全文获取类型
收费全文 | 172篇 |
免费 | 0篇 |
出版年
2023年 | 1篇 |
2020年 | 2篇 |
2019年 | 4篇 |
2018年 | 1篇 |
2017年 | 7篇 |
2016年 | 8篇 |
2015年 | 5篇 |
2014年 | 7篇 |
2013年 | 34篇 |
2012年 | 3篇 |
2011年 | 4篇 |
2010年 | 6篇 |
2009年 | 5篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 3篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2002年 | 5篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1968年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有172条查询结果,搜索用时 15 毫秒
61.
In an integrated telecommunications network, voice and data traffic compete for the same transmission facilities. Assuming Poisson arrivals and exponential service with different rates, analytic expressions are obtained for measures of performance such as blocking probability and average delay under the following operating rule: class 1 traffic behaves as a loss system while class 2 traffic is buffered when all channels are busy. In view of the inordinate amount of computational effort needed when the number of channels is large, simple approximations have been suggested. 相似文献
62.
63.
In the study of complex queueing systems, analysis techniques aimed al providing exact solutions become ineffective. Approximation techniques provide an attractive alternative in such cases. This paper gives an overview of different types of approximation techniques available in the literature and points out their relative merits. Also, the need for proper validation procedures of approximation techniques is emphasized. 相似文献
64.
The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty. 相似文献
65.
66.
Martin Rupiya 《African Security Review》2013,22(4):128-138
This paper is a summary of some of the key findings of an eighteen-month MilAIDS research project that focused on how militaries in the Southern African countries of Botswana, Swaziland, Tanzania, Zambia and Zimbabwe had coped with the impact of the HIV epidemic since it had been identified amongst the ranks in the 1980s. As a result, there is a single major source for citation, which is ‘The enemy within: Southern African militaries' quarter-century battle with HIV and AIDS’. The summary does, however, contain other information related to developments that have emerged since the completion of the larger study, bringing us up to date with the contemporary discourse in the field. The purpose of highlighting some of the elements in the larger study is twofold: to distil its main findings for easier consumption and to draw our attention to salient factors that are considered worthy of replication. A second objective of this brief paper is of course to whet readers' appetite to read the more detailed work referred to above. 相似文献
67.
68.
Curtis H. Martin 《The Nonproliferation Review》2013,20(1):61-88
Scholarly and popular literature in the recent past has framed nonproliferation diplomacy toward both Iran and North Korea as an example of “good cop/bad cop,” a social-psychological strategy borrowed from law enforcement to describe a process for forcing a confession by subjecting a target to stressful emotional contrast. This article examines those two cases, roughly covering the period since 2003, when the most recent attempts to deal with the Iranian and North Korean proliferation threats began, in light of criteria for employment of the good cop/bad cop strategy. There is some evidence that within the framework of the six-party talks with North Korea and within the framework of the EU-3-U.S. diplomacy toward Iran, the players seeking nonproliferation have adopted good cop/bad cop roles to that end. The article concludes, however, that while there are similarities to the interrogation room technique, the complexity of the international political environment as compared to the interrogation room has prevented the states involved from successfully adopting or effectively exploiting good and bad cop roles. Substantial and exploitable differences of interest among them, and the availability of alternative “escape routes” for the target state, raise serious questions about the applicability of the good cop/bad cop strategy to these two nonproliferation cases, and even about its applicability in future nonproliferation challenges. 相似文献
69.
70.
Offsets are a growing feature of international trade in defence equipment. This article assesses the economics of offsets and outlines UK offsets policy. There is a lack of empirical work in the field and the article presents the results of a survey of UK firms’ experience of their involvement in offsets against UK imports of defence equipment. There is also a case study of the AWACS offset programme and an evaluation of policy implications. 相似文献