challenges related to past UN-led rapid reaction mechanisms. In line with the overall aim of this special forum, the article highlights the future potentials and institutional, operational, financial, and political challenges that need to be overcome in order to design and create a pragmatic and effective rapid reaction tool at the disposal of the UN.  相似文献   
56.
57.
We present an air-defense engagement model to counter an attack by multiple antiship missiles, assuming perfect kill assessment. In this model, the probability of shooting down all incoming missiles is maximized. A generating function is employed to produce an algorithm which is used to evaluate the outcomes. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 687–697, 1997  相似文献   
58.
While there has been significant previous literature on inventory transshipment, most research has focused on the dealers' demand filling decision (when to fill transshipment requests from other dealers), ignoring the requesting decision (when to send transshipment requests to other dealers). In this paper we develop optimal inventory transshipment policies that incorporate both types of decisions. We consider a decentralized system in which the dealers are independent of the manufacturer and of each other. We first study a network consisting of a very large number of dealers. We prove that the optimal inventory and transshipment decisions for an individual dealer are controlled by threshold rationing and requesting levels. Then, in order to study the impact of transshipment among independent dealers in a smaller dealer network, we consider a decentralized two‐dealer network and use a game theoretic approach to characterize the equilibrium inventory strategies of the individual dealers. An extensive numerical study highlights the impact of the requesting decision on the dealers' equilibrium behavior in a decentralized setting. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
59.
An area defense consists of several groups that act independently, i.e., do not communicate with each other. Each group has a fixed number of defenders and a controller that allocates these defenders optimally against the individual attackers comprising an attack. We analyze the effectiveness of this partially coordinated defense against a simultaneous attack of known size in which all attackers are considered to be equally lethal. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
60.
The mechanical, thermal and ablation properties of carbon phenolic (C-Ph) composites (Type-I) rein-forced with different weight percentages of organo-modified montmorillonite (o-MMT) nanoclay have been studied experimentally. Ball milling was used to disperse different weight (wt) percentages (0, 1,2,4,6 wt.%) of nanoclay into phenolic resin. Viscosity changes to resin due to nanoclay was studied. On the other hand, nanoclay added phenolic matrix composites (Type-II) were prepared to study the dispersion of nanoclay in phenolic matrix by small angle X-ray scattering and thermal stability changes to the matrix by thermogravimetric analyser (TGA). This data was used to understand the mechanical, thermal and ablation properties of Type-I composites. Inter laminar shear strength (ILSS), flexural strength and flexural modulus of Type I composites increased by about 29%, 12%and 7%respectively at 2 wt.% addition of nanoclay beyond which these properties decreased. This was attributed to reduced fiber volume fraction (%Vf) of Type-I composites due to nanoclay addition at such high loadings. Mass ablation rate of Type-I composites was evaluated using oxy acetylene torch test at low heat flux (125 W/cm2) and high heat flux levels (500 W/cm2). Mass ablation rates have increased at both flux levels marginally up to 2 wt.% addition of nanoclay beyond which it has increased significantly. This is in contrast to increased thermal stability observed for Type-I and Type-Ⅱ composites up to 2 wt.%addition of nanoclay. Increased ablation rates due to nanoclay addition was attributed to higher insulation effi-ciency of nanolcay, which accumulates more heat energy in limited area behind the ablation front and self-propagating ablation mechanisms triggered by thermal decomposition of organic part of nanoclay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号