首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   246篇
  免费   10篇
  2020年   3篇
  2019年   13篇
  2018年   9篇
  2017年   4篇
  2016年   8篇
  2015年   7篇
  2014年   7篇
  2013年   75篇
  2011年   8篇
  2010年   2篇
  2009年   3篇
  2008年   4篇
  2007年   7篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   4篇
  2001年   3篇
  1999年   5篇
  1997年   3篇
  1996年   3篇
  1995年   3篇
  1994年   6篇
  1993年   4篇
  1992年   4篇
  1991年   3篇
  1990年   3篇
  1989年   5篇
  1988年   5篇
  1987年   4篇
  1986年   1篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1981年   1篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1976年   2篇
  1975年   2篇
  1974年   1篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
  1970年   3篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有256条查询结果,搜索用时 546 毫秒
61.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
62.
This paper looks at the impact of military technology diffusion on military assistance operations (MAO), in the United States known as Security Force Assistance or SFA. The discussion looks conceptually at the role of technological change and how it interacts with martial cultures in military assistant operations. I argue that growing trends in science and technology suggest potential conflicts between culture and technology. Relying on a culture-technology model drawn from anthropology, the paper contends that new technologies will present increasing challenges for the emerging MAO landscape. The paper will illustrate that the techno-science gap will continue to grow as innovations such as robotics, sensors, and networks continue to develop. Finally, the paper will look at ways to overcome this conflict between culture and technology.  相似文献   
63.
With the recent trend toward just-in-time deliveries and reduction of inventories, many firms are reexamining their inventory and logistics policies. Some firms have dramatically altered their inventory, production, and shipping policies with the goal of reducing costs and improving service. Part of this restructuring may involve a specific contract with a trucking company, or it may entail establishing in-house shipping capabilities. This restructuring, however, raises new questions regarding the choice of optimal trucking capacity, shipping frequency, and inventory levels. In this study, we examine a two-level distribution system composed of a warehouse and a retailer. We assume that demand at the retailer is random. Since the warehouse has no advance notice of the size of the retailer order, inventory must be held there as well as at the retailer. We examine inventory policies at both the warehouse and the retailer, and we explicitly consider the trucking capacity, and the frequency of deliveries from the warehouse to the retailer. Both linear and concave fixed transportation costs are examined. We find the optimal base stock policies at both locations, the optimal in-house or contracted regular truck capacity, and the optimal review period (or, equivalently, delivery frequency). For the case of normally distributed demand we provide analytical results and numerical examples that yield insight into systems of this type. Some of our results are counterintuitive. For instance, we find some cases in which the optimal truck capacity decreases as the variability of demand increases. In other cases the truck capacity increases with variability of demand. © 1993 John Wiley & Sons, Inc.  相似文献   
64.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism.  相似文献   
65.
The assignment of personnel to teams is a fundamental managerial function typically involving several objectives and a variety of idiosyncratic practical constraints. Despite the prevalence of this task in practice, the process is seldom approached as an optimization problem over the reported preferences of all agents. This is due in part to the underlying computational complexity that occurs when intra-team interpersonal interactions are taken into consideration, and also due to game-theoretic considerations, when those taking part in the process are self-interested agents. Variants of this fundamental decision problem arise in a number of settings, including, for example, human resources and project management, military platooning, ride sharing, data clustering, and in assigning students to group projects. In this article, we study an analytical approach to “team formation” focused on the interplay between two of the most common objectives considered in the related literature: economic efficiency (i.e., the maximization of social welfare) and game-theoretic stability (e.g., finding a core solution when one exists). With a weighted objective across these two goals, the problem is modeled as a bi-level binary optimization problem, and transformed into a single-level, exponentially sized binary integer program. We then devise a branch-cut-and-price algorithm and demonstrate its efficacy through an extensive set of simulations, with favorable comparisons to other algorithms from the literature.  相似文献   
66.
In September 1878 the British Museum received a donation of a folded metal plate which had been embossed and gilded. Restoration of the object revealed that the folded plate was in fact the outer casing of a Roman copper alloy cavalry sports type helmet which dates to the late second or third century AD. The story of what became known as the Guisborough helmet began 14 years earlier in what was then the North Riding of Yorkshire when workers employed by the Cleveland Railway Company discovered a ‘very curious plate of metal’ during road construction. It appears that the helmet was deliberately prepared for deposition and buried at a depth of c30 cm close to a stream. Examination by the authors suggests that this was a high value item that had been repaired many times. Experimental evidence suggests that the decoration alone required approximately 16 h to fashion.  相似文献   
67.
Whose preferences determine the tradeoff between security and civilian output in deciding upon budget allocations to defence? This paper considers the role that consumer preferences might play in influencing military spending. We propose normative criteria to judge the economic or political efficiency of defence provision at a given time, and test them using Australian survey‐based micro‐data. Our results suggest that the political system has not delivered a simple social‐choice translation of individual preferences into collective outcomes, nor has it delivered results consistent with simple majority‐voting median preferences.  相似文献   
68.
Using tests of a single equation model and cointegration techniques, this paper finds no evidence of a long run trade‐off, and some evidence of a short‐run trade‐off, between military spending and investment in post‐World War II United States data. The short‐run trade‐off is confined to the 1949–1971 period, and may be the result of the sharp expansion and contraction of military outlays in connection with the Korean and Vietnam Wars. In addition, cointegration techniques are used to identify a possible long‐run trade‐off between military spending and consumption.  相似文献   
69.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号