全文获取类型
收费全文 | 346篇 |
免费 | 29篇 |
国内免费 | 4篇 |
出版年
2023年 | 2篇 |
2021年 | 6篇 |
2020年 | 4篇 |
2019年 | 14篇 |
2018年 | 10篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 