全文获取类型
收费全文 | 691篇 |
免费 | 19篇 |
专业分类
710篇 |
出版年
2019年 | 26篇 |
2018年 | 17篇 |
2017年 | 15篇 |
2016年 | 17篇 |
2015年 | 16篇 |
2014年 | 9篇 |
2013年 | 145篇 |
2011年 | 13篇 |
2010年 | 8篇 |
2009年 | 7篇 |
2008年 | 7篇 |
2007年 | 13篇 |
2006年 | 8篇 |
2005年 | 16篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2001年 | 7篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 6篇 |
1997年 | 12篇 |
1996年 | 15篇 |
1995年 | 7篇 |
1994年 | 16篇 |
1993年 | 9篇 |
1992年 | 10篇 |
1991年 | 17篇 |
1990年 | 11篇 |
1989年 | 16篇 |
1988年 | 10篇 |
1987年 | 15篇 |
1986年 | 10篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1983年 | 9篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 10篇 |
1975年 | 8篇 |
1974年 | 12篇 |
1973年 | 11篇 |
1972年 | 13篇 |
1971年 | 15篇 |
1970年 | 6篇 |
1969年 | 7篇 |
1968年 | 7篇 |
排序方式: 共有710条查询结果,搜索用时 0 毫秒
261.
A. Sokri 《Defence and Peace Economics》2013,24(6):645-653
A nonlinear optimization model is developed in this paper to identify the optimal replacement strategy for military aircraft. In the model, the aircraft operating and maintenance (O&M) costs per available year are estimated as a function of age during the aircraft life cycle. After determining the optimal replacement policy, the model is applied to the CF Long-Range Patrol CP-140A Arcturus fleet. A sensitivity analysis is also carried out to assess the impact of some key model parameters on the result. 相似文献
262.
263.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献
264.
Christos A. Avramides 《Defence and Peace Economics》2013,24(2):145-187
This paper models and estimates Greek defence spending over the 1950–1989 period. It employs the Stone‐Geary welfare function and estimates levels of defence expenditures by the Engle‐Granger two‐step procedure. The Dickey‐Fuller test regression for cointegration is specified in terms of the significance of additional augmentations. The Deaton‐Muellbauer functional form is then employed and an estimating equation for the expenditure share of defence is derived. This specification is compared with the levels equation through a number of non‐nested tests involving model transformation. 相似文献
265.
David Gold 《Defence and Peace Economics》2013,24(3):251-266
Using tests of a single equation model and cointegration techniques, this paper finds no evidence of a long run trade‐off, and some evidence of a short‐run trade‐off, between military spending and investment in post‐World War II United States data. The short‐run trade‐off is confined to the 1949–1971 period, and may be the result of the sharp expansion and contraction of military outlays in connection with the Korean and Vietnam Wars. In addition, cointegration techniques are used to identify a possible long‐run trade‐off between military spending and consumption. 相似文献
266.
267.
Thomas A. Marks 《Small Wars & Insurgencies》2013,24(2):339-342
268.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities. 相似文献
269.
One of the most important issues facing the post‐Cold War U.S. defense establishment concerns the future allocation of combat tasks and responsibilities among different branches of the armed forces. The challenge is to reduce unnecessary redundancy across roles and missions when resources are highly constrained, without compromising military effectiveness. Defining the policy problem as one of resource allocation rather than operational effectiveness, we develop a methodology for allocating roles and missions. Our methodology focuses at the highest level of force aggregation and uses a mathematical programming model to produce cross‐service cross‐mission trade‐offs that will yield the best total force combat and non‐combat potential within resource consumption constraints. 相似文献
270.
Nicholas A. Sims 《The Nonproliferation Review》2013,20(2):351-372
The Sixth Review Conference of the Biological Weapons Convention (BWC) gave the future of biological disarmament new hope. It brought the BWC back closer to the core of multilateral efforts to combat the weaponization of disease, agreed to an intersessional work program for 2007–2010, created an implementation support unit, and revived the interrupted process of BWC evolution through extended understandings agreed at review conferences. However, its aims were deliberately modest. Having set their sights realistically low, delegations did not have to lower them much further. What was most important was to prevent U.S.-Iranian acrimony from paralyzing the conference. With deadlock once again narrowly averted, the conference had to clear away the debris left from past dissensions in order to open the way to constructive evolution for the treaty. In particular the conference avoided contentious subjects such as permanent organization and verification measures for the BWC; its institutional deficit and compliance problems remain. Successes and limitations of the conference are analyzed, as is its equivocal outcome on confidence-building measures. Developing on the endogenous principle, the BWC will continue to need constant attention. At the center of a complex edifice, the BWC must be kept sound, strong, and solid. 相似文献