全文获取类型
收费全文 | 711篇 |
免费 | 0篇 |
专业分类
711篇 |
出版年
2019年 | 26篇 |
2018年 | 17篇 |
2017年 | 15篇 |
2016年 | 17篇 |
2015年 | 16篇 |
2014年 | 9篇 |
2013年 | 145篇 |
2011年 | 13篇 |
2010年 | 8篇 |
2009年 | 7篇 |
2008年 | 7篇 |
2007年 | 13篇 |
2006年 | 8篇 |
2005年 | 16篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2001年 | 7篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 6篇 |
1997年 | 12篇 |
1996年 | 15篇 |
1995年 | 7篇 |
1994年 | 16篇 |
1993年 | 9篇 |
1992年 | 10篇 |
1991年 | 17篇 |
1990年 | 11篇 |
1989年 | 16篇 |
1988年 | 10篇 |
1987年 | 15篇 |
1986年 | 10篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1983年 | 9篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 10篇 |
1975年 | 8篇 |
1974年 | 12篇 |
1973年 | 11篇 |
1972年 | 13篇 |
1971年 | 15篇 |
1970年 | 6篇 |
1969年 | 7篇 |
1968年 | 7篇 |
排序方式: 共有711条查询结果,搜索用时 0 毫秒
111.
112.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
113.
114.
David J. Karl 《战略研究杂志》2013,36(4):619-641
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies. 相似文献
115.
116.
David Betz 《Small Wars & Insurgencies》2013,24(4):510-540
This paper looks at the virtual dimension of contemporary insurgency and counterinsurgency. It argues that the West is faltering in the ‘War of Ideas’ with global Jihad for the main reason that the messages that we wish to convey lack narrative coherence. This is a result of the fact that we misapprehend the nature of the virtual operational environment whereas our opponents possess an intuitive grasp of it as a result of which their structure and method of operations are better adapted and more effective than our own. There is no reason, beyond inertia, that this should remain the case. 相似文献
117.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
118.
119.
John A. Nagl 《Small Wars & Insurgencies》2013,24(3):377-382
Etzioni both exaggerates and minimizes the influence of my book Learning to Eat Soup with a Knife on different components of US military doctrine, mischaracterizes my treatment of the Malayan Emergency, and unfairly denigrates the successes of counterinsurgency in Iraq from 2007 to 2011 while misattributing the reasons for its failures in both Iraq and Afghanistan. 相似文献
120.