首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2748篇
  免费   498篇
  国内免费   129篇
  2024年   4篇
  2023年   21篇
  2022年   28篇
  2021年   41篇
  2020年   34篇
  2019年   65篇
  2018年   58篇
  2017年   109篇
  2016年   117篇
  2015年   81篇
  2014年   223篇
  2013年   271篇
  2012年   187篇
  2011年   220篇
  2010年   187篇
  2009年   210篇
  2008年   169篇
  2007年   195篇
  2006年   172篇
  2005年   171篇
  2004年   148篇
  2003年   112篇
  2002年   83篇
  2001年   80篇
  2000年   54篇
  1999年   56篇
  1998年   33篇
  1997年   37篇
  1996年   34篇
  1995年   27篇
  1994年   31篇
  1993年   20篇
  1992年   21篇
  1991年   18篇
  1990年   27篇
  1989年   16篇
  1988年   12篇
  1987年   2篇
  1975年   1篇
排序方式: 共有3375条查询结果,搜索用时 93 毫秒
921.
How do we assess the health of international regimes? Many analysts have insisted recently that the nuclear nonproliferation regime is in urgent need of repair or that it should even be discarded because of its supposed ineffectiveness. However, it is essential that statements about the regime being in crisis be scrutinized for veracity and utility. While the spread of nuclear weapons poses an undeniable and serious threat to international security, a mistaken crisis mentality with respect to the regime could lead to rash attempts to alter it in unnecessary or ineffective ways or, at worst, to discard it completely. This paper returns to a theoretical framework that differentiates regimes, across both issue areas and time, to provide a more specified evaluation of regime health. By disaggregating the nuclear nonproliferation regime and assessing the individual and interactive health of multiple dimensions, a number of dimension-specific, regime-strengthening policy recommendations emerge.  相似文献   
922.
ABSTRACT

Since the 1950s, the United States has engaged in nuclear sharing with its NATO allies. Today, 150-200 tactical nuclear weapons remain on European soil. However, the Treaty on the Non-proliferation of Nuclear Weapons (NPT) prohibits the transfer of nuclear weapons to non-nuclear weapon states. The potential discrepancy between text and practice raises the question of how the NPT's negotiators dealt with NATO's nuclear-sharing arrangements while drafting the treaty that would eventually become the bedrock of the international nonproliferation regime. Using a multitiered analysis of secret negotiations within the White House National Security Council, NATO, and US-Soviet bilateral meetings, this article finds that NATO's nuclear-sharing arrangements strengthened the NPT in the short term by lowering West German incentives to build the bomb. However, this article also finds that decision makers and negotiators in the Lyndon B. Johnson administration had a coordinated strategy of deliberately inserting ambiguous language into drafts of Articles I and II of the Treaty to protect and preserve NATO's pre-existing nuclear-sharing arrangements in Europe. This diplomatic approach by the Johnson administration offers lessons for challenges concerning NATO and relations with Russia today.  相似文献   
923.
ABSTRACT

The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) allows states to exempt nuclear material from international safeguards for use in nuclear submarine programs. This material, however, could be diverted for nuclear weapons purposes without the knowledge of inspectors, creating a potentially dangerous loophole in the treaty. This article argues that exercising that loophole today would amount to admitting a nuclear weapon program, making it a particularly poor pathway to a weapon for a potential proliferant. Still, if states like Brazil ultimately exempt nuclear material from safeguards for a nuclear submarine effort, they could set a dangerous precedent that makes it easier for others to use the loophole as a route to a nuclear weapon capability. There are several policy options available to mitigate the damage of such a precedent; most promising is the prospect of a voluntary safeguards arrangement that would allow international inspectors to keep an eye on nuclear material even after it has been dedicated to a naval nuclear propulsion program.  相似文献   
924.
The 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) produced a Final Document calling for an extension of the principles of the nonproliferation norm as well as steps toward complete disarmament. This article looks beyond the rhetoric, however, to examine recent decisions by great powers to expand nuclear trade with non-NPT countries and the implications of these decisions on the traditional nonproliferation norm of restraint. This article seeks to contribute to constructivist theory by supplementing existing accounts of norm creation and establishment with a new model of norm change. The article develops a case study of the 2008 US-India nuclear deal to highlight the role of elite agency in key stages of norm change, including redefinition and constructive substitution through contestation. It concludes that the traditional nonproliferation norm may be evolving in new directions that are not well captured by existing theoretical frames.  相似文献   
925.
ABSTRACT

