全文获取类型
收费全文 | 561篇 |
免费 | 15篇 |
出版年
2021年 | 9篇 |
2020年 | 6篇 |
2019年 | 18篇 |
2018年 | 12篇 |
2017年 | 12篇 |
2016年 | 6篇 |
2015年 | 6篇 |
2014年 | 8篇 |
2013年 | 86篇 |
2010年 | 7篇 |
2009年 | 9篇 |
2008年 | 10篇 |
2005年 | 5篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 8篇 |
1997年 | 6篇 |
1996年 | 12篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 14篇 |
1992年 | 10篇 |
1991年 | 13篇 |
1990年 | 6篇 |
1989年 | 16篇 |
1988年 | 18篇 |
1987年 | 14篇 |
1986年 | 17篇 |
1985年 | 13篇 |
1984年 | 13篇 |
1982年 | 7篇 |
1981年 | 7篇 |
1980年 | 15篇 |
1979年 | 9篇 |
1978年 | 11篇 |
1977年 | 10篇 |
1976年 | 8篇 |
1975年 | 6篇 |
1974年 | 11篇 |
1972年 | 6篇 |
1971年 | 13篇 |
1970年 | 8篇 |
1969年 | 10篇 |
1968年 | 6篇 |
1967年 | 6篇 |
1966年 | 7篇 |
排序方式: 共有576条查询结果,搜索用时 31 毫秒
31.
AbstractContemporary development assistance often takes the form of subcontracted state-building. Foreign donors hire for-profit firms to provide services and to improve or create institutions in developing countries, particularly those experiencing internal conflict. This arrangement creates two counterproductive dynamics: first, it introduces agency problems between donors, recipient states, subcontractors, and citizens; and second, it undermines the long-run development of domestic bureaucratic capacity by creating disincentives for the host government to invest. These dynamics hinder, rather than foster, the legitimacy of state institutions. This paper summarizes trends in external support to state-building since the 1970s and illustrates subcontracted state-building with examples from Colombia. 相似文献
32.
Adam D.M. Svendsen 《Defense & Security Analysis》2015,31(1):58-73
This article aims to encourage the fostering of more systems thinking, and its greater exploitation, within the domain of contemporary intelligence. With particular focus on “micro systems thinking” and with reference to key intelligence processes, such as intelligence analysis, the utility of many systems dynamics within the intelligence context seeks to be further revealed. Through their greater collective harnessing, including up to “System of Systems” (“SoS”) dynamics, and promoting all that they can offer, more sophisticated overarching operational-to-strategic/policy “ends,” notably that of “defence-in-depth,” can be viably further advanced in a sustainable manner into the future. Arguably, a much-needed transformative impact on contemporary intelligence can also be increasingly realised through comprehensively engaging in and with more systems and SoS thinking. Aiding civil protection tasks, crisis management, emergency planners, and civil contingency practitioners likewise gain. 相似文献
33.
Raphael D. Marcus 《战略研究杂志》2015,38(4):500-528
This article highlights a pattern of military adaptation and tactical problem-solving utilized by the Israel Defense Forces (IDF) while engaged in protracted conflict with the Lebanese militant group Hizballah. It discusses the IDF’s recent attempts to institutionalize their historically intuitive process of ad-hoc learning by developing a formal tactical-level mechanism for ‘knowledge management’. The diffusion of this battlefield lesson-learning system that originated at lower-levels of the organization is examined, as well as its implementation and effectiveness during the 2006 Lebanon War. A nuanced analysis of IDF adaptation illustrates the dynamic interplay between both ‘top-down’ and ‘bottom-up’ processes of military innovation. 相似文献
34.
Evan N. Resnick 《战略研究杂志》2015,38(3):383-409
AbstractThis paper employs the concept of smart power to construct an analytical framework for assessing wartime alliance management. It makes two arguments. First, wartime sources of soft power differ from those obtaining during peacetime. Second, the coerciveness with which an alliance leader wields hard power towards actual or prospective allies should vary inversely with the amount of soft power it possesses. The smart power framework illuminates three types of alliance management failure. The paper’s key contentions are illustrated with examples furnished from the record of US alliance leadership since World War II. 相似文献
35.
Arriving (generic) jobs may be processed at one of several service stations, but only when no other (dedicated) jobs are waiting there. We consider the problem of how to route these incoming background jobs to make best use of the spare service capacity available at the stations. We develop an approximative approach to Whittle's proposal for restless bandits to obtain an index policy for routing. The indices concerned are increasing and nonlinear in the station workload. A numerical study testifies to the strong performance of the index policies developed. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
36.
Chen and Bhattacharyya [Exact confidence bounds for an exponential parameter under hybrid censoring, Commun Statist Theory Methods 17 (1988), 1857–1870] considered a hybrid censoring scheme and obtained the exact distribution of the maximum likelihood estimator of the mean of an exponential distribution along with an exact lower confidence bound. Childs et al. [Exact likelihood inference based on Type‐I and Type‐II hybrid censored samples from the exponential distribution, Ann Inst Statist Math 55 (2003), 319–330] recently derived an alternative simpler expression for the distribution of the MLE. These authors also proposed a new hybrid censoring scheme and derived similar results for the exponential model. In this paper, we propose two generalized hybrid censoring schemes which have some advantages over the hybrid censoring schemes already discussed in the literature. We then derive the exact distribution of the maximum likelihood estimator as well as exact confidence intervals for the mean of the exponential distribution under these generalized hybrid censoring schemes. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
37.
D J L Moore 《Whitehall Papers》2013,80(1):13-22
Abstract David Moore analyses the role of the Treasury in detemining and controlling defence policy and expenditure, and the place of the MoD within this function. 相似文献
38.
In many location problems, the solution is constrained to lie within a closed set. In this paper, optimal solutions to a special type of constrained location problem are characterized. In particular, the location problem with the solution constrained to be within a maximum distance of each demand point is considered, and an algorithm for its solution is developed and discussed. 相似文献
39.
Let X1 < X2 <… < Xn denote an ordered sample of size n from a Weibull population with cdf F(x) = 1 - exp (?xp), x > 0. Formulae for computing Cov (Xi, Xj) are well known, but they are difficult to use in practice. A simple approximation to Cov(Xi, Xj) is presented here, and its accuracy is discussed. 相似文献
40.
Computerized Scheduling of Seagoing Tankers The tanker scheduling problem considered in this paper is that of the Defense Fuel Supply Center (DFSC) and the Military Sealift Command (MSC) in the worldwide distribution of bulk petroleum products. Routes and cargoes which meet delivery schedule dates for a multiplicity of product requirements at minimum cost are to be determined for a fleet of tankers. A general mathematical programming model is presented, and then a mixed integer model is developed which attempts to reflect the true scheduling task of DFSC and MSC as closely as possible. The problem is kept to within a workable size by the systematic construction of a set of tanker routes which does not contain many possible routes that can be judged unacceptable from practical considerations alone. 相似文献