全文获取类型
收费全文 | 295篇 |
免费 | 0篇 |
专业分类
295篇 |
出版年
2021年 | 4篇 |
2019年 | 3篇 |
2017年 | 4篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 69篇 |
2011年 | 2篇 |
2010年 | 2篇 |
2009年 | 2篇 |
2008年 | 3篇 |
2007年 | 3篇 |
2006年 | 3篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 4篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 9篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1986年 | 8篇 |
1985年 | 5篇 |
1983年 | 4篇 |
1982年 | 9篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1975年 | 6篇 |
1974年 | 6篇 |
1973年 | 8篇 |
1972年 | 7篇 |
1971年 | 8篇 |
1970年 | 5篇 |
1969年 | 5篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 2篇 |
1948年 | 3篇 |
排序方式: 共有295条查询结果,搜索用时 0 毫秒
221.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection. 相似文献
222.
In recent years many large government and commercial organizations have developed large-scale management information systems. During the early phases of any system development, questions are likely to be raised concerning the criteria of completeness and accuracy of the data. How to respond to these questions is difficult, and represents the general subject of this paper. In particular, this paper describes the application of statistical techniques, namely, various kinds of multivariate data analysis, to the problem of assessing the quality of a large-scale data collection system in the U. S. Navy. Results of using these techniques are described and indicate their usefulness as auditing procedures. While the discussion is placed in a particular context, the procedures should be of value for other large-scale information systems. 相似文献
223.
Alan J. Rolfe 《海军后勤学研究》1970,17(2):151-158
This paper considers a group of S identical aircraft, each of which is partitioned into K parts which fail exponentially. The only way in which a failed aircraft can be repaired is by cannibalizing its out-of-commission parts from other failed aircraft. The evolution of the number of good aircraft over time is governed by the transient behavior of an absorbing Markov chain. We can therefore study this behavior by matrix multiplication although the computational problem grows large for K ≥ 3. Some numerical results and some approximations are also provided. 相似文献
224.
Problems having the mathematical structure of a quadratic assignment problem are found in a diversity of contexts: by the economist in assigning a number of plants or indivisible operations to a number of different geographical locations; by the architect or indusatrial engineer in laying out activities, offices, or departments in a building; by the human engineer in arranging the indicators and controls in an operators control room; by the electronics engineer in laying out components on a backboard; by the computer systems engineer in arranging information in drum and disc storage; by the production scheduler in sequencing work through a production facility; and so on. In this paper we discuss several types of algorithms for solving such problems, presenting a unifying framework for some of the existing algorithms, and dcscribing some new algorithms. All of the algorithms discussed proceed first to a feasible solution and then to better and better feasible solutions, until ultimately one is discovered which is shown to be optimal. 相似文献
225.
226.
Some properties of the geometric process are studied along with those of a related process which we propose to call the α‐series process. It is shown that the expected number of counts at an arbitrary time does not exist for the decreasing geometric process. The decreasing version of the α‐series process does have a finite expected number of counts, under certain conditions. This process also has the same advantages of tractability as the geometric process; it exhibits some properties which may make it a useful complement to the increasing geometric process. In addition, it may be fit to observed data as easily as the geometric process. Applications in reliability and stochastic scheduling are considered in order to demonstrate the versatility of the alternative model. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
227.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here. 相似文献
228.
Charles W. Mahoney 《Small Wars & Insurgencies》2013,24(5-6):916-940
ABSTRACTIn May 2018, the Basque insurgent group Euskadi Ta Askatasuna (ETA) officially disbanded after a 60-year struggle. This inquiry assesses ETA’s violent campaigns using recent conceptual and theoretical advancements from the field of terrorism studies. Three conclusions concerning the group’s strategies of terrorism are advanced. First, ETA regularly targeted civilians to achieve goals other than coercing the Government of Spain; these objectives included outbidding rival separatist groups and spoiling negotiation processes. Second, ETA’s most rapid period of organizational growth occurred as the result of an aggressive terrorist campaign, demonstrating that civilian targeting can serve as a stimulus to rebel group recruitment. Finally, while terrorism did not advance ETA’s primary political objective of creating an independent Basque state, it did enable the group to assume a leading position within the radical Basque separatist movement, helping extend ETA’s lifespan and making the group an embedded actor within the contentious political processes surrounding the question of Basque self-determination. Collectively, these conclusions support recent theoretical findings arguing that non-state terrorism often enables insurgent groups to prolong their lifespans while paradoxically making it more difficult for them to advance their long-term political objectives. 相似文献
229.
W. Alejandro Sanchez 《Small Wars & Insurgencies》2013,24(1):113-133
The Islamic Movement of Uzbekistan (IMU) is a Central Asian terrorist organization that has carried out series of attacks in countries like Uzbekistan, Kyrgyzstan and Tajikistan for years. With the ultimate goal of creating a Central Asian Caliphate, the IMU, even in its current weak state, is a regional threat. A military solution to this problem appears to be the likely answer. Regional powers like the Russian Federation and China should be militarily involved in Uzbekistan, along with Uzbek and neighboring forces in order to defeat the IMU militarily. This will promote greater integration among these countries and eliminate a violent organization which could become a destabilizing factor if not dealt with. 相似文献
230.
We present a family of tests to detect the presence of a transient mean in a simulation process. These tests compare variance estimators from different parts of a simulation run, and are based on the methods of batch means and standardized time series. Our tests can be viewed as natural generalizations of some previously published work. We also include a power analysis of the new tests, as well as some illustrative examples. © 1994 John Wiley & Sons, Inc. 相似文献