首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   98篇
  免费   5篇
  2021年   1篇
  2019年   3篇
  2017年   3篇
  2016年   7篇
  2015年   2篇
  2013年   55篇
  2012年   1篇
  2011年   2篇
  2009年   1篇
  2008年   3篇
  2007年   1篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1997年   2篇
  1993年   1篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
排序方式: 共有103条查询结果,搜索用时 31 毫秒
1.
Book reviews     
Exporting Democracy: Fulfilling America's Destiny. By Joshua Muravchik, American Enterprise Institute (1991) ISSN 0–8447–3734–8. $12.95.

Generals in the Palacio. By Roderick Ai Camp. Oxford University Press, (1992), ISBN 0–19–507300–2, £45.

L'Armement en France. Genèse, Ampleur et Coût d'une Industrie By François Chesnais and Claude Serfati, Editions Nathan, Collection Economie/Sciences Sociales, Paris (1992), ISBN 2–09–190086–9.

The Têt Offensive. Intelligence Failure in War. By James Wirtz, Cornell University Press, New York (1991), ISBN 0–8014–2486–0. $38.50.

Restructuring of arms producton in Western Europe. Edited by Michael Brzoska and Peter Lock. Oxford University Press, Oxford (1992), ISBN 0–1982–9147–7. £25.00.

What is Proper Soldiering? A study of new perspectives for the future uses of the Armed Forces of the 1990s. By Michael Harbottle. The Centre for International Peacebuilding, Chipping Norton (1992), £3.50.

The Strategic Defence Initiative By Edward Reiss, Cambridge University Press, Cambridge (1992), ISBN 0–521–41097–5. £30.00.  相似文献   

2.
Preference for food in the function of the time since last consumption and total preference in the function of eating frequency are equivalent mathematical representations of attitudes governing food consumption. The observed and postulated properties of these functions imply a formal correspondence between preference maximizing and variety seeking behavior.  相似文献   
3.
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020  相似文献   
4.
In this paper I argue that a remotely piloted aircraft (RPA) pilot’s act of killing remotely, when it is done in the defense of another person, can be viewed as an act of sacrifice. This argument concludes from two premises. First, the RPA pilot faces psychological risk to self by carrying out such an action; second, the RPA pilot is motivated to some significant degree by something other than self-interest. Moreover, I challenge both the view that RPA represent merely an incremental development in technology yielding an incremental expansion of the distance between the war-fighter and the target and the view that RPA is revolutionary in some fundamental sense. I instead argue that, based upon the natural geometric boundary imposed by the earth’s shape, RPA have maximized the physical distance between the war-fighter and the target and, over time, this fact will change, not only the psychological effects on the RPA pilot, but also the way we view killing and distance in general. When taken together, these two broad claims, that other-defense can justify killing in war and that there is a psychological cost paid by remote killers, yield a conception of remote killing as an act of sacrifice that will inform the broader conversation about ethics, risk, killing, and RPA.  相似文献   
5.
6.
Abstract

‘[Sovereignty] is possible only within the framework of multinational communities, of common institutions designed to provide common responses to common challenges. Security is no longer attainable in the traditional way. Neither the walled city nor the nation-state can provide protection against attack or threats of physical destruction… Increasingly the politics of nations revolve around the careful management of interdependence.’  相似文献   
7.
We consider the problem of scheduling orders on identical machines in parallel. Each order consists of one or more individual jobs. A job that belongs to an order can be processed by any one of the machines. Multiple machines can process the jobs of an order concurrently. No setup is required if a machine switches over from one job to another. Each order is released at time zero and has a positive weight. Preemptions are not allowed. The completion time of an order is the time at which all jobs of that order have been completed. The objective is to minimize the total weighted completion time of the orders. The problem is NP‐hard for any fixed number (≥2) of machines. Because of this, we focus our attention on two classes of heuristics, which we refer to as sequential two‐phase heuristics and dynamic two‐phase heuristics. We perform a worst case analysis as well as an empirical analysis of nine heuristics. Our analyses enable us to rank these heuristics according to their effectiveness, taking solution quality as well as running time into account. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
8.
Consider a project during the life cycle of which there are cash payouts and in‐flows. To better meet his financial commitments, the project owner would like to meet all deadlines without running out of cash. We show that the cash availability objective is similar to the total weighted flowtime used to measure work‐in‐progress performance in the scheduling and inventory control literatures. In this article we provide several specialized solution methods for the problem of minimizing total weighted flowtime in an arbitrary acyclic project network, subject to activity release times and due dates, where the activity weights may be positive or negative and represent cash in‐ and out‐flows. We describe the structure of an optimal solution and provide several efficient algorithms and their complexity based on mincost and maxflow formulations. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
9.
ABSTRACT

Nuclear disarmament is often seen as eventually requiring access to nuclear warheads or to the warhead-dismantlement process to verify that a state has not hidden weapons or weapon-materials despite promising to disarm. This article suggests this view is misplaced, and that what is needed is a verification mechanism able to provide reliable assurances of the absence of fissile materials available for use in weapons after a state has disarmed. Such a mechanism will need an initial declaration of the amount of fissile materials held by a state for all purposes, military and civilian. In a state with a nuclear arsenal awaiting elimination, this declaration would have to include materials that may not be available for verification because they are in nuclear weapons or are in other classified or proliferation-sensitive forms. This article describes a verification arrangement that does not require access to materials in weapons and in sensitive forms while still allowing checks on the overall accuracy of the declaration. Verification of the completeness and correctness of the declaration is deferred to the time when the weapons-relevant material enters the disposition process, at which point it no longer has any sensitive attributes. By removing the focus on monitoring warheads and dismantlement, this new approach could provide a more manageable path to nuclear disarmament.  相似文献   
10.
This paper assesses the emergence of the responsibility to protect (R2P) as an international relations norm. Following a brief discussion of the genesis of this norm, it assesses the key aspects of R2P. It then examines the Constitutive Act of the African Union (2000) to analyse the extent to which R2P is enshrined and implicated in this document. The paper also discusses the extent to which the AU has sought to implement R2P through its commitment to promote peace around the continent where there is a crisis. It concludes with a discussion of whether the AU is in fact committed to R2P.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号