首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   353篇
  免费   11篇
  国内免费   1篇
  2021年   6篇
  2019年   10篇
  2018年   4篇
  2017年   7篇
  2016年   11篇
  2015年   6篇
  2014年   6篇
  2013年   75篇
  2012年   6篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   6篇
  2007年   5篇
  2006年   8篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   5篇
  2001年   3篇
  2000年   4篇
  1997年   6篇
  1996年   7篇
  1994年   5篇
  1993年   9篇
  1992年   6篇
  1991年   7篇
  1990年   2篇
  1989年   5篇
  1987年   2篇
  1986年   7篇
  1985年   8篇
  1984年   5篇
  1983年   5篇
  1982年   6篇
  1981年   4篇
  1980年   9篇
  1979年   7篇
  1978年   8篇
  1977年   2篇
  1976年   7篇
  1975年   10篇
  1974年   6篇
  1973年   8篇
  1972年   5篇
  1971年   4篇
  1970年   5篇
  1969年   4篇
  1968年   5篇
  1967年   3篇
排序方式: 共有365条查询结果,搜索用时 62 毫秒
111.
Pakistan has an uneven history of dealing with insurgencies and extremism. This article identifies the various campaigns and policies employed to defeat militants and deal with violent extremism. It describes the major anti-state groups and how Pakistan’s military and civilian leaders, relying on the related strategies of selectivity, gradualism and containment, have allowed militancy and terrorism to thrive. This article finds that while the elites and the public may have belatedly come to appreciate the existential internal threats these groups pose to the country, there are strong reasons to doubt the state’s full commitment to its promises to take meaningful action.  相似文献   
112.
The UN asks governments to report key figures of their annual military budgets with the aim of creating trust among member states. This goal can only be achieved if the data reported is accurate. However, although there are many reasons for governments to falsify data, the UN does not check for manipulation. In this paper, we apply Benford’s law to the military expenditure data of 27 states taken from the UN register. Our analysis of the first digits shows that the states with the greatest deviations from the expected Benford distribution and therefore the lowest data quality are the USA and the UK.  相似文献   
113.
The global defense‐industrial sector reflects the hierarchy of power in the post‐Cold War world. As in the larger international system, the United States plays the dominant role in the defense sector as well. It is a comparative advantage often used by US policymakers to influence the foreign policy behavior of other states. Curiously, the radical concentration of the world’s defense industrial sector, as described here, has received relatively little scrutiny from either academia or the media, even though it not only reflects the international order but provides the United States with considerable leverage in it.  相似文献   
114.
This paper aims at forecasting the burden on the Greek economy resulting from the arms race against Turkey and at concentrating on the leading determinants of this burden. The military debt and the defence share of GDP are employed alternatively in order to approximate the measurement of the arms race pressure on Greece, and the method used is that of artificial neural networks. The use of a wide variety of explanatory variables in combination with the promising results derived, suggest that the impact on the Greek economy resulting from this arms race is determined, to a large, extent, by demographic factors which strongly favour the Turkish side. Prediction on both miltary debt and defence expenditure exhibited highly satisfactory accuracy, while the estimation of input significance, indicates that variables describing the Turkish side are often dominant over the corresponding Greek ones.  相似文献   
115.
This paper presents an alternative approach for analyzing international competition and alliances as rent‐seeking contests that are able to capture the impure public good nature of defense spending. Two‐country Cournot and Stackelberg games are considered and comparative static results derived. A three‐country model is investigated, and alliance behavior is explored in the context of this rent‐seeking model. The conjecture that an alliance may become less effective if the allies’ interests become more closely aligned is verified. Finally, the model is generalized, and a Nash‐Cournot equilibrium is computed.  相似文献   
116.
Conflict resolution processes must meet certain prerequisites and conditions. Unless the warring parties or the mediators meet, it will be difficult to find lasting and just solutions to the conflicts in the Horn (Djibouti, Eritrea and Ethiopia, and Somalia). Most of these conflicts have ethnic or religious components and also have a lot do with the nature of the government institutions and the power distribution among the communities within these states. Identifying the main causes of the conflict and the issues involved in each country is a very necessary first step toward peace. Secondly, conditions have to be identified that would make the current peace agreements work. This includes identifying the specific problems faced by the parties involved; ascertaining the validity of the mechanisms through which the problems will be overcome; and planning how the agreements will be maintained. The knowledge that mediators have about the conflict is often as important as the actual meeting of parties at the negotiation table. This article also evaluates the peace initiatives underway in the Horn and attempts to identify the apparent reasons that prevented their implementation.  相似文献   
117.
118.
119.
120.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号