首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   178篇
  免费   1篇
  179篇
  2024年   2篇
  2021年   3篇
  2020年   3篇
  2019年   6篇
  2018年   3篇
  2017年   4篇
  2015年   4篇
  2014年   2篇
  2013年   33篇
  2012年   2篇
  2011年   2篇
  2010年   3篇
  2009年   4篇
  2008年   2篇
  2007年   2篇
  2004年   3篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   4篇
  1994年   4篇
  1993年   4篇
  1992年   2篇
  1991年   4篇
  1989年   6篇
  1988年   3篇
  1987年   5篇
  1986年   7篇
  1985年   2篇
  1984年   7篇
  1982年   2篇
  1981年   4篇
  1980年   2篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   4篇
  1975年   3篇
  1974年   2篇
  1973年   2篇
  1972年   2篇
  1970年   2篇
  1969年   3篇
  1968年   1篇
  1967年   1篇
  1966年   1篇
排序方式: 共有179条查询结果,搜索用时 15 毫秒
1.
Stay-behind networks in France were set up starting in 1948 and were aimed at responding to the possibility of a Soviet armed attack into Western Europe. Participants were identified, and arms and explosives cached, to be activated in case of hostilities. This activity became folded into a multilateral effort under the Allied Coordination Committee (ACC) of NATO. In France, the network was run as a highly compartmented activity under the French external intelligence service (DGSE). As the Soviet threat receded, the stay-behind activity became more and more dormant, and in 1990 it was quietly disbanded, immediately after the P-2 scandal broke in Italy.  相似文献   
2.
An allocation problem is considered in lvhich different kinds of resources must be allocated to various activities, within a given time period. The opportunities for allo'cation appear randomly during this period. Certain assumptions about the values of possible allocations and the distribution of occurrences of opportunities lead to a dynamic programming formulation of the problem. This leads to a system of ordinary differential equations which are (in theory) solvable recursively, and can be solved numerically to any desired degree of precision. An example is given for the allocation of aircraft-carried weapons to targets of opportunity.  相似文献   
3.
Book Reviews     
Men, Ideas and Tanks: British Military Thought and Armoured Forces, 1903–1939. By J. P. Harris, Manchester University Press, (1995) ISBN 0 7190 3762 (hardback) £40.00 or ISBN 0 7190 4814 (paperback) £14.99

Fighting for Ireland. By M. L. R. Smith. London and New York: Routledge, (1995) ISBN 0–415–09161–6.

The Fundamentals of British Maritime Doctrine (BR1806) HMSO London (1995) ISBN 0–11–772470‐X £9.50

Regional Conflicts: The Challenges to US‐Russian Co‐Operation Edited by James E. Goodby SIPRI: Oxford University Press 1995 ISBN 019‐S29–171X, £30.00

SIPRI Yearbook 1995 ‐ Armaments, Disarmament and International Security Oxford: Oxford University Press 1995. ISBN 019–829–1930, £60.00.

Drug Trafficking in the Americas Edited by Bruce M. Bagley & William O. Walker III Transaction Publishers, New Brunswick, (USA), 1994 ISBN 1–56000–752–4.

Raglan: From the Peninsula to the Crimea By John Sweetman, Arms & Armour 1993. ISBN 1–85409–059–3. £19.00.  相似文献   

4.
The effects of environmental stochasticity in a Lanchester-type model of combat are investigated. The methodology is based on a study of stochastic differential equations with random parameters characterized by dichotomous Markov processes. Exact expressions for the Laplace transforms of the time evolution of the first- and second-order moments of the system are obtained. A special case when the fluctuations in the parameters occur with great rapidity in comparison with the natural time scale of the system is also analyzed. The stochastic stability in the mean-square sense is discussed by using the Routh–Hurwitz criterion and it is found that the stochastic perturbations tend to destabilize the system.  相似文献   
5.
6.
The flow-shop scheduling problem with sequence-dependent additive setup times is considered as a special case of the general problem, and a polynomially bounded approximate method is developed to find a minimum makespan permutation schedule. The approximate algorithm is shown to yield optimal results for the two-machine case. A version of Sule's model is defined that produces the first approximation of the optimal solution for this problem. Computational experience along with numerical examples are provided to test the effectiveness of the method.  相似文献   
7.
Barry Davies, Joining the SAS: How to Get In and What It's Like.Miami: Lewis International Inc., 1998. Pp.214, photos, index. $22.95. ISBN 0–966771–4–2.

Peter McAleese and John Avery, McAleese's Fighting Manual: The Definitive Soldier's Handbook.London: Orion, 1998. Pp.179, illus. £18.95. ISBN 0–75280–063–9.

Steve Crawford et al.The SAS Encyclopedia: The Definitive Guide to the World's Crack Regiment.Miami: Lewis International Inc., 1998. Pp.288, photos, maps, index. $29.95. ISBN 0–9666771–0–2.

Barry Davies et al.The Complete Encyclopedia of the SAS.London: Virgin Publishing Ltd, 1998. Pp.288, photos, maps, no index. $39.95. ISBN 1–85227–707–6.  相似文献   
8.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
9.
This paper attempts to resolve the existing confusion concerning missing operations. Scheduling problems are classified in two groups: (i) null-continuous (NC)—comprising the problems where an optimal schedule remains optimal on replacement of arbitrarily small processing times (existing operations) with zeros (missing operations); (ii) null-discontinuous (NDC)—comprising those problems which are not null-continuous.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号