全文获取类型
收费全文 | 275篇 |
免费 | 5篇 |
出版年
2021年 | 4篇 |
2020年 | 2篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2016年 | 2篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 59篇 |
2010年 | 4篇 |
2009年 | 3篇 |
2008年 | 6篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 6篇 |
2003年 | 5篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 11篇 |
1979年 | 5篇 |
1978年 | 8篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 6篇 |
1974年 | 5篇 |
1973年 | 2篇 |
1972年 | 3篇 |
1971年 | 8篇 |
1970年 | 4篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 4篇 |
1966年 | 6篇 |
1949年 | 1篇 |
排序方式: 共有280条查询结果,搜索用时 312 毫秒
1.
Robert E. Looney Philip Gummett G. D. Sheffield Clark Hunter K. G. Robertson 《Defense & Security Analysis》1989,5(4):383-392
Third World Military Expenditure: Determinants and Implications. By Robert McKinlay. Frances Pinter, London (1989)
The UK Defence Industrial Base: Development and Future Policy Options. By Trevor Taylor and Keith Hayward. Brassey's, London, for Royal United Services Institute (1989), ISBN 0-08-036713-5, £22.50
Mutiny. By Lawrence James. Buchan & Enright, London (1987), ISBN 0-907675-70-0, £12.95; Scapegoat! Famous Courts Martial. By John Harris. Severn House, London (1988), ISBN 0-7278-2103-2, £12.95; In Glass Houses. By Robert Boyes. Military Provost Staff Corps Association, Colchester (1986), ISBN 0-9513467-0-9, £6.50 (paperback)
The Nuclear Weapons World: Who, How and Where. Edited by Patrick Burke. Frances Pinter, London (1988), ISBN 086187-705-5, £50.00
Merchants of Treason—America's Secrets for Sale. By Thomas B. Allen and Norman Polmar. Robert Hale, London (1988), ISBN 0-7090-3543-8, £14.95 ($21.95); Intelligence and Intelligence Policy in a Democratic Society. Edited by Stephen J. Cimbala. Transnational Publishers, Dobbs Ferry, NY (1987), ISBN 0-941320-44-8, $37.50; Catching Spies—Principles and Practices of Counterespionage. By H. H. A. Cooper and Lawrence J. Redlinger. Paladin Press, Boulder, CO (1988), ISBN 0-87364-466-2, $24.95
The BattleshipRoyal Sovereignand Her Sister Ships. By Peter C. Smith. William Kimber, Wellingborough (1988), ISBN 0-7183-0704-6, £12.95; Air Power at Sea, 1945 to Today. By John Winton. Sidgwick & Jackson, London (1987), £9.95 相似文献
The UK Defence Industrial Base: Development and Future Policy Options. By Trevor Taylor and Keith Hayward. Brassey's, London, for Royal United Services Institute (1989), ISBN 0-08-036713-5, £22.50
Mutiny. By Lawrence James. Buchan & Enright, London (1987), ISBN 0-907675-70-0, £12.95; Scapegoat! Famous Courts Martial. By John Harris. Severn House, London (1988), ISBN 0-7278-2103-2, £12.95; In Glass Houses. By Robert Boyes. Military Provost Staff Corps Association, Colchester (1986), ISBN 0-9513467-0-9, £6.50 (paperback)
The Nuclear Weapons World: Who, How and Where. Edited by Patrick Burke. Frances Pinter, London (1988), ISBN 086187-705-5, £50.00
Merchants of Treason—America's Secrets for Sale. By Thomas B. Allen and Norman Polmar. Robert Hale, London (1988), ISBN 0-7090-3543-8, £14.95 ($21.95); Intelligence and Intelligence Policy in a Democratic Society. Edited by Stephen J. Cimbala. Transnational Publishers, Dobbs Ferry, NY (1987), ISBN 0-941320-44-8, $37.50; Catching Spies—Principles and Practices of Counterespionage. By H. H. A. Cooper and Lawrence J. Redlinger. Paladin Press, Boulder, CO (1988), ISBN 0-87364-466-2, $24.95
The BattleshipRoyal Sovereignand Her Sister Ships. By Peter C. Smith. William Kimber, Wellingborough (1988), ISBN 0-7183-0704-6, £12.95; Air Power at Sea, 1945 to Today. By John Winton. Sidgwick & Jackson, London (1987), £9.95 相似文献
2.
