首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   590篇
  免费   0篇
  590篇
  2021年   9篇
  2019年   10篇
  2018年   5篇
  2017年   7篇
  2016年   9篇
  2015年   6篇
  2014年   6篇
  2013年   111篇
  2009年   5篇
  2008年   4篇
  2007年   14篇
  2005年   6篇
  2004年   5篇
  2003年   10篇
  2002年   8篇
  2000年   5篇
  1999年   6篇
  1998年   7篇
  1997年   8篇
  1996年   12篇
  1995年   7篇
  1994年   11篇
  1993年   13篇
  1992年   8篇
  1991年   12篇
  1990年   11篇
  1989年   21篇
  1988年   20篇
  1987年   12篇
  1986年   19篇
  1985年   10篇
  1984年   5篇
  1983年   6篇
  1982年   17篇
  1981年   7篇
  1980年   11篇
  1979年   12篇
  1978年   10篇
  1977年   9篇
  1976年   6篇
  1975年   8篇
  1974年   13篇
  1973年   10篇
  1972年   7篇
  1971年   14篇
  1970年   8篇
  1969年   10篇
  1968年   6篇
  1967年   8篇
  1948年   4篇
排序方式: 共有590条查询结果,搜索用时 15 毫秒
571.
    
We identify the causal effect of a reduction in military personnel on a number of socioeconomic indicators within the peripheries of military bases. The base realignments and closures in Germany are used as an exogenous source of variation that allows us to identify the effect of a demand shock on household income, output, unemployment, and tax revenue within a specified buffer zone around each base. The analysis covers 298 communities for the period 2003–2007. Consistent with evidence found elsewhere, we find that these base adjustments have only a marginal impact on the local community in which the bases are located.  相似文献   
572.
    
Abstract

This paper seeks to critically appraise Africa's position within the United Nations Security Council from the inception of the UN in 1945 until the end of 2010, spanning the entire history of the world body. A few factors make such an appraisal a useful exercise. These include the ongoing debates about the reform of the Council in particular and the UN as a whole, and the growing interest that many African students and observers of and actors in international relations seem to have developed in recent years in the working of the world body. In this appraisal, emphasis will be placed on the origin and rationale behind the establishment of the Security Council as well as the use of the veto power by its permanent members, with a special reference to Africa.  相似文献   
573.
    
Understanding why the Iranian regime wants to possess nuclear weapons is essential to formulating the best policy to prevent (or perhaps to simply manage) the emergence of a nuclear-armed Iran. Three general theories—realism, liberalism, and constructivism—provide a framework for looking at Iran's nuclear motivations. However, contrary to many analyses, the regime's desire to possess nuclear arms stems not from neorealist defensive concerns, but rather from offensive goals driven by domestic politics. The use of extremist Islamism by the Iranian regime to justify its autocratic rule is the primary motivating factor. Accordingly, the outlook for diplomatically addressing the Iranian regime's nuclear aspirations appears dim.  相似文献   
574.
    
ABSTRACT

Since the end of the Cold War, arms control proponents tried to make the case for deep nuclear reductions and other forms of security cooperation as necessary for strategic stability. While different versions of strategic stability analysis did sometimes produce innovative proposals, constructive negotiations, and successful ratification campaigns in the past, this analytical framework has become more of a hindrance than a help. Treating arms control as a predominantly technical way to make deterrence more stable by changing force structure characteristics, military operations, relative numbers of weapons on either side, or total number of nuclear weapons gives short shrift to political factors, including the fundamental assumptions about world politics that inform different arms control logics, the quality of political relations among leading states, and the political processes that affect negotiation, ratification, and implementation. This article compares two logics for arms control as a means to enhance strategic stability, one developed by the Cambridge community in the 1960s and one used by the Reagan administration and its successors, with current perspectives on strategic stability in which flexibility and freedom of action are preferable to predictability and arms control. It also contrasts what the Barack Obama administration has tried to achieve through strategic stability dialogues with Russia and China with how they envision security cooperation. It then presents an approach developed during the Cold War by Hedley Bull for thinking about both the technical and the political dimensions of arms control, and suggests that the logic of Cooperative Security (which shares important features with Bull's approach) is a more appropriate and productive way to think about arms control in the twenty-first century than strategic stability analysis is.  相似文献   
575.
    
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
576.
    
Norman Cigar, Genocide in Bosnia: The Policy of “Ethnic Cleansing”. College Station, Texas: Texas A&M University Press, 1995. Pp.xiv + 247; app., map, notes, cartoon.

Maria Jose Moyano, Argentina's Lost Patrol: Armed Struggle, 1969–1979. New Haven: Connecticut Yale University Press, 1995. Pp.xiii + 226, biblio., abbreviations, 10 figures, 1 map, tables, index; $25/£16.95. ISBN 0–300–01622–6.

Donald E. Schulz and Deborah Sundloff Schulz, The United States, Honduras, and the Crisis in Central America, Westview Thematic Studies in Latin America, Boulder, Co: Westview, 1994. Pp.368, map, figure, select biblio., abbreviations, index. $52.50/£37.50; (cloth) $17.95/£11.95 (paper). ISBN 0–8133–1324–4 and 1323–6.

Joseph H. Alexander and Merrill L. Bartlett, Sea Soldiers in the Cold War: Amphibious Warfare 1945–1991. Annapolis, Maryland: Naval Institute Press, 1995. Pp.iii + 178, 1 map, 29 illus, biblio, index. $32.95. ISBN

Gary P. Cox, The Halt in the Mud: French Strategic Planning from Waterloo to Sedan. Westview Press, 1994. Pp.258, maps, notes, biblio, index. £33.50. ISBN 0–133–1536–0.  相似文献   
577.
    
War and drugs share many characteristics – both are destructive of human life, highly profitable to some, and efforts to regulate them have failed. In fact, at various times throughout history, war and drugs have been intertwined, prolonging human suffering, bedeviling political leaders and enriching a select few. The pernicious role of drugs in organized political violence is often overlooked. Drugs have been the cause of war, the funding for military operations, used by combatants and a part of the post-war political landscape. The insidious nature of drugs is especially visible in a certain type of war – small wars – yet is virtually unexamined by scholars and decision-makers.  相似文献   
578.
    
A recent article, ‘Rage Against the Machines’, does a disservice to the debate over what explains counterinsurgency (COIN) success. While it establishes a negative correlation between the diffusion of military mechanization in the state system and COIN success, its theoretical argument does not hold up under close scrutiny and its micro-case comparison of two units in Iraq during 2003–2004 ignores obvious counter-examples and factors that influence COIN success, such as leadership. A deeper inquiry would have revealed that there is much more to COIN success than simply not having access to vehicles.  相似文献   
579.
South America has gained international media attention due to its ongoing arms race, with politicians and analysts warning about the possibility of war. Nevertheless, since the Chaco War in the 1930s, the region has seldom faced major inter-state wars, all of which have been short-lived and with relatively few casualties. This article will discuss in greater detail the ongoing arms race in South America, portraying it as a race ‘of levels’, with not all countries carrying out massive weaponry purchases. Finally, I will discuss regional geopolitics, geosecurity and integration as part of an analysis regarding the unlikelihood of war.  相似文献   
580.
    
This paper describes a technique for the calculation of the probability that a helicopter can lift a specified load, or number of loads with a specified frequency distribution, in a given geographical region. This probability is computed by determining the bivariate altitude-temperature probability distribution for the specified region. The payload capability at any given temperature and altitude is calculated from standard performance equations. By integrating this over the altitude-temperature distribution, it is possible to obtain the probability distribution of payload capability, from which the required probabilities of lifting specific loads can be determined.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号