全文获取类型
收费全文 | 482篇 |
免费 | 0篇 |
专业分类
482篇 |
出版年
2021年 | 5篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 11篇 |
2016年 | 9篇 |
2015年 | 10篇 |
2013年 | 78篇 |
2011年 | 5篇 |
2010年 | 6篇 |
2009年 | 4篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 11篇 |
2004年 | 8篇 |
2003年 | 5篇 |
2001年 | 4篇 |
2000年 | 9篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 4篇 |
1994年 | 10篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 14篇 |
1990年 | 8篇 |
1989年 | 12篇 |
1988年 | 6篇 |
1987年 | 11篇 |
1986年 | 9篇 |
1985年 | 12篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1975年 | 6篇 |
1974年 | 11篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 13篇 |
1970年 | 3篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 3篇 |
排序方式: 共有482条查询结果,搜索用时 0 毫秒
471.
472.
Ross A. Kennedy 《战略研究杂志》2013,36(7):1058-1070
The books under review here, by Robert F. Hannigan, John A. Thompson, Trygve Throntveit, and Adam Tooze, offer an interpretation of Wilsonian internationalism and what happened to it in the 1920s. For Tooze and Hannigan, Wilsonianism was primarily a project to attain American predominance in the world. For Throntveit, Wilsonian internationalism constituted a pragmatic yet radical effort to end competitive power politics. Thompson disagrees with these arguments and asserts that the key to understanding US policy lay in how US leaders conceptualized American power. Thompson’s interpretation is especially compelling in explaining why the United States failed to engage itself more assertively in international affairs in the 1920s – a failure Tooze suggests undermined the viability of the postwar international system. 相似文献
473.
Nicholas A Lambert 《战略研究杂志》2013,36(2):272-297
The Fisher naval revolution of 1904–10 represented a deliberate attempt to achieve defense transformation to bolster Britain's pretensions to global naval supremacy. The vision called for smaller, more capable forces to do the work of larger, more expensive conventional formations. It consisted of three main elements. First, the replacement of the traditional station fleet system for protecting overseas interests by rapid deployment forces comprised of battlecruisers that could be ‘maneuvered’ by wireless to combat specific enemy threats. Second, at home, instead of a sea control strategy based upon a superior battle-fleet, a sea denial strategy based on flotilla defense commanded and controlled from London via wireless. The third element of the Fisher revolution depended upon ‘plunging’, or shaping and directing technological change through a special relationship with armaments firms. A sophisticated information-communications network was integral to the revolution. 相似文献
474.
A recent article, ‘Rage Against the Machines’, does a disservice to the debate over what explains counterinsurgency (COIN) success. While it establishes a negative correlation between the diffusion of military mechanization in the state system and COIN success, its theoretical argument does not hold up under close scrutiny and its micro-case comparison of two units in Iraq during 2003–2004 ignores obvious counter-examples and factors that influence COIN success, such as leadership. A deeper inquiry would have revealed that there is much more to COIN success than simply not having access to vehicles. 相似文献
475.
David A. Patten 《Small Wars & Insurgencies》2013,24(5):879-906
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo. 相似文献
476.
We consider the two‐machine open shop scheduling problem in which the jobs are brought to the system by a single transporter and moved between the processing machines by the same transporter. The purpose is to split the jobs into batches and to find the sequence of moves of the transporter so that the time by which the completed jobs are collected together on board the transporter is minimal. We present a ‐approximation algorithm. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
477.
This paper addresses a two‐machine open shop scheduling problem, in which the machines are not continuously available for processing. The processing of an operation affected by a non‐availability interval can be interrupted and resumed later. The objective is to minimize the makespan. We present two polynomial‐time approximation schemes, one of which handles the problem with one non‐availability interval on each machine and the other for the problem with several non‐availability intervals on one of the machines. Problems with a more general structure of the non‐availability intervals are not approximable in polynomial time within a constant factor, unless . © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
478.
Accelerated degradation testing (ADT) is usually conducted under deterministic stresses such as constant‐stress, step‐stress, and cyclic‐stress. Based on ADT data, an ADT model is developed to predict reliability under normal (field) operating conditions. In engineering applications, the “standard” approach for reliability prediction assumes that the normal operating conditions are deterministic or simply uses the mean values of the stresses while ignoring their variability. Such an approach may lead to significant prediction errors. In this paper, we extend an ADT model obtained from constant‐stress ADT experiments to predict field reliability by considering the stress variations. A case study is provided to demonstrate the proposed statistical inference procedure. The accuracy of the procedure is verified by simulation using various distributions of field stresses. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006. 相似文献
479.
Passenger prescreening is a critical component of aviation security systems. This paper introduces the Multilevel Allocation Problem (MAP), which models the screening of passengers and baggage in a multilevel aviation security system. A passenger is screened by one of several classes, each of which corresponds to a set of procedures using security screening devices, where passengers are differentiated by their perceived risk levels. Each class is defined in terms of its fixed cost (the overhead costs), its marginal cost (the additional cost to screen a passenger), and its security level. The objective of MAP is to assign each passenger to a class such that the total security is maximized subject to passenger assignments and budget constraints. This paper shows that MAP is NP‐hard and introduces a Greedy heuristic that obtains approximate solutions to MAP that use no more than two classes. Examples are constructed using data extracted from the Official Airline Guide. Analysis of the examples suggests that fewer security classes for passenger screening may be more effective and that using passenger risk information can lead to more effective security screening strategies. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
480.
This article studies a maintenance problem that is applicable for multidivision organizations on lessee-lessor relationships. It is assumed that the parties sign a contract for a fixed time period. Within the period, the lessor is allowed to use the equipment supplied by the lessee. The availability of the equipment that may suffer from breakdown depends on the preventive maintenance policy adopted by the lessor. The properties of this policy as well as other features of the problem are analyzed using a one-period model that takes into account the economic value of the contract as perceived by the lessor and the lessee. The optimal contracting arrangements are analyzed from the perspective of efficient risk sharing and incentive provisions. 相似文献