Hew Strachan Geoffrey Till G. D. Sheffield Gwyn Harries-Jenkins 《Defense & Security Analysis》1989,5(1):87-93
British Military History: a Supplement to Robin Higham's Guide to the Sources.. Edited by Gerald Jordan. Garland, New York (1988), xii + 586 pp., $75.00
Red Duster at War. By John Slader. William Kimber, London (1988), 352 pp., £15.50
Armed Services and Society. By Martin Edmonds. Leicester University Press, Leicester (1988), 226 pp., £25.00 相似文献
Red Duster at War. By John Slader. William Kimber, London (1988), 352 pp., £15.50
Armed Services and Society. By Martin Edmonds. Leicester University Press, Leicester (1988), 226 pp., £25.00 相似文献
3.
The Quality Measurement Plan (QMP) and the Universal Sampling Plan (USP) are the data analysis and sampling plans for the AT&T Technologies quality audit. This article describes QMP/USP, an acceptance sampling plan based on QMP and USP principles. QMPIUSP is a complete acceptance sampling system. It combines the elements of classical rectification inspection plans with those of MIL-STD-IOSD. There is no switching between plans, no tables of numbers to look through, and no discontinue state. QMP/USP is a computerized, self-contained system that features:
- Acceptance decisions based on the QMP Bayes empirical Bayes analysis of current and past sampling result
- Sample size selection based on USP, i.e., lot size, AQL, a cost ratio, the QMP analysis, and a budget constraint
- Guaranteed AOQ
- A complete statistical analysis of the quality process.
4.
5.
6.
A common problem in life testing is to demonstrate that the mean time to failure, θ, exceeds some minimum acceptable value, say θ1, with a given confidence coefficient γ. When this is true, it is said that “θ1 has been demonstrated with a confidence γ”. In this paper a Sequential Bayes Procedure (SBP) for demonstrating (by means of. a probability statement) that θ exceeds θ1 is presented. The SBP differs from the classical procedure in the sense that a prior distribution is assumed on the parameter θ, calling for a Bayesian approach. The procedure is based on the sequence of statistics. 相似文献
7.
R. D. Wollmer 《海军后勤学研究》1970,17(2):207-216
This paper presents an algorithm for determining where to place intercepting units in order to maximize the probability of preventing an opposing force from proceeding from one particular node in an undirected network to another. The usual gaming assumptions are invoked; namely, the strategy for placing the units is known to the opponent and he will choose a path through the network which, based on this knowledge, maximizes his probability of successful traverse. As given quantities, the model requires a list of the arcs and nodes of the network, the number of intercepting units available to stop the opposing force, and the probabilities for stopping the opposition at the arcs and nodes as functions of the number of intercepting units placed there. From these quantities, the algorithm calculates the probabilities for placing the unit at the arcs and nodes when one intercepting unit is available, and the expected numbers of units to place at the arcs and nodes when multiple intercepting units are available. 相似文献
8.
9.
Consider an auction in which increasing bids are made in sequence on an object whose value θ is known to each bidder. Suppose n bids are received, and the distribution of each bid is conditionally uniform. More specifically, suppose the first bid X1 is uniformly distributed on [0, θ], and the ith bid is uniformly distributed on [Xi?1, θ] for i = 2, …?, n. A scenario in which this auction model is appropriate is described. We assume that the value θ is un known to the statistician and must be esimated from the sample X1, X2, …?, Xn. The best linear unbiased estimate of θ is derived. The invariance of the estimation problem under scale transformations in noted, and the best invariant estimation problem under scale transformations is noted, and the best invariant estimate of θ under loss L(θ, a) = [(a/θ) ? 1]2 is derived. It is shown that this best invariant estimate has uniformly smaller mean-squared error than the best linear unbiased estimate, and the ratio of the mean-squared errors is estimated from simulation experiments. A Bayesian formulation of the estimation problem is also considered, and a class of Bayes estimates is explicitly derived. 相似文献
10.
Bruce Golden 《海军后勤学研究》1978,25(4):711-713
Suppose we are given a network G=(V,E) with arc distances and a linear cost function for lengthening arcs. In this note, we consider a network-interdiction problem in which the shortest path from source node s to sink node t is to be increased to at least τ units via a least-cost investment strategy. This problem is shown to reduce to a simple minimum-cost-flow problem. Applications and generalizations are discussed, including the multiple-destination case. 相似文献