首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   103篇
  免费   4篇
  2019年   4篇
  2018年   4篇
  2017年   2篇
  2016年   7篇
  2015年   5篇
  2014年   2篇
  2013年   30篇
  2012年   1篇
  2011年   2篇
  2009年   1篇
  2008年   1篇
  2007年   5篇
  2006年   2篇
  2005年   5篇
  2004年   1篇
  2002年   3篇
  2001年   1篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1990年   1篇
  1986年   3篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1979年   3篇
  1978年   3篇
  1977年   1篇
  1974年   4篇
  1973年   1篇
  1972年   3篇
  1967年   1篇
  1966年   1篇
排序方式: 共有107条查询结果,搜索用时 296 毫秒
1.
Book reviews     
War, Culture and the Media: Representations of the Military in 20th Century Britain. Edited by Ian Stewart and Susan L. Carruthers, Trowbridge: Flicks Books, (1996), ISBN 0-948911-86-7 (pbk), £14.95.

The Future of Europe. By Peter Coffey, Aldershot: Edward Elgar, (1995), ISBN 1-85278-586-1 (hardback), £39.95, ISBN 1-85278-587-X (pbk), £12.95.

Global Dangers: Changing Dimensions of International Security. Edited by Sean M. Lynn-Jones, Steven E. Miller, London: the MIT Press, (1996), ISBN O-262-62097-9 (pbk), £13.50;.

New Studies in Post-Cold War Security. Edited by K.R. Dark, Aldershot: Dartmouth Publishing Company, (1996), ISBN 1-85521-728-7 (hardback), £42.50.

Enlarging NATO - The Russian Factor. By Richard L. Kugler with Marianna V. Kozintseva, Santa Monica, CA: National Defense Research Institute and Rand Corporation, (1996), ISBN 0-8330-2357-8, $20.00.  相似文献   
2.
The bounded interval generalized assignment model is a “many-for-one” assignment model. Each task must be assigned to exactly one agent; however, each agent can be assigned multiple tasks as long as the agent resource consumed by performing the assigned tasks falls within a specified interval. The bounded interval generalized assignment model is formulated, and an algorithm for its solution is developed. Algorithms for the bounded interval versions of the semiassignment model and sources-to-uses transportation model are also discussed.  相似文献   
3.
Consider a birth and death process starting in state 0. Keilson has shown by analytical arguments that the time of first passage into state n has an increasing failure rate (IFR) distribution. We present a probabilistic proof for this. In addition, our proof shows that for a nonnegative diffusion process, the first passage time from state 0 to any state x is IFR.  相似文献   
4.
5.
This paper reconsiders the classical model for selling an asset in which offers come in daily and a decision must then be made as to whether or not to sell. For each day the item remains unsold a continuation (or maintenance cost) c is incurred. The successive offers are assumed to be independent and identically distributed random variables having an unknown distribution F. The model is considered both in the case where once an offer is rejected it may not be recalled at a later time and in the case where such recall of previous offers is allowed.  相似文献   
6.
7.
8.
There are n customers that need to be served. Customer i will only wait in queue for an exponentially distributed time with rate λi before departing the system. The service time of customer i has distribution Fi, and on completion of service of customer i a positive reward ri is earned. There is a single server and the problem is to choose, after each service completion, which currently in queue customer to serve next so as to maximize the expected total return. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 659–663, 2015  相似文献   
9.
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors.  相似文献   
10.
Abstract

‘[Sovereignty] is possible only within the framework of multinational communities, of common institutions designed to provide common responses to common challenges. Security is no longer attainable in the traditional way. Neither the walled city nor the nation-state can provide protection against attack or threats of physical destruction… Increasingly the politics of nations revolve around the careful management of interdependence.’  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号