首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   81篇
  免费   3篇
  2021年   1篇
  2019年   1篇
  2017年   2篇
  2016年   2篇
  2015年   5篇
  2014年   1篇
  2013年   57篇
  2012年   2篇
  2007年   1篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1986年   1篇
  1985年   1篇
  1973年   1篇
排序方式: 共有84条查询结果,搜索用时 31 毫秒
1.
Book reviews     
Exporting Democracy: Fulfilling America's Destiny. By Joshua Muravchik, American Enterprise Institute (1991) ISSN 0–8447–3734–8. $12.95.

Generals in the Palacio. By Roderick Ai Camp. Oxford University Press, (1992), ISBN 0–19–507300–2, £45.

L'Armement en France. Genèse, Ampleur et Coût d'une Industrie By François Chesnais and Claude Serfati, Editions Nathan, Collection Economie/Sciences Sociales, Paris (1992), ISBN 2–09–190086–9.

The Têt Offensive. Intelligence Failure in War. By James Wirtz, Cornell University Press, New York (1991), ISBN 0–8014–2486–0. $38.50.

Restructuring of arms producton in Western Europe. Edited by Michael Brzoska and Peter Lock. Oxford University Press, Oxford (1992), ISBN 0–1982–9147–7. £25.00.

What is Proper Soldiering? A study of new perspectives for the future uses of the Armed Forces of the 1990s. By Michael Harbottle. The Centre for International Peacebuilding, Chipping Norton (1992), £3.50.

The Strategic Defence Initiative By Edward Reiss, Cambridge University Press, Cambridge (1992), ISBN 0–521–41097–5. £30.00.  相似文献   

2.
This article seeks to explain the basic dynamics of the development of the German military approach in Afghanistan between 2003 and 2010 by looking at the impact of the Bundeswehr’s established uses of historical experience. First, the German military approach in Afghanistan has slowly evolved from a peacebuilding and mediation mission towards a full-fledged combat deployment. Second, the Bundeswehr’s exclusive focus on the World War II experience has contributed to the emergence of the Balkans experience as a formative experience that shaped initial operational thinking in Afghanistan. Third, because a thorough debate on the historical foundation of counterinsurgency remained absent, the operational shift in 2009 was perceived as a return to ‘classical’ military tasks and thus led to an almost exclusive focus on training for combat.  相似文献   
3.
In this paper we study higher‐order Markov chain models for analyzing categorical data sequences. We propose an efficient estimation method for the model parameters. Data sequences such as DNA and sales demand are used to illustrate the predicting power of our proposed models. In particular, we apply the developed higher‐order Markov chain model to the server logs data. The objective here is to model the users' behavior in accessing information and to predict their behavior in the future. Our tests are based on a realistic web log and our model shows an improvement in prediction. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
4.
5.
Abstract

‘[Sovereignty] is possible only within the framework of multinational communities, of common institutions designed to provide common responses to common challenges. Security is no longer attainable in the traditional way. Neither the walled city nor the nation-state can provide protection against attack or threats of physical destruction… Increasingly the politics of nations revolve around the careful management of interdependence.’  相似文献   
6.
This paper analyzes, from a game-theoretic standpoint, the simultaneous choice of speeds by a transitor and by an SSK which patrols back and forth perpendicular to the transitor's course. Using idealized acoustic assumptions and a cookie-cutter detection model which ignores counterdetection, we are able to present the problem as a continuous game, and to determine an analytic solution. The results indicate that with these assumptions, there are conditions under which neither a “go fast” nor a “go slow” strategy is optimal. The game provides a good example of a continuous game with a nontrivial solution which can be solved effectively.  相似文献   
7.
The human visual system is still an important factor in military warfare; military personnel receive training on effective search strategies, and camouflage that can effectively conceal objects and personnel is a key component of a successful integrated survivability strategy. Previous methods of camouflage assessment have, amongst others, used psychophysics to generate distinctiveness metrics. However, the population from which the human observers are drawn is often not well defined, or necessarily appropriate. In this experiment we designed a new platform for testing multiple patterns based on a camouflaged object detection task, and investigate whether trained military observers perform better than civilians. We use a two-alternative forced choice paradigm, with participants searching images of woodland for a replica military helmet displaying Olive Green, Multi Terrain Pattern, US Marine Pattern or, as a conspicuous control, UN Peacekeeper Blue. Our data show that there is no difference in detection performance between the two observer groups but that there are clear differences in the effectiveness of the different helmet colour patterns in a temperate woodland environment. We conclude that when tasks involve very short stimulus presentation times, task-specific training has little effect on the success of target detection and thus this paradigm is particularly suitable for robust estimates of camouflage efficacy.  相似文献   
8.
This paper assesses the emergence of the responsibility to protect (R2P) as an international relations norm. Following a brief discussion of the genesis of this norm, it assesses the key aspects of R2P. It then examines the Constitutive Act of the African Union (2000) to analyse the extent to which R2P is enshrined and implicated in this document. The paper also discusses the extent to which the AU has sought to implement R2P through its commitment to promote peace around the continent where there is a crisis. It concludes with a discussion of whether the AU is in fact committed to R2P.  相似文献   
9.
With the security situation in Darfur remaining grim, the international community passed United Nations Security Resolution 1769 that authorised a more robust peacekeeping force. This article addresses the security concerns motivating the United Nations-African Union Mission in Darfur (UNAMID), highlights the mandate and implications of the force, and compares the potential command and control issues to the experiences of the Somalia intervention in the 1990s. It closes by analysing the prospects for success of the intervention and offering some limited recommendations on ways to mitigate the risks associated with the peacekeeping effort.  相似文献   
10.
The criticism of James, Solberg and Wolfson (JSW) (1999) by Oneal and Russett (OR) is not responsive to the methodologica] issues at stake. JSW argued that war is an endogenous feature of the world political and economic system. If its causes are to be measured, it must be as a structural equation in a simultaneous system. Wedded to the idea that “democracies never fight each other,” OR rely on a single equation to justify their view. JSW claim that such an equation may be an ad hoc reduced form with no causal implications unless the equation is explicitly identified as a structural equation. JSW expand the model to explain democracy and conflict as two endogenous variables. JSW do not claim to have discovered the true relationships between these variables by their minimal expansion of the structural relation. They do show that unless these (and other) variables are treated as part of a system, the results are unstable, contradictory, of minimal size and not a reliable guide to public policy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号