全文获取类型
收费全文 | 199篇 |
免费 | 3篇 |
出版年
2023年 | 1篇 |
2020年 | 2篇 |
2019年 | 8篇 |
2018年 | 4篇 |
2017年 | 8篇 |
2016年 | 13篇 |
2015年 | 7篇 |
2014年 | 11篇 |
2013年 | 40篇 |
2012年 | 5篇 |
2011年 | 4篇 |
2010年 | 5篇 |
2009年 | 8篇 |
2008年 | 5篇 |
2007年 | 2篇 |
2006年 | 3篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2002年 | 5篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1968年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有202条查询结果,搜索用时 202 毫秒
161.
162.
163.
164.
Martin Edmonds 《Defense & Security Analysis》2005,21(1):111-114
Some books which have fallen within Defense & Security Analysis's fields of interest have paved the way for further studies, either because they have opened up a new era for enquiry and research, or because they have introduced new approaches and methodologies to existing areas. Other volumes have had impact, but have, in their turn, owed an intellectual debt to an earlier work. Again, there are many books and studies on defense which have become forgotten or which were unappreciated at the time of their publication, but which have immediate relevance to today's problems. This section is designed to review books that fall within these categories with a view to highlighting how and why they deserve serious attention. 相似文献
165.
166.
167.
168.
We consider the problem of assigning alternatives evaluated on several criteria into ordered categories C1,C2,…,Cp. This problem is known as the multi‐criteria sorting problem and arises in many situations such as classifying countries into different risk levels based on economical and socio‐political criteria, evaluating credit applications of bank customers. We are interested in sorting methods that are grounded on the construction of outranking relations. Among these, the Electre Tri method requires defining multidimensional profiles that represent the “frontier” separating consecutive categories Ch and Ch+1, and assigns an alternative to categories according to how it compares to each of the profiles. The explicit specification of the profiles of consecutive categories can be difficult for decision makers. We develop a new outranking based sorting method that does not require the explicit definition of profiles. We instead require the decision maker to assign a subset of reference alternatives to the categories. To assign the remaining alternatives, each such alternative is compared to reference alternatives, and assigned to categories accordingly. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
169.
170.
Jutta Joachim Marlen Martin Henriette Lange Andrea Schneiker Magnus Dau 《Contemporary Security Policy》2018,39(2):298-316
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies. 相似文献