全文获取类型
收费全文 | 326篇 |
免费 | 11篇 |
国内免费 | 1篇 |
出版年
2021年 | 6篇 |
2019年 | 10篇 |
2018年 | 4篇 |
2017年 | 7篇 |
2016年 | 11篇 |
2015年 | 6篇 |
2014年 | 6篇 |
2013年 | 75篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 5篇 |
2009年 | 4篇 |
2008年 | 6篇 |
2007年 | 5篇 |
2006年 | 8篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 5篇 |
2001年 | 3篇 |
2000年 | 4篇 |
1998年 | 2篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1987年 | 2篇 |
1986年 | 7篇 |
1985年 | 8篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1981年 | 4篇 |
1980年 | 9篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1975年 | 10篇 |
1974年 | 6篇 |
1973年 | 8篇 |
1972年 | 5篇 |
1971年 | 4篇 |
1970年 | 5篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 3篇 |
排序方式: 共有338条查询结果,搜索用时 31 毫秒
331.
Max G. Manwaring 《Low Intensity Conflict & Law Enforcement》2002,11(2):190-209
If one could look through the familiar artificial political lines and colors of a current world map into the twenty-first century strategic reality, one could see a complex new security arena. A deeper look into that picture would provide magical snapshots that show several types of ambiguous and asymmetric conflicts, and state failure - and their causes and consequences. Then, with some additional adjustments of focus, one can discern a number of issues that cannot be shown in two-dimensional space. They are briefly discussed as follows. First and importantly, one can get a better idea of the complex threat situation and the ultimate threat - state failure. Second, an even deeper examination of the vision of contemporary wars reveals the shadows of things that have been and of those that will be on the road ahead. Third, a closer look at the familiar and troubling world map exposes some signposts on the road ahead that indicate the most significant changes in the landscape. Finally, our magical microscope reveals a short list of the basic challenges and tasks that can help discerning civilian and military leaders negotiate the road through the new global security environment. 相似文献
332.
Joseph O. Chapa 《Journal of Military Ethics》2016,15(3):170-186
In 2014, Colonel M. Shane Riza published an article in this journal arguing that remotely piloted aircraft (RPA) and robotic weapons threaten the US Air Force’s warrior ethos. Riza has clearly articulated the sentiments of one side of a vibrant debate within our service. This paper presents an alternative view; a view held by some who have experienced these new forms and tools of war, and who have wrestled with their implications first-hand. In this paper, we address some methodological concerns with Riza’s approach and then engage some misunderstandings about RPA’s relationship to military history and to risk. The second part of this paper takes a close look at some of the early Just War thinkers to determine what implications the tradition may have on the warrior ethos. We propose, as an alternative to Riza’s position, a return to an ethos grounded in humility, charity, and a conception of war as a last resort; in short, a return to the Just Warrior Ethos. 相似文献
333.
In hinterland container transportation the use of barges is getting more and more important. We propose a real‐life operational planning problem model from an inland terminal operating company, in which the number of containers shipped per barge is maximized and the number of terminals visited per barge is minimized. This problem is solved with an integer linear program (ILP), yielding strong cost reductions, about 20%, compared to the method used currently in practice. Besides, we develop a heuristic that solves the ILP in two stages. First, it decides for each barge which terminals to visit and second it assigns containers to the barges. This heuristic produces almost always optimal solutions and otherwise near‐optimal solutions. Moreover, the heuristic runs much faster than the ILP, especially for large‐sized instances. 相似文献
334.
LTC Joseph Guido 《Small Wars & Insurgencies》2019,30(1):176-199
ABSTRACTIncreasing attention paid to US casualties in far-flung places such as Tongo Tongo, Niger, and headlines claiming ‘secret wars’ have fueled discussion about American military’s involvement in Africa. Though the continent has been a part of the American way of war since the beginnings of the US – consider the early combat actions of US Marines in Tripoli –, current African conflicts are challenging our understanding of war and approaches to winning it. This article examines the ways America seeks to achieve its ends in Africa with a particular focus upon the last 10 years of US counter-terrorism and stability operations in Niger and the Sahel Region. The author proposes unifying American, Allied, and partner efforts through a strategy of Active Containment. 相似文献
335.
This article analyzes two general warranty policies involving an initial free replacement period, followed by a pro rata period. We examine the short-run total costs and longrun average costs under these policies. Formulas for both consumer costs and manufacturer profits under warranty are derived. We also study the expected number of purchases over the product life cycle under both policies. Bounds for the expected total costs and expected number of purchases are obtained for the case where the failure distribution of the item is new better than used. 相似文献
336.
Max G. Manwaring 《Low Intensity Conflict & Law Enforcement》2002,11(1):55-76
Building regional security cooperation in the Western Hemisphere is not a strictly short-term, unilateral or bilateral defense effort. Regional security will only result from a long-term, cooperative, multilateral civil-military effort. A viable framework for success includes the need to advance hemispheric understanding of the security concerns of each country and those that the region as a whole faces (for example, the internal and external threat(s) to security). Finally, these issues and associated recommendations demand a carefully staffed and phased regional security plan of action, with measurable short- and long-term objectives to validate its planning and implementation. The basic directions for a regional security plan, as identified at the Miami conference, are as follow. 相似文献
337.
338.
Joseph Soeters 《Defence Studies》2019,19(1):37-48
Military operations increasingly require cooperation between agencies within the same nation, but also collaboration with security and military organizations internationally. Throughout history multinational military cooperation has often been an appropriate way to conduct major operations; national manpower and material resources are generally insufficient to address the demands of missions worldwide. The desire to optimize the use of scarce research and development and investment capabilities, the need for international legitimacy and political support, and the fact that today’s risks transcend national borders, have rendered multinational cooperation in the security domain unavoidable. With joint operations comes the requirement for multi-partner- and multinational information sharing. However, information sharing has both advantages and costs, and is subject to both enabling factors as well as barriers. This paper reflects on theories, both classical and current, as well as empirical case studies, to examine the pros and cons of multinational information sharing, and the factors that conduce or interfere with the transmission and the receipt of intelligence. The importance of a holistic approach and of learning lessons learned are two key lessons gleaned from the analysis, along with an emphasis on developing both the organizational and the interpersonal enablers of information sharing. 相似文献