全文获取类型
收费全文 | 87篇 |
免费 | 2篇 |
出版年
2019年 | 4篇 |
2018年 | 4篇 |
2017年 | 2篇 |
2016年 | 6篇 |
2015年 | 3篇 |
2014年 | 1篇 |
2013年 | 27篇 |
2012年 | 1篇 |
2011年 | 2篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2007年 | 5篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2002年 | 3篇 |
2001年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1990年 | 1篇 |
1986年 | 2篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1966年 | 1篇 |
排序方式: 共有89条查询结果,搜索用时 15 毫秒
61.
62.
Alan Chivers Andrew Lambert James J. Wirtz Paul Watts 《Defense & Security Analysis》1990,6(4):431-437
Encyclopaedia of Modern Air Force Squadrons. By Chris Ashworth. Patrick Stephens, London (1989), ISBN 1-8526-013-6, £19.95
The Future of Sea Power. By Eric Grove. Routledge, London (1990), ISBN 0-415-00482-9, £35.00
Soviet Strategic Interests in the North. By Kirsten Amundsen. Pinter, London (1990), ISBN 0-86187-018-2, £30.00
Soviet Seapower in Northern Waters. Edited by John Skogan and Arne Brundtland. Pinter, London (1990), ISBN 0-86187-038-7, £35.00
Glasnost, Perestroika, and U.S. Defense Spending. By William W. Kaufmann, Brookings Institution, Washington, DC (1990), ISBN 0-8157-4881-7, $8.95
The Educating of Armies. Edited by Michael D. Stephens. Macmillan, London (1989), ISBN 0-333-43447-1, £35.00 相似文献
The Future of Sea Power. By Eric Grove. Routledge, London (1990), ISBN 0-415-00482-9, £35.00
Soviet Strategic Interests in the North. By Kirsten Amundsen. Pinter, London (1990), ISBN 0-86187-018-2, £30.00
Soviet Seapower in Northern Waters. Edited by John Skogan and Arne Brundtland. Pinter, London (1990), ISBN 0-86187-038-7, £35.00
Glasnost, Perestroika, and U.S. Defense Spending. By William W. Kaufmann, Brookings Institution, Washington, DC (1990), ISBN 0-8157-4881-7, $8.95
The Educating of Armies. Edited by Michael D. Stephens. Macmillan, London (1989), ISBN 0-333-43447-1, £35.00 相似文献
63.
A procurement problem, as formulated by Murty [10], is that of determining how many pieces of equipment units of each of m types are to be purchased and how this equipment is to be distributed among n stations so as to maximize profit, subject to a budget constraint. We have considered a generalization of Murty's procurement problem and developed an approach using duality to exploit the special structure of this problem. By using our dual approach on Murty's original problem, we have been able to solve large problems (1840 integer variables) with very modest computational effort. The main feature of our approach is the idea of using the current evaluation of the dual problem to produce a good feasible solution to the primal problem. In turn, the availability of good feasible solutions to the primal makes it possible to use a very simple subgradient algorithm to solve the dual effectively. 相似文献
64.
A computationally simple method for obtaining confidence bounds for highly reliable coherent systems, based on component tests which experience few or no failures, is given. Binomial and Type I censored exponential failure data are considered. Here unknown component unreliabilities are ordered by weighting factors, which are firstly presumed known then sensitivity of the confidence bounds to these assumed weights is examined and shown to be low. 相似文献
65.
Andrew J. Gawthorpe 《Small Wars & Insurgencies》2017,28(4-5):839-852
AbstractAlthough the concept of legitimacy is central to Western counterinsurgency theory, most discourse in this area black-boxes the concept. It hence remains under-specified in many discussions of counterinsurgency. Fortunately, recent research on rebel governance and legitimacy contributes to our understanding of the problems faced by counterinsurgents who want to boost state legitimacy while undermining that of the rebels. Taken together, this research illustrates that a rational choice approach to legitimacy is simplistic; that micro-level factors ultimately drive legitimacy dynamics; and that both cooption of existing legitimate local elites and their replacement from the top–down is unlikely to succeed. Western counterinsurgency doctrine has failed to grasp the difficulties this poses for it. 相似文献
66.
67.
This paper describes the Value Added Analysis methodology which is used as part of the U.S. Army's Planning, Programming, Budgeting, and Execution System to assist the Army leadership in evaluating and prioritizing competing weapon system alternatives during the process of building the Army budget. The Value Added Analysis concept uses a family of models to estimate an alternative system's contribution to the Army's effectiveness using a multiattribute value hierarchy. A mathematical optimization model is then used to simultaneously determine an alternative's cost‐benefit and to identify an optimal mix of weapon systems for inclusion in the Army budget. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 233–253, 1999 相似文献
68.
69.
70.
A military cannot hope to improve in wartime if it cannot learn. Ideally, in wartime, formal learning ceases and the application of knowledge begins. But this is optimistic. In 1942, USAAF Eighth Air Force assumed it had the means necessary for victory. In reality, its technique and technology were only potentially – rather than actually – effective. What remained was to create the practice of daylight bombing – to learn. This article (1) recovers a wartime learning process that created new knowledge, (2) tests existing tacit hypotheses in military adaptation research, and (3) offers additional theoretical foundation to explain how knowledge is created in wartime 相似文献