首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   370篇
  免费   9篇
  2021年   11篇
  2019年   16篇
  2018年   8篇
  2017年   10篇
  2016年   9篇
  2015年   13篇
  2014年   9篇
  2013年   81篇
  2012年   2篇
  2011年   2篇
  2010年   3篇
  2008年   5篇
  2007年   6篇
  2006年   4篇
  2005年   4篇
  2004年   2篇
  2003年   2篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1997年   8篇
  1996年   5篇
  1995年   6篇
  1993年   2篇
  1991年   4篇
  1990年   2篇
  1988年   3篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   8篇
  1980年   5篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1976年   2篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有379条查询结果,搜索用时 15 毫秒
361.
Abstract

Political parties with an armed history are not unusual, yet how these groups function in politics after the transition has largely been ignored. This special issue examines armed groups in party politics, using single and comparative case studies. The introduction forwards five recommendations for future research: (1) We need to see more comparisons across taken for granted boundaries; (2) the consequences for democracy should figure more prominently in our analysis of armed groups; (3) think more critically about standards and conceptual tools; (4) critically examine the interaction between levels of analysis; and (5) methodological pluralism would enrich the field.  相似文献   
362.
363.
This article intends to explain the outstanding sequence of success and failure exhibited by the FARC, the main Colombian guerrilla since the 1980s. It claims that such sequence is unintelligible unless the adoption by the FARC of a militaristic organizational blueprint at its 1982 7th Conference is taken into account. By building itself like an army, the FARC could boost its combat capacity, maintain its structural integrity, and develop powerful mechanisms that held the whole structure together. At the same time, the militarization of the FARC also entailed significant risks and costs like political isolation and high personnel turnover. After describing the militaristic blueprint, the article compares the FARC with other irregular forces that operated in the Colombian context – a comparison which is important to understand the specificity of the FARC trajectory, as well as the benefits and costs involved in it. The analysis highlights the critical role of organizational dimensions in the explanation of civil war outcomes, and suggests that at least for some problems organizational dynamics should be observed at a low level of granularity.  相似文献   
364.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   
365.
The claim that reactor-grade plutonium cannot or will not be used to produce nuclear weapons has been used to justify non-nuclear-weapon states’ large stockpiles of plutonium that has been separated from highly radioactive spent fuel. However, by using reduced-mass plutonium cores, it is possible to manufacture reliable nuclear weapons with reactor-grade plutonium. These weapons can have the same design, size, weight, and predetonation probability as weapons using weapon-grade plutonium and would require no special cooling. The increased radiation from reactor-grade plutonium could be easily managed by shielding and operational procedures. Weapons using plutonium routinely produced by pressurized-water reactors could have a lethal area between 40 percent and 75 percent that of weapons using weapon-grade plutonium. In the past, both Sweden and Pakistan considered using reactor-grade plutonium to produce nuclear weapons, and India may be using reactor-grade plutonium in its arsenal today. Despite claims to the contrary, the United States used what was truly reactor-grade plutonium in a successful nuclear test in 1962. The capability of reactor-grade plutonium to produce highly destructive nuclear weapons leads to the conclusion that the separation of plutonium, plutonium stockpiling, and the use of plutonium-based fuels must be phased out and banned.  相似文献   
366.
367.
There is currently a lack of knowledge about how elites rule post-civil war societies without strong state institutions. This paper argues that elites oftentimes overcome such institutional deficiencies by engaging in governance through brokerage. According to this perspective, elites outsource central state functions to influential broker figures. This is particularly true when dealing with war-affected groups that possess much violent agency. By functioning as social membranes, brokers can help elites and war-affected groups to redefine a new social contract. Liberia is employed as an example to illustrate the paper’s central arguments.  相似文献   
368.
Intrastate conflicts, long eclipsing interstate conflicts, are often internationalized. This paper examines internationalized intrastate conflicts through the types of both the intervening and the embattled regimes. Do democracies, more or less than autocracies, support autocratic governments in their fights against rebels? This paper tests three hypotheses: (1) democracies support autocrats fighting rebels less than autocracies do. (2) Democracies support democratic governments fighting against rebels more than autocracies do. (3) The more democratic two states are, the higher the probability one would support the other’s fight against rebels. Covering all documented external support in intrastate wars (1975–2000), our findings support hypothesis one and two only partly and confirm hypothesis three. However, comparing the two major accounts of the Democratic Peace theory (DPT)—the normative and the structural—our findings corroborate only the former robustly. The paper thus helps enriching the insights of the DPT beyond interstate conflicts.  相似文献   
369.
We investigate the problem in which an agent has to find an object that moves between two locations according to a discrete Markov process (Pollock, Operat Res 18 (1970) 883–903). At every period, the agent has three options: searching left, searching right, and waiting. We assume that waiting is costless whereas searching is costly. Moreover, when the agent searches the location that contains the object, he finds it with probability 1 (i.e. there is no overlooking). Waiting can be useful because it could induce a more favorable probability distribution over the two locations next period. We find an essentially unique (nearly) optimal strategy, and prove that it is characterized by two thresholds (as conjectured by Weber, J Appl Probab 23 (1986) 708–717). We show, moreover, that it can never be optimal to search the location with the lower probability of containing the object. The latter result is far from obvious and is in clear contrast with the example in Ross (1983) for the model without waiting. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
370.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号