全文获取类型
收费全文 | 440篇 |
免费 | 10篇 |
出版年
2021年 | 6篇 |
2019年 | 16篇 |
2018年 | 10篇 |
2017年 | 12篇 |
2016年 | 9篇 |
2015年 | 11篇 |
2014年 | 3篇 |
2013年 | 83篇 |
2012年 | 3篇 |
2011年 | 5篇 |
2010年 | 6篇 |
2009年 | 4篇 |
2008年 | 3篇 |
2007年 | 7篇 |
2006年 | 7篇 |
2005年 | 11篇 |
2004年 | 8篇 |
2003年 | 5篇 |
2001年 | 4篇 |
2000年 | 9篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 4篇 |
1994年 | 10篇 |
1991年 | 5篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1986年 | 9篇 |
1985年 | 11篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1975年 | 6篇 |
1974年 | 11篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 13篇 |
1970年 | 3篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 3篇 |
1948年 | 2篇 |
排序方式: 共有450条查询结果,搜索用时 46 毫秒
71.
72.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
73.
Stuart A. Cohen 《战略研究杂志》2013,36(4):78-93
The British provided unprecedented shelter, training and supplies that made possible the revival of a new and better Belgian Army after the crushing German victories in 1940. Starting in Wales in 1940 as a small and disunited group, the Belgians improved more than any of the Allied exile ground forces. By 1944, their independent brigade fought well in Normandy and Belgium, restoring national pride and proving the worth of British help. The parallel and interdependent processes between the British and their Continental guests allows this analysis of the Anglo‐Belgian experience to be useful in considering British Army interactions with the other exiles as well. 相似文献
74.
75.
John A. Nagl 《Small Wars & Insurgencies》2013,24(3):377-382
Etzioni both exaggerates and minimizes the influence of my book Learning to Eat Soup with a Knife on different components of US military doctrine, mischaracterizes my treatment of the Malayan Emergency, and unfairly denigrates the successes of counterinsurgency in Iraq from 2007 to 2011 while misattributing the reasons for its failures in both Iraq and Afghanistan. 相似文献
76.
77.
Stochastic combat models are more realistic than either deterministic or exponential models. Stochastic combat models have been solved analytically only for small combat sizes. It is very difficult, if not impossible, to extend previous solution techniques to larger-scale combat. This research provides the solution for many-on-many heterogeneous stochastic combat with any break points. Furthermore, every stage in stochastic combat is clearly defined and associated aiming and killing probabilities are calculated. © 1996 John Wiley & Sons, Inc. 相似文献
78.
Silverman's game on (1, B) × (1, B) was analyzed by R. J. Evans, who showed that optimal strategies exist (and found them) only on a set of measure zero in the parameter plane. We examine the corresponding game on (1, B) × (1, D) with D > B, and show that optimal strategies exist in about half the parameter plane. Optimal strategies and game value are obtained explicitly. © 1995 John Wiley & Sons, Inc. 相似文献
79.
Consider the problem of estimating the reliability of a series system of (possibly) repairable subsystems when test data and historical information are available at the component, subsystem, and system levels. Such a problem is well suited to a Bayesian approach. Martz, Waller, and Fickas [Technometrics, 30 , 143–154 (1988)] presented a Bayesian procedure that accommodates pass/fail (binomial) data at any level. However, other types of test data are often available, including (a) lifetimes of nonrepayable components, and (b) repair histories for repairable subsystems. In this article we describe a new Bayesian procedure that accommodates pass/fail, life, and repair data at any level. We assume a Weibull model for the life data, a censored Weibull model for the pass/fail data, and a power-law process model for the repair data. Consequently, the test data at each level can be represented by a two-parameter likelihood function of a certain form, and historical information can be expressed using a conjugate family of prior distributions. We discuss computational issues, and use the procedure to analyze the reliability of a vehicle system. © 1994 John Wiley & Sons, Inc. 相似文献
80.