首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   691篇
  免费   19篇
  710篇
  2019年   26篇
  2018年   17篇
  2017年   15篇
  2016年   17篇
  2015年   16篇
  2014年   9篇
  2013年   145篇
  2011年   13篇
  2010年   8篇
  2009年   7篇
  2008年   7篇
  2007年   13篇
  2006年   8篇
  2005年   16篇
  2004年   8篇
  2003年   8篇
  2001年   7篇
  2000年   10篇
  1999年   10篇
  1998年   6篇
  1997年   12篇
  1996年   15篇
  1995年   7篇
  1994年   16篇
  1993年   9篇
  1992年   10篇
  1991年   17篇
  1990年   11篇
  1989年   16篇
  1988年   10篇
  1987年   15篇
  1986年   10篇
  1985年   13篇
  1984年   10篇
  1983年   9篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   8篇
  1978年   8篇
  1977年   8篇
  1976年   10篇
  1975年   8篇
  1974年   12篇
  1973年   11篇
  1972年   13篇
  1971年   15篇
  1970年   6篇
  1969年   7篇
  1968年   7篇
排序方式: 共有710条查询结果,搜索用时 0 毫秒
261.
A nonlinear optimization model is developed in this paper to identify the optimal replacement strategy for military aircraft. In the model, the aircraft operating and maintenance (O&M) costs per available year are estimated as a function of age during the aircraft life cycle. After determining the optimal replacement policy, the model is applied to the CF Long-Range Patrol CP-140A Arcturus fleet. A sensitivity analysis is also carried out to assess the impact of some key model parameters on the result.  相似文献   
262.
263.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
264.
This paper models and estimates Greek defence spending over the 1950–1989 period. It employs the Stone‐Geary welfare function and estimates levels of defence expenditures by the Engle‐Granger two‐step procedure. The Dickey‐Fuller test regression for cointegration is specified in terms of the significance of additional augmentations. The Deaton‐Muellbauer functional form is then employed and an estimating equation for the expenditure share of defence is derived. This specification is compared with the levels equation through a number of non‐nested tests involving model transformation.  相似文献   
265.
Using tests of a single equation model and cointegration techniques, this paper finds no evidence of a long run trade‐off, and some evidence of a short‐run trade‐off, between military spending and investment in post‐World War II United States data. The short‐run trade‐off is confined to the 1949–1971 period, and may be the result of the sharp expansion and contraction of military outlays in connection with the Korean and Vietnam Wars. In addition, cointegration techniques are used to identify a possible long‐run trade‐off between military spending and consumption.  相似文献   
266.
267.
268.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
269.
One of the most important issues facing the post‐Cold War U.S. defense establishment concerns the future allocation of combat tasks and responsibilities among different branches of the armed forces. The challenge is to reduce unnecessary redundancy across roles and missions when resources are highly constrained, without compromising military effectiveness. Defining the policy problem as one of resource allocation rather than operational effectiveness, we develop a methodology for allocating roles and missions. Our methodology focuses at the highest level of force aggregation and uses a mathematical programming model to produce cross‐service cross‐mission trade‐offs that will yield the best total force combat and non‐combat potential within resource consumption constraints.  相似文献   
270.
The Sixth Review Conference of the Biological Weapons Convention (BWC) gave the future of biological disarmament new hope. It brought the BWC back closer to the core of multilateral efforts to combat the weaponization of disease, agreed to an intersessional work program for 2007–2010, created an implementation support unit, and revived the interrupted process of BWC evolution through extended understandings agreed at review conferences. However, its aims were deliberately modest. Having set their sights realistically low, delegations did not have to lower them much further. What was most important was to prevent U.S.-Iranian acrimony from paralyzing the conference. With deadlock once again narrowly averted, the conference had to clear away the debris left from past dissensions in order to open the way to constructive evolution for the treaty. In particular the conference avoided contentious subjects such as permanent organization and verification measures for the BWC; its institutional deficit and compliance problems remain. Successes and limitations of the conference are analyzed, as is its equivocal outcome on confidence-building measures. Developing on the endogenous principle, the BWC will continue to need constant attention. At the center of a complex edifice, the BWC must be kept sound, strong, and solid.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号