首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   420篇
  免费   16篇
  2021年   5篇
  2020年   6篇
  2019年   15篇
  2018年   10篇
  2017年   10篇
  2016年   10篇
  2015年   9篇
  2014年   8篇
  2013年   81篇
  2011年   4篇
  2009年   5篇
  2007年   8篇
  2005年   4篇
  2004年   8篇
  2003年   4篇
  2002年   6篇
  2001年   7篇
  2000年   4篇
  1999年   7篇
  1998年   8篇
  1997年   9篇
  1996年   6篇
  1995年   11篇
  1994年   12篇
  1993年   10篇
  1992年   11篇
  1991年   11篇
  1990年   6篇
  1989年   4篇
  1987年   3篇
  1985年   8篇
  1984年   9篇
  1983年   6篇
  1982年   5篇
  1981年   8篇
  1980年   6篇
  1979年   11篇
  1978年   6篇
  1977年   5篇
  1976年   6篇
  1975年   8篇
  1974年   7篇
  1973年   6篇
  1972年   8篇
  1971年   6篇
  1970年   3篇
  1969年   3篇
  1968年   5篇
  1967年   4篇
  1948年   2篇
排序方式: 共有436条查询结果,搜索用时 15 毫秒
81.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
82.
Although the Islamic State in Iraq and al-Sham (ISIS) is seen as a novel manifestation of Islamic extremism, it is in fact the latest, albeit perhaps the most effective, of a long line of revivalist movements in the Islamic and the Arab worlds. Its motivations – hisba and jihad – differ little from its predecessors and its ambitions – to create a state organised in accordance with the precepts of the Islamic caliphate – reflect a long-standing Islamic ambition. It differs, of course, in terms of the sophistication of its political and military strategies, which mirror the contemporary complexities of the world in which it operates, but its objectives recall long-standing Islamic ideals, even if articulated in radically brutal and extremist ways. More importantly, perhaps, ISIS or Da’ish, to give it its Arabic sobriquet, reflects the enormous degree of resentment inside the Middle East at the ways in which Western powers have intervened in regional affairs over recent years, particularly their support for regimes and economic systems there that have betrayed, in the popular imaginary, the essential principles of social justice that lie at the root of Islamic vision of ideal social order. Indeed, in many respects, its analysis of the world in which it operates and of the objectives it seeks differ little in essence from those any other resistance and rejectionist movement, whether religious or sectarian. More specifically, it has been the sectarian conflict that resulted from the reversal of political order in Iraq as a result of the 2003 American-led invasion that has driven the success of the movement in capturing widespread Sunni support. Whether it can manage the complexities of the administration of a state remains open to question.  相似文献   
83.
84.
Derivatives (or gradients) are important for both sensitivity analysis and optimization, and in simulation models, these can often be estimated efficiently using various methods other than brute‐force finite differences. This article briefly summarizes the main approaches and discusses areas in which the approaches can most fruitfully be applied: queueing, inventory, and finance. In finance, the focus is on derivatives of another sort. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
85.
Discrete‐time queues with D‐MAP arrival process are more useful in modeling and performance analysis of telecommunication networks based on the ATM environment. This paper analyzes a finite‐buffer discrete‐time queue with general bulk‐service rule, wherein the arrival process is D‐MAP and service times are arbitrarily and independently distributed. The distributions of buffer contents at various epochs (departure, random, and prearrival) have been obtained using imbedded Markov chain and supplementary variable methods. Finally, some performance measures such as loss probability and average delay are discussed. Numerical results are also presented in some cases. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 345–363, 2003.  相似文献   
86.
87.
88.
89.
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号