全文获取类型
收费全文 | 613篇 |
免费 | 14篇 |
专业分类
627篇 |
出版年
2019年 | 13篇 |
2018年 | 5篇 |
2017年 | 17篇 |
2016年 | 10篇 |
2015年 | 15篇 |
2014年 | 16篇 |
2013年 | 123篇 |
2012年 | 5篇 |
2011年 | 5篇 |
2010年 | 10篇 |
2009年 | 12篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 9篇 |
2004年 | 12篇 |
2003年 | 6篇 |
2002年 | 10篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 9篇 |
1995年 | 5篇 |
1994年 | 17篇 |
1993年 | 14篇 |
1992年 | 9篇 |
1991年 | 15篇 |
1990年 | 8篇 |
1989年 | 14篇 |
1988年 | 16篇 |
1987年 | 15篇 |
1986年 | 19篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 8篇 |
1978年 | 12篇 |
1976年 | 8篇 |
1975年 | 8篇 |
1974年 | 8篇 |
1973年 | 9篇 |
1972年 | 10篇 |
1970年 | 9篇 |
1969年 | 7篇 |
1968年 | 5篇 |
1967年 | 6篇 |
排序方式: 共有627条查询结果,搜索用时 15 毫秒
541.
Steven J. Childs 《Defense & Security Analysis》2012,28(4):343-359
With the burgeoning influence of emerging markets in Asia, a tectonic shift is taking place in the global security landscape. Asian states are concomitantly arming as their economic clout grows. In light of these developments, security analysts would benefit from a formal means of placing these arms acquisitions in a structural context. Are arms acquisitions on par with the expectations of Asian states, given their structural dispositions, or are recent acquisitions beyond anticipated levels? By using a dynamic panel regression of 187 states from 1950 to 2011, this research predicts arms import volume using the degree of interstate arms linkages, the size of a state's military, and its level of economic development. The technique offers analysts a formal means of distinguishing orthodox behavior in importing conventional weapons from extraneous security motivations. The article concludes by generating near-term forecasts of Asian arms imports and discussing the implications of the technique. 相似文献
542.
543.
This paper addresses a two‐machine open shop scheduling problem, in which the machines are not continuously available for processing. The processing of an operation affected by a non‐availability interval can be interrupted and resumed later. The objective is to minimize the makespan. We present two polynomial‐time approximation schemes, one of which handles the problem with one non‐availability interval on each machine and the other for the problem with several non‐availability intervals on one of the machines. Problems with a more general structure of the non‐availability intervals are not approximable in polynomial time within a constant factor, unless . © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
544.
The reoptimization procedure within the shifting bottleneck (SB) involves reevaluation of all previously scheduled toolgroup subproblems at each iteration of the SB heuristic. A real options analysis (ROA) model is developed to value the option to reoptimize in the SB heuristic, such that reoptimization only occurs when it is most likely to lead to a schedule with a lower objective function. To date, all ROA models have sought to value options financially (i.e., in terms of monetary value). The ROA model developed in this paper is completely original in that it has absolutely no monetary basis. The ROA methodologies presented are shown to greatly outperform both full and no reoptimization approaches with respect to both computation time and total weighted tardiness. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
545.
The focus of this paper is on determining the requirements of different component options of a modular end‐product in an uncertain environment. We explicitly model two distinct sources of uncertainty: stochastic end‐product demand and unknown market proportions for the different product options available. Our cost minimizing model focuses on determining the optimal requirements policies for component options that meet a pre‐set service level. We show that simple common‐sense requirements policies are not generally optimal; there is a non‐linear connection between service level and component requirements that is hard to characterize without a detailed analysis. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
546.
Timothy J. Lomperis 《Small Wars & Insurgencies》2016,27(1):132-153
In a military intervention, do surges work? I compare the failed ‘surge’ in Vietnam, the repulse of the Easter Invasion in 1972, as a means of assessing the more ambiguous surges in Iraq and Afghanistan. I identify four features of a surge for this analysis: the military dimensions and strategy of the surging forces, the military capabilities of the host forces, the political vitality and will of the host country, and the political commitment in the domestic politics of the intervener. I find that the last feature is the most critical; and, in all three surges, the American political commitment was lacking. 相似文献
547.
The relationship between economic growth and military expenditure has been the subject of a large literature in defence economics. This study analyses the influence of military expenditures on economic growth in a global perspective for the time period 2000–2010 taking spatial dimension into account. The augmented Solow model is employed to investigate the defence-growth nexus using the cross-sectional data relating to 128 countries. Following a traditional regression analysis, spatial variations in the relationships are examined utilizing different spatial econometric specifications estimated by maximum likelihood. The regressions are compared with each other via likelihood ratio tests, and the spatial Durbin model is found to be the most appropriate one suggesting that the typical least-squares model is misspecified. Empirical evidence indicates that military expenditure has a positive effect on economic growth with a significant spatial dependence for the time period under consideration. 相似文献
548.
Bryan J. Arva 《Defence and Peace Economics》2016,27(1):1-36
Qualitative studies of terrorist movements frequently highlight the importance of diaspora communities as important factors in producing and sustaining terrorist activity in countries. The underlying theoretical argument is that bifurcation of tight-knit minority communities between countries nurtures separatist or irredentist sentiments among affected community members, thus prompting terrorist activity, while minority community members in other countries might mobilize financial and political resources to support terrorist activity among their compatriots. In this study, we empirically test whether transnational dispersion, versus domestic concentration, of minority communities in countries produces higher incidents of terrorism. Conducting a series of negative binomial estimations on a reshaped database of around 170 countries from 1981 to 2006, derived from the Minorities at Risk database and the Global Terrorism Database, we determine that both transnational dispersion of kin minority communities and domestic concentration of minorities within countries increase terrorism and that transnational dispersion is a particularly robust predictor of terrorist attacks. 相似文献
549.
Quantity discounts are considered in the context of the single-period inventory model known as “the newsboy problem.” It is argued that the behavioral implications of the all-units discount schedule are more complex and interesting than the literature has suggested. Consideration of this behavior and the use of marginal analysis lead to a new method for solving this problem that is both conceptually simpler and more efficient than the traditional approach. This marginal-cost solution procedure is described graphically, an algorithm is presented, and an example is used to demonstrate that this solution procedure can be extended easily to handle complex discount schedules, such as some combined (simultaneously applied) purchasing and transportation cost discount schedules. 相似文献
550.
This paper proposes a skewness correction (SC) method for constructing the and R control charts for skewed process distributions. Their asymmetric control limits (about the central line) are based on the degree of skewness estimated from the subgroups, and no parameter assumptions are made on the form of process distribution. These charts are simply adjustments of the conventional Shewhart control charts. Moreover, the chart is almost the same as the Shewhart chart if the process distribution is known to be symmetrical. The new charts are compared with the Shewhart charts and weighted variance (WV) control charts. When the process distribution is in some neighborhood of Weibull, lognormal, Burr or binomial family, simulation shows that the SC control charts have Type I risk (i.e., probability of a false alarm) closer to 0.27% of the normal case. Even in the case where the process distribution is exponential with known mean, not only the control limits and Type I risk, but also the Type II risk of the SC charts are closer to those of the exact and R charts than those of the WV and Shewhart charts. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 555–573, 2003 相似文献