首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   67篇
  免费   0篇
  2020年   1篇
  2019年   4篇
  2018年   3篇
  2017年   2篇
  2016年   1篇
  2014年   1篇
  2013年   23篇
  2012年   2篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
  1989年   2篇
  1986年   1篇
  1985年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
排序方式: 共有67条查询结果,搜索用时 0 毫秒
51.
Concerns about climate change and energy security have prompted some countries to revive dormant nuclear fission power programs to meet growing energy demands and reduce carbon dioxide emissions. However, this so-called nuclear renaissance based on fission would have major drawbacks in the areas of safety, security, and nonproliferation. Nuclear fusion, however, is portrayed by its proponents as mitigating these drawbacks, and scientists continue to pursue fusion's promise with two large-scale projects: the International Thermonuclear Experimental Reactor (ITER), and the Laser Inertial Fusion Engine (LIFE) reactor. Although supporters often hail fusion as proliferation resistant, the technology could be used to create weapons-usable fissile material. This article explains how fissile material could be created in ITER or LIFE and analyzes other nonproliferation implications of fusion; the authors discuss the various challenges faced by ITER and LIFE.  相似文献   
52.
Book reviews     
Norman Cigar, Genocide in Bosnia: The Policy of “Ethnic Cleansing”. College Station, Texas: Texas A&M University Press, 1995. Pp.xiv + 247; app., map, notes, cartoon.

Maria Jose Moyano, Argentina's Lost Patrol: Armed Struggle, 1969–1979. New Haven: Connecticut Yale University Press, 1995. Pp.xiii + 226, biblio., abbreviations, 10 figures, 1 map, tables, index; $25/£16.95. ISBN 0–300–01622–6.

Donald E. Schulz and Deborah Sundloff Schulz, The United States, Honduras, and the Crisis in Central America, Westview Thematic Studies in Latin America, Boulder, Co: Westview, 1994. Pp.368, map, figure, select biblio., abbreviations, index. $52.50/£37.50; (cloth) $17.95/£11.95 (paper). ISBN 0–8133–1324–4 and 1323–6.

Joseph H. Alexander and Merrill L. Bartlett, Sea Soldiers in the Cold War: Amphibious Warfare 1945–1991. Annapolis, Maryland: Naval Institute Press, 1995. Pp.iii + 178, 1 map, 29 illus, biblio, index. $32.95. ISBN

Gary P. Cox, The Halt in the Mud: French Strategic Planning from Waterloo to Sedan. Westview Press, 1994. Pp.258, maps, notes, biblio, index. £33.50. ISBN 0–133–1536–0.  相似文献   
53.
54.
This article investigates power practices in the Cambodian insurgency after 1979 as being part of a social field. There are various types of power practice being exercised by commanders aiming at making soldiers disciplined inside the insurgency. The hypothesis explaining these variations being proposed here is that the type of power being exercised depends on the habitus of the respective commander. Power practices are shaped by the incorporated classificatory discourse of commanders on good soldierhood and leadership. Thereby, armed groups can be analyzed as a social field in which practices are always relational and part of symbolic struggles between different commanders.  相似文献   
55.
We consider a single-item inventory system in which the stock level can increase due to items being returned as well as decrease when demands occur. Returned items can be repaired and then used to satisfy future demand, or they can be disposed of. We identify those inventory levels where disposal is the best policy. It is shown that this problem is equivalent to a problem of controlling a single-server queue. When the return and demand processes are both Poisson, we find the optimal policy exactly. When the demand and return processes are more general, we use diffusion approximations to obtain an approximate model, which is then solved. The approximate model requires only mean and variance data. Besides the optimal policy, the output of the models includes such characteristics as the operating costs, the purchase rate for new items, the disposal rate for returned items and the average inventory level. Several numerical examples are given. An interesting by-product of our investigation is an approximation for the steady-state behavior of the bulk GI/G/1 queue with a queue limit.  相似文献   
56.
In due‐window assignment problems, jobs completed within a designated time interval are regarded as being on time, whereas early and tardy jobs are penalized. The objective is to determine the location and size of the due‐window, as well as the job schedule. We address a common due‐window assignment problem on parallel identical machines with unit processing time jobs. We show that the number of candidate values for the optimal due‐window starting time and for the optimal due‐window completion time are bounded by 2. We also prove that the starting time of the first job on each of the machines is either 0 or 1, thus introducing a fairly simple, constant‐time solution for the problem. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
57.
Given a positive integer R and a weight for each vertex in a graph, the maximum-weight connected graph problem (MCG) is to find a connected subgraph with R vertices that maximizes the sum of their weights. MCG has applications to communication network design and facility expansion. The constrained MCG (CMCG) is MCG with a constraint that one predetermined vertex must be included in the solution. In this paper, we introduce a class of decomposition algorithms for MCG. These algorithms decompose MCG into a number of small CMCGs by adding vertices one at a time and building a partial graph. They differ in the ordering of adding vertices. Proving that finding an ordering that gives the minimum number of CMCGs is NP-complete, we present three heuristic algorithms. Experimental results show that these heuristics are very effective in reducing computation and that different orderings can significantly affect the number of CMCGs to be solved. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 817–837, 1998  相似文献   
58.
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.  相似文献   
59.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号