South Africa's nuclear disarmament is a unique historical case, notable in part for the dramatic shift from deception to cooperation. The unprecedented transparency it demonstrated in order to convince the international community of the veracity of their disarmament is heralded as an exemplar for verifiable denuclearization. Less known is how this case affords insights into how a nuclear weapon program can be clandestinely hidden by the ambiguity provided by an otherwise completely legitimate, peaceful, nuclear energy program. Using a variety of open sources, including newly declassified internal South African and US government reports, it can be shown that South Africa employed a variety of deceptive tactics before it disarmed, and even for nearly two years after becoming a signatory to the Treaty on the Non-Proliferation of Nuclear Weapons. This article reviews that information to derive instructive lessons on the lengths that a nuclear proliferant state might go to conceal its true capabilities and intentions, and to thwart international discovery of the existence and full extent of an existing—or, in this case, a former—nuclear weapon program.  相似文献   
926.
Data from a cross-sectional survey of 176 Lebanese Shiis living in Metropolitan Beirut have been used to investigate the relationship between social and religious variables and attitudes toward Lebanon's “Party of God” (Hezbollah). The results indicate that Islamic religiosity, political discontent, and access to social welfare are positively associated with endorsement of the party. The implications of these findings for the party's future in light of recent political developments are discussed.  相似文献   
927.
In marked contrast with previous decades, defense issues in Argentina have started to receive increasing political attention over the last few years. The main goal of this article is to account for this new found interest in defense policy. The article contends that this revival could be accounted for by both the implementation of a neo-developmentalist strategy and a type of control that emphasizes civilian oversight over the armed forces. Both factors have promoted the implementation of policies that favored an increase in the military budget, the reconstruction of the defense industry and the establishment of a new military doctrine. This article evaluates the impact of factors that have not been previously considered by the literature on defense attention in South America.  相似文献   
928.
频率搅拌混响室内小屏蔽体的场均匀性检验   总被引:1,自引:0,他引:1  
为了研究频率搅拌混响室内小屏蔽体的屏蔽效能测试方法,需要检验小屏蔽体内的场均匀性.通过对混响室的场均匀性测试方法的研究,提出基于矢量网络分析仪的测试方法,通过计算工作区域任意两点的功率比检验场均匀性,并用该方法检验工作区域内小屏蔽体的场均匀性.实验结果表明:混响室采用扫频信号实现频率搅拌时,放置于工作区域的小屏蔽体内部同样有较好的场均匀性.  相似文献   
929.
In a world virtually free of slavery and colonialism and one mainly driven by the sovereign state rationale, allusion to manifestations or the existence of some form of these phenomena within a state is often received with dumbfounding indifference or denial. However, a form of rule that had continued in South Sudan long after the departure of the British in 1956 was colonial both in its quintessence and flair in that it disenfranchised its citizens and denied them the most basic freedoms, services and development. Under this establishment, resistance against the coercive vision of the state was brutally suppressed for many decades. This state of affairs finally ended in July 2011. Nonetheless, there is a miscellany of unresolved post-colonial issues between the two countries that warrant attention. These include security and the demarcation of borders, the issue of ludicrous transit fees for South Sudan's oil exportation through Sudan, citizenship, external debt repayment, etc. These issues are part of traps inherited from the anti-colonial struggle, which have now supplanted the old ensemble of North–South conflict paroxysm. As a matter of urgency, the two countries will have to wrap up the incomplete process of negotiation on these substantive issues. The talks should be approached with a new mindset based on the new reality of two sovereign states. To the extent that it is widely established that South Sudan and Sudan must coexist peacefully in order to develop into viable entities, such mutual dependency must be based on equality and respect.  相似文献   
930.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号