首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70篇
  免费   0篇
  2020年   1篇
  2019年   4篇
  2018年   3篇
  2017年   2篇
  2016年   1篇
  2014年   1篇
  2013年   23篇
  2012年   2篇
  2011年   2篇
  2010年   1篇
  2009年   2篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
  2004年   3篇
  2002年   1篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
排序方式: 共有70条查询结果,搜索用时 15 毫秒
51.
The following problem is studied. The units of an inventory are used one by one until all have failed. Their lifetimes decrease with their ages, when they are taken out of the inventory. An item of age a is supposed to have a lifetime Y exp(-a), where Y is a random variable which does not depend on a. It is shown that in order to maximize the total lifetime the items should be taken according to the LIFO principle. This is shown for a certain class of distributions of Y. This class includes the exponential and the Pareto distributions.  相似文献   
52.
The United States is launching another defence innovation initiative to offset the growing military-technological might of countries such as China, Russia and Iran. However, by utilising emerging technologies from the commercial sector to achieve greater military power the US may further open up the technology gap within NATO. This raises serious questions for NATO’s European allies. This article probes the nature of the US’s latest innovation strategy and sets it within the strategic context facing Europe today. Whether European governments, firms and militaries will join the US in its new defence innovation drive will hinge on politico-military and industrial considerations.  相似文献   
53.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   
54.
The routine inspection of facilities storing large numbers of identical items is modeled as a two‐person, sequential game. Timely detection of illegal activity is parameterized in terms of a critical time to detection, and equilibria are derived which provide inspection strategies. Necessary conditions for deterrence of illegal behavior are discussed. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 496–505, 2001  相似文献   
55.
This paper describes the Value Added Analysis methodology which is used as part of the U.S. Army's Planning, Programming, Budgeting, and Execution System to assist the Army leadership in evaluating and prioritizing competing weapon system alternatives during the process of building the Army budget. The Value Added Analysis concept uses a family of models to estimate an alternative system's contribution to the Army's effectiveness using a multiattribute value hierarchy. A mathematical optimization model is then used to simultaneously determine an alternative's cost‐benefit and to identify an optimal mix of weapon systems for inclusion in the Army budget. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 233–253, 1999  相似文献   
56.
Reagan's Secret War: The Untold Story of His Fight to Save the World from Nuclear Disaster, by Martin Anderson and Annelise Anderson. Crown Publishers, 2009. 464 pages, $32.50.

The Rebellion of Ronald Reagan: A History of the End of the Cold War, by James Mann. Viking, 2009. 410 pages, $27.95.  相似文献   
57.
58.
We investigate the link between economic performance and terrorism for 18 Latin American countries from 1970 to 2007, taking into account the potentially complex nature of this link. Panel causality analysis findings indicate that during this period, terrorism had no causal effect on economic growth. By contrast, we find that growth reduced terrorism in the less developed but not in the higher developed Latin American economies. We argue that group-specific differences (linked to patterns of economic development) govern this causal heterogeneity. From a series of negative binomial regressions we gain additional support for our findings, while also identifying further determinants of terrorism.  相似文献   
59.
The focus of this paper is on the social and economic aspects of corruption in Nigeria. Given the increasingly borderless nature of corruption and economic crime, this paper argues that a successful control campaign requires a coordinated response that will fuse domestic and international strategies. While the paper is wholly committed to the strategy of depriving criminals of their ill-gotten wealth, it acknowledges that the success that law enforcement agencies have had around the world in ‘taking the profit out of crime’ has been hitherto unimpressive. Drawing on the United Nations Convention against Corruption (UNCAC), particularly Article 20, the paper argues that governments in developing economies should adopt the radical strategy of taxing unaccountable wealth and criminalising illicit enrichment.  相似文献   
60.
Abstract

The emergence of the Islamic sect, Boko Haram, and its transformation into a terrorist organisation has dominated recent discourse in the fields of political science and security studies, both within and without the socio-politico enclave known as Nigeria. Much of the discussion has centred on the extra-judicial execution of its founder, Mohammed Yusuf, which purportedly intensified the radicalisation of the group, and whether or not the sect receives operational and/or financial support from foreign terrorist associations. The interest of others has been to forecast the possibility of the internationalisation of the group's activities. This paper aligns with those whose interest is to identify and proffer ways of resolving factors that predisposed the Nigerian state to the levels of violence perpetrated by Boko Haram, with a view to averting much greater crises in the future. It adopts some historicism in demonstrating that the responsibility for the deepening insecurity in the country resides in the Nigerian state structure, which has often been seen as willing to sacrifice the well-being of the many for the benefit of a few. On the whole, the paper utilises state fragility as the framework of analysis by identifying the incapacity of the state in effective service delivery, which has as a result created a situation of mass unemployment and extreme poverty that has fanned the Boko Haram uprising. It concludes that a sustainable solution to the crisis lies in addressing the root causes of inequality, unemployment and poverty, with which most Nigerians, particularly in the north, subsist.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号