首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   623篇
  免费   12篇
  2021年   5篇
  2019年   14篇
  2018年   17篇
  2017年   16篇
  2016年   17篇
  2015年   11篇
  2013年   160篇
  2011年   5篇
  2010年   8篇
  2009年   5篇
  2008年   4篇
  2007年   6篇
  2006年   7篇
  2005年   15篇
  2004年   8篇
  2003年   9篇
  2002年   7篇
  2001年   4篇
  2000年   11篇
  1999年   9篇
  1998年   6篇
  1997年   13篇
  1996年   14篇
  1995年   6篇
  1994年   13篇
  1993年   11篇
  1991年   5篇
  1990年   7篇
  1989年   6篇
  1987年   6篇
  1986年   12篇
  1985年   12篇
  1984年   11篇
  1983年   8篇
  1982年   8篇
  1981年   9篇
  1980年   10篇
  1979年   9篇
  1978年   11篇
  1977年   9篇
  1976年   11篇
  1975年   8篇
  1974年   14篇
  1973年   8篇
  1972年   11篇
  1971年   15篇
  1970年   5篇
  1969年   8篇
  1968年   7篇
  1967年   4篇
排序方式: 共有635条查询结果,搜索用时 500 毫秒
71.
We examine two key stochastic processes of interest for warranty modeling: (1) remaining total warranty coverage time exposure and (2) warranty load (total items under warranty at time t). Integral equations suitable for numerical computation are developed to yield probability law for these warranty measures. These two warranty measures permit warranty managers to better understand time‐dependent warranty behavior, and thus better manage warranty cash reserves. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
72.
73.
The (standard) randomization method is an attractive alternative for the transient analysis of continuous time Markov models. The main advantages of the method are numerical stability, well‐controlled computation error, and ability to specify the computation error in advance. However, the fact that the method can be computationally very expensive limits its applicability. In this paper, we develop a new method called split regenerative randomization, which, having the same good properties as standard randomization, can be significantly more efficient. The method covers reliability‐like models with a particular but quite general structure and requires the selection of a subset of states and a regenerative state satisfying some conditions. For a class of continuous time Markov models, model class C2, including typical failure/repair reliability‐like models with exponential failure and repair time distributions and deferred repair, natural selections are available for both the subset of states and the regenerative state and, for those natural selections, theoretical results are available assessing the efficiency of the method in terms of “visible” model characteristics. Those results can be used to anticipate when the method can be expected to be competitive. We illustrate the application of the method using a large class C2 model and show that for models in that class the method can indeed be significantly more efficient than previously available randomization‐based methods. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
74.
75.
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors.  相似文献   
76.
77.
ABSTRACT

Although the existing international-relations scholarship argues that technological assistance in the nuclear domain increases the probability of nuclear proliferation, the historical account indicates otherwise. Congressional legislation for nonproliferation, economic sanctions, and poor state capacity—specifically, inept managerial capabilities of the recipient state—explain merely part of the puzzle, but overlook the role of positive inducements offered to impede nuclear proliferation. Historical evidence shows that the United States often provided technological assistance with the deliberate intent to inhibit proliferation. In other words, Washington employed its technological leverage to attain nonproliferation goals. American technological preponderance since the end of World War II made such an approach feasible. This study examines key Cold War cases—Israel/Egypt, India, and West Germany—where the United States offered technological assistance with the deliberate intent to stall nuclear proliferation, thereby underscoring the role of assistance for inhibitive ends.  相似文献   
78.

After a decade of successful recruiting, the US military began experiencing recruiting difficulties in the 1990s. Cyclical factors as well as trend factors may have played a role. This paper uses monthly data by state over the period 1989-1997 to estimate models of enlistment and evaluate the various explanations for the recruiting slowdown. Estimates of the impact of economic variables - relative military pay and unemployment - and recruiting resource variables - recruiters and advertising - are similar to those in previous studies. Two trend factors, rising college attendance and declining adult veteran population (influencers), are found to be important factors explaining the decline in enlistment.  相似文献   
79.
Greece has regularly ranked as the country with the highest defence burden in NATO and the European Union. Over the past decades she has allocated an averatge 6% of GDP to defence yearly. This study using neural networks examines the external security determinants of Greek military expenditure in the context of the ongoing Greek‐Turkish conflict.  相似文献   
80.

The original Olson and Zeckhauser model of alliance burden‐sharing was based on the following four assumptions: (1) alliance defence is a pure public good; (2) allied nations make their security contribution decisions without consulting the other allies; (3) alliances produce only a single public good; and (4) alliance defence is produced with equal degrees of efficiency in all alliance nations. But while the first of these assumptions has received a great deal of attention in the alliance literature, the remaining ones have received comparatively less attention, particularly in terms of empirical analyses. This paper synthesizes a varied literature developed around these four assumptions, both substantively and theoretically, and shows that when these assumptions are brought closer to real world approximations, hypotheses regarding the potential for security cooperation with less free‐riding result. This article also provides a simple test of Western alliance burden‐sharing in the areas of military spending, development resources spending, and research and development spending that supports the hypothesis positing more equitable burden‐sharing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号