首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   325篇
  免费   0篇
  325篇
  2019年   6篇
  2018年   9篇
  2017年   10篇
  2016年   9篇
  2015年   3篇
  2014年   7篇
  2013年   127篇
  2012年   3篇
  2010年   5篇
  2009年   2篇
  2006年   1篇
  2005年   5篇
  2004年   1篇
  2003年   4篇
  2002年   6篇
  2001年   1篇
  2000年   4篇
  1999年   3篇
  1998年   4篇
  1997年   5篇
  1996年   3篇
  1995年   4篇
  1994年   4篇
  1993年   7篇
  1992年   6篇
  1991年   3篇
  1990年   3篇
  1989年   4篇
  1988年   4篇
  1987年   8篇
  1986年   5篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   7篇
  1977年   2篇
  1976年   4篇
  1975年   2篇
  1974年   3篇
  1972年   3篇
  1971年   4篇
  1970年   3篇
  1969年   4篇
  1968年   3篇
  1967年   4篇
  1966年   1篇
排序方式: 共有325条查询结果,搜索用时 15 毫秒
41.
    
In recent years, it has been argued more than once that situations determine our conduct to a much greater extent than our character does. This argument rests on the findings of social psychologists such as Stanley Milgram, who have popularized the idea that we can all be brought to harm innocent others. An increasing number of philosophers and ethicists make use of such findings, and some of them have argued that this so-called situationist challenge fatally undermines virtue ethics. As virtue ethics is currently the most popular underpinning for ethics education in the military, it is important to know to what extent the claim situationists make is correct. Fortunately, a closer look indicates that an interactionist perspective, with our character and the situation interplaying, is more accurate than the situationist perspective.  相似文献   
42.
    
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
43.
    
Many cooperative games, especially ones stemming from resource pooling in queueing or inventory systems, are based on situations in which each player is associated with a single attribute (a real number representing, say, a demand) and in which the cost to optimally serve any sum of attributes is described by an elastic function (which means that the per‐demand cost is non‐increasing in the total demand served). For this class of situations, we introduce and analyze several cost allocation rules: the proportional rule, the serial cost sharing rule, the benefit‐proportional rule, and various Shapley‐esque rules. We study their appeal with regard to fairness criteria such as coalitional rationality, benefit ordering, and relaxations thereof. After showing the impossibility of combining coalitional rationality and benefit ordering, we show for each of the cost allocation rules which fairness criteria it satisfies. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 271–286, 2017  相似文献   
44.
    
This article explores the relationship between ethnic representation in security sector institutions and perceptions of safety. While most studies on post-conflict institutional reform focus on national institutions and outcomes, this article argues that a more nuanced view on ethnic representation is fruitful in order to account for the everyday perceptions of local people. Drawing on post-conflict Kosovo, the article analyzes how the representation of ethnic minorities in security institutions affects perceptions of safety among individuals across Kosovo’s municipalities. It also analyzes original interview data collected in the Pristina and Mitrovica municipalities that are typical cases of our sample. Both approaches validate that those municipalities that have ethnically representative security institutions also have higher levels of perceived safety.  相似文献   
45.
    
  相似文献   
46.
    
We show the existence of a unique analytic single parameter limiting survival function arising from the repeated composition of a coherent structure as the number of components tends to infinity. Examples include the repeated composition process of the bridge structure. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
47.
    
We present an air-defense engagement model to counter an attack by multiple antiship missiles, assuming perfect kill assessment. In this model, the probability of shooting down all incoming missiles is maximized. A generating function is employed to produce an algorithm which is used to evaluate the outcomes. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 687–697, 1997  相似文献   
48.
    
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance.  相似文献   
49.
    
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
50.
    
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号