首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   240篇
  免费   10篇
  2020年   3篇
  2019年   13篇
  2018年   9篇
  2017年   4篇
  2016年   8篇
  2015年   7篇
  2014年   7篇
  2013年   75篇
  2011年   8篇
  2010年   2篇
  2009年   3篇
  2008年   4篇
  2007年   7篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   4篇
  2001年   3篇
  1999年   5篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1995年   3篇
  1994年   6篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   3篇
  1989年   4篇
  1988年   4篇
  1987年   4篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   3篇
  1981年   1篇
  1979年   2篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
  1970年   3篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有250条查询结果,搜索用时 15 毫秒
71.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
72.
This paper looks at the impact of military technology diffusion on military assistance operations (MAO), in the United States known as Security Force Assistance or SFA. The discussion looks conceptually at the role of technological change and how it interacts with martial cultures in military assistant operations. I argue that growing trends in science and technology suggest potential conflicts between culture and technology. Relying on a culture-technology model drawn from anthropology, the paper contends that new technologies will present increasing challenges for the emerging MAO landscape. The paper will illustrate that the techno-science gap will continue to grow as innovations such as robotics, sensors, and networks continue to develop. Finally, the paper will look at ways to overcome this conflict between culture and technology.  相似文献   
73.
Despite the emphasis in doctrine and academia that counterinsurgency is in its essence political, these operations are all too commonly discussed and approached as primarily military endeavors. Informed by the need to refocus counterinsurgency studies, this article revisits a foundational case of the canon – the Malayan Emergency – to discuss its political (i.e., not military) unfolding. The analysis distinguishes itself by emphasizing the diplomatic processes, negotiations, and deals that gave strategic meaning to the military operations underway. In so doing, the article also generates insight on the use of leverage and elite bargains in creating new political settlements and bringing insurgent conflicts to an end.  相似文献   
74.
We consider a container terminal discharging containers from a ship and locating them in the terminal yard. Each container has a number of potential locations in the yard where it can be stored. Containers are moved from the ship to the yard using a fleet of vehicles, each of which can carry one container at a time. The problem is to assign each container to a yard location and dispatch vehicles to the containers so as to minimize the time it takes to download all the containers from the ship. We show that the problem is NP‐hard and develop a heuristic algorithm based on formulating the problem as an assignment problem. The effectiveness of the heuristic is analyzed from both worst‐case and computational points of view. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 363–385, 2001  相似文献   
75.
We consider a version of the famous bin-packing problem where the cost of a bin is a concave function of the number of items in the bin. We analyze the problem from an average-case point of view and develop techniques to determine the asymptotic optimal solution value for a variety of functions. We also describe heuristic techniques that are asymptotically optimal. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 673–686, 1997  相似文献   
76.
Rather than win hearts and minds, authoritarian counterinsurgency is said to rely heavily on coercion. It has a reputation for effectiveness, if also for its amorality. Still, the research into authoritarian counterinsurgency is surprisingly lacking. By distilling common features from key cases, this article concludes that this approach goes beyond the indiscriminate violence that typically captures the imagination. Like their democratic counterparts but differently, authoritarian regimes also engage in mobilisation, create narratives, and turn military advantage into political gain. The analysis explains how these tasks are undertaken and, by contradistinction, sheds light on more liberal approaches as well.  相似文献   
77.
Case summary, by James Cook (Case Study Editor):

In the final issue of the 2015 volume of the Journal of Military Ethics, we published a case study entitled “Coining an Ethical Dilemma: The Impunity of Afghanistan’s Indigenous Security Forces”, written by Paul Lushenko. The study detailed two extra-judicial killings (EJKs) by Afghan National Police (ANP) personnel in an area stabilized and overseen by a US-led Combined Task Force (CTF). To deter further EJKs following the first incident, the CTF’s commander reported the incidents up his chain of command and used the limited tools at his disposal to influence local indigenous officials directly. Apparently, the ANP unit took no notice. In his commentary on the case study, Paul Robinson considered moral compromise in war more generally. Coalition troops in Afghanistan, for instance, have encountered not just EJKs but also sexual abuse of minors, killing of non-combatants, kidnapping, torture, and widespread corruption. What should the soldier on the ground do if indigenous personnel violate Laws of Armed Conflict (LOAC) with impunity? Refusing to serve will not right or prevent moral wrongs, while staying on to fight the good but futile fight will mire the soldier in moral compromise. “?… [S]oldiers faced with this dilemma have no good options. The systemic failings surrounding them mean that it is probable that nothing they do will help”. In a concluding note, I suggested that while an individual soldier may indeed have no good options, as Paul Robinson suggests, that soldier’s military and nation at large are obliged to do what they can. At least, they must keep to the moral high ground so as not to give indigenous security forces an excuse to misbehave, and determine the nature of crimes such as EJKs: are they outlaw acts or in fact endorsed by the indigenous culture and perhaps even government? Below Colonel Dave Barnes, himself a veteran of Operation Enduring Freedom, analyzes Paul Lushenko’s case study at “?…?the local, tactical level: If a commander is in this situation – where her unit witnesses an EJK or other war crime – what should she do?”  相似文献   
78.
We consider the problem of efficiently scheduling deliveries by an uncapacitated courier from a central location under online arrivals. We consider both adversary‐controlled and Poisson arrival processes. In the adversarial setting we provide a randomized (3βΔ/2δ ? 1) ‐competitive algorithm, where β is the approximation ratio of the traveling salesman problem, δ is the minimum distance between the central location and any customer, and Δ is the length of the optimal traveling salesman tour overall customer locations and the central location. We provide instances showing that this analysis is tight. We also prove a 1 + 0.271Δ/δ lower‐bound on the competitive ratio of any algorithm in this setting. In the Poisson setting, we relax our assumption of deterministic travel times by assuming that travel times are distributed with a mean equal to the excursion length. We prove that optimal policies in this setting follow a threshold structure and describe this structure. For the half‐line metric space we bound the performance of the randomized algorithm in the Poisson setting, and show through numerical experiments that the performance of the algorithm is often much better than this bound.  相似文献   
79.
The global financial turmoil of 2008 has resulted in the curtailment of military expenditure in most western countries. At a sub-regional-level reductions in the level of activity at a major military facility can have significant economic impact. In the light of this, the paper has two objectives: to analyse the impact of the decision to terminate naval shipbuilding at the United Kingdom’s Portsmouth Naval Base; and, for illustrative purposes, to examine the possible economic consequences of further contraction at the facility. In pursuit of these aims, it is necessary to establish the output, income and employment generated by the base using a bespoke input–output model. The methodology employed can, with appropriate adjustments, be utilised in other military or civilian contexts.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号