首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  免费   0篇
  2021年   1篇
  2019年   2篇
  2018年   4篇
  2017年   1篇
  2016年   2篇
  2014年   1篇
  2013年   8篇
  2000年   1篇
  1982年   1篇
排序方式: 共有21条查询结果,搜索用时 15 毫秒
1.
This article surveys the body of available evidence regarding the spill-over effects of defence R&D. It reviews the routes through which defence R&D spills over to the economy with positive externalities – in terms of new products, technologies or processes; the barriers that impede or block such a process; potential negative repercussions, and the measure of such effects. The main conclusion is that the uncertainty of these effects, and the inaccurate appraisal of their value, hardly supports informed decisions concerning defence R&D policies.  相似文献   
2.

This paper analyses the convergence between countries in relation to the catch-up hypothesis concerning the level of total productivity. The catch-up hypothesis claims that poor countries tend to grow faster than rich countries through the international diffusion of knowledge and technology. We test this hypothesis for the Balkan countries and investigate the effect of military expenditure in the region on productivity growth. The aim is to investigate empirically whether productivity growth has been greater in countries with lower military expenditure, in line with theory. The results obtained show that, overall, improvements in technological change co-exist with deteriorating technical efficiency change and that there is a negative correlation between military expenditure and either total productivity growth and technological change, and a positive, but statistically insignificant, relationship with technical efficiency change. We conclude that economic growth is the key to regional development and that too great a diversion of resources to military commitments can lead to overstretch.  相似文献   
3.
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military.  相似文献   
4.
This article reviews innovation processes in defence. It analyses the way and the context under which these processes are carried out. The article covers the features of defence goods with impact on innovation, the development of a new good, the institutional arrangements that support these processes and the effect of innovation on industrial market. The analysis helps to identify the causes of facts observed in practice, such as poor performance in terms of product quality, cost or delivery time, as well as to assess potential remedies. Some policy implications, which can be derived from this analysis, are finally outlined.  相似文献   
5.
6.
In this paper, we present an O(nm log(U/n)) time maximum flow algorithm. If U = O(n) then this algorithm runs in O(nm) time for all values of m and n. This gives the best available running time to solve maximum flow problems satisfying U = O(n). Furthermore, for unit capacity networks the algorithm runs in O(n2/3m) time. It is a two‐phase capacity scaling algorithm that is easy to implement and does not use complex data structures. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 511–520, 2000  相似文献   
7.
This paper is a case study. We show how the powerful methods of time series analysis can be used to investigate the interrelationships between Alert Availability, a logistics performance variable, and Flying Hours, an operational requirement, in the presence of a major change in operating procedures and using contaminated data. The system considered is the fleet of C-141 aircraft of the U.S. Air Force. The major change in operating procedures was brought about by what is known as Reliability Centered Maintenance, and the contaminated data were due to anomalies in reporting procedures. The technique used is a combination of transfer function modeling and intervention analysis.  相似文献   
8.
9.

In this paper we evaluate what terrorism policies have worked best in handling the Spanish ETA terrorism using time series data from 1968 to 2000. We consider the political, deterrence and economic effects, and conclude that their influence on terrorism incidents is mixed. A parsimonious model shows that the behaviour of different terrorism incidents is distinct and the lagged effect is a primary concern. A policy to manage this case is devised.  相似文献   
10.
This paper analyzes the determinants of the probability of US citizens being victims of terrorist attacks in European countries, taking into account uncontrolled heterogeneity of the data. The analysis employs ITERATE data from February 1968 to December 2002 to ascertain significant characteristics that influence the probability (e.g. location, type of casualties, type of attack, and type of terrorists). To deal with the unobserved heterogeneity a random‐parameter logit model (mixed logit) is used. Some policy implications are presented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号