全文获取类型
收费全文 | 941篇 |
免费 | 0篇 |
专业分类
941篇 |
出版年
2020年 | 8篇 |
2019年 | 18篇 |
2017年 | 24篇 |
2016年 | 17篇 |
2015年 | 22篇 |
2014年 | 21篇 |
2013年 | 171篇 |
2011年 | 8篇 |
2010年 | 10篇 |
2009年 | 15篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 13篇 |
2004年 | 17篇 |
2003年 | 9篇 |
2002年 | 15篇 |
2001年 | 9篇 |
2000年 | 11篇 |
1999年 | 13篇 |
1998年 | 20篇 |
1997年 | 15篇 |
1996年 | 14篇 |
1995年 | 15篇 |
1994年 | 27篇 |
1993年 | 22篇 |
1992年 | 18篇 |
1991年 | 24篇 |
1990年 | 13篇 |
1989年 | 18篇 |
1988年 | 20篇 |
1987年 | 22篇 |
1986年 | 18篇 |
1985年 | 18篇 |
1984年 | 14篇 |
1983年 | 12篇 |
1982年 | 12篇 |
1981年 | 16篇 |
1980年 | 11篇 |
1979年 | 16篇 |
1978年 | 15篇 |
1976年 | 12篇 |
1975年 | 13篇 |
1974年 | 15篇 |
1973年 | 12篇 |
1972年 | 17篇 |
1971年 | 10篇 |
1970年 | 11篇 |
1969年 | 9篇 |
1968年 | 8篇 |
1967年 | 9篇 |
排序方式: 共有941条查询结果,搜索用时 15 毫秒
721.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献
722.
J. N.C. Hill 《Small Wars & Insurgencies》2013,24(1):4-31
The aim of this article is to consider how Algeria's most prized achievement and treasured memory – the FLN's victory over the French in the war of liberation – has helped stimulate and sustain the violence that has blighted the country since independence. It argues that successive governments have propagated a legend of the war that encourages and legitimises rebellion and armed resistance. By celebrating the actions and achievements of a committed band of revolutionaries they have established a precedent whereby it is every citizen's duty to oppose and resist an unjust government. Time and again therefore, insurgent groups like the FFS, MIA, and AIS have justified their actions and won popular support by portraying themselves as the early FLN's natural heir. 相似文献
723.
Michael J. Armstrong 《海军后勤学研究》2013,60(8):652-660
This article analyzes versions of the salvo model of missile combat where area fire is used by one or both sides in a battle. Although these models share some properties with the area fire Lanchester model and the aimed fire salvo model, they also display some interesting differences, especially over the course of several salvos. Although the relative size of each force is important with aimed fire, with area fire, it is the absolute size that matters. Similarly, although aimed fire exhibits square law behavior, area fire shows approximately linear behavior. When one side uses area fire and the other uses aimed fire, the model displays a mix of square and linear law behavior. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 652–660, 2013 相似文献
724.
Christopher J. Eberle 《Journal of Military Ethics》2013,12(1):54-67
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar. 相似文献
725.
726.
727.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014 相似文献
728.
Economic reconstruction typically takes place after the end of war. Yet recently, economic reconstruction has been viewed as a means to ‘win hearts and minds’ during ongoing conflict. Drawing on a variety of reconstruction experiences from Afghanistan and Iraq, we identify four ‘reconstruction traps’ that result from the incentives and constraints faced by actors involved in economic reconstruction during ongoing conflict. These traps include: 1. the credible commitment trap, 2. the knowledge trap, 3. the political economy trap, and 4. the bureaucracy trap. Avoiding these traps is critical for successful economic reconstruction; and we discuss potential strategies for doing so. 相似文献
729.
730.
In 2004, stretched by wartime deployments, the US Army countered declining retention by increasing re‐enlistment bonuses and implementing stop‐loss to prevent soldiers from separating at the end of their enlistment. We estimate the effects of bonuses, deployment, and stop‐loss on re‐enlistment between FY 2002 and 2006. We estimate that the baseline propensity to re‐enlist fell by 20%. However, we find that deployed soldiers are more likely to re‐enlist and that the estimated effects of re‐enlistment bonuses are similar to those estimated in peacetime. We evaluate the reasons for our findings, and calculate the cost effectiveness of re‐enlistment bonuses. 相似文献