首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   108篇
  免费   0篇
  108篇
  2024年   1篇
  2023年   3篇
  2021年   2篇
  2020年   5篇
  2019年   12篇
  2018年   5篇
  2017年   11篇
  2016年   9篇
  2015年   2篇
  2014年   12篇
  2013年   17篇
  2012年   4篇
  2011年   7篇
  2010年   4篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   1篇
  1998年   1篇
  1994年   1篇
排序方式: 共有108条查询结果,搜索用时 15 毫秒
11.
周朴  陶汝茂 《国防科技》2017,38(3):051-057
美国联合非致命武器理事会在成立20周年之际发布了《联合非致命武器项目科技战略规划2016-2025》,对未来十年相关领域的科技发展做出了部署安排。本文介绍美国联合非致命武器项目的使命职能、组织机构、运行模型、代表性成果以及十年科技战略规划,旨在为技术创新和管理创新提供参考和借鉴。  相似文献   
12.
    
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners..  相似文献   
13.
A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized.  相似文献   
14.
With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy – strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties.  相似文献   
15.
    
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
16.
    
We consider the single server Markovian queue subject to Poisson generated catastrophes. Whenever a catastrophe occurs, all customers are forced to abandon the system, the server is rendered inoperative and an exponential repair time is set on. During the repair time new arrivals are allowed to join the system. We assume that the arriving customers decide whether to join the system or balk, based on a natural linear reward‐cost structure with two types of rewards: A (usual) service reward for those customers that receive service and a (compensation) failure reward for those customers that are forced to abandon the system due to a catastrophe. We study the strategic behavior of the customers regarding balking and derive the corresponding (Nash) equilibrium strategies for the observable and unobservable cases. We show that both types of strategic behavior may be optimal: to avoid the crowd or to follow it. The crucial factor that determines the type of customer behavior is the relative value of the service reward to the failure compensation. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
17.
    
This paper looks at the virtual dimension of contemporary insurgency and counterinsurgency. It argues that the West is faltering in the ‘War of Ideas’ with global Jihad for the main reason that the messages that we wish to convey lack narrative coherence. This is a result of the fact that we misapprehend the nature of the virtual operational environment whereas our opponents possess an intuitive grasp of it as a result of which their structure and method of operations are better adapted and more effective than our own. There is no reason, beyond inertia, that this should remain the case.  相似文献   
18.
    
This article proposes a strategic reason for a proprietary component supplier to license her technology to a competitor or a manufacturer: her anticipation of the manufacturer's strategic commitment to invest in research and development (R&D). We address this phenomenon with a game theoretic model. Our results show that the manufacturer's full commitment to invest in R&D enables the supplier to license, sell a larger quantity through the supply chain, and charge lower prices. These results are robust to the type of demand uncertainty faced by the manufacturer within the class of increasing generalized failure rate distributions. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 341–350, 2014  相似文献   
19.
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged.  相似文献   
20.
    
South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis does not support this assertion. However, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. South Korea should highlight that THAAD will be deployed by the United States Forces Korea and is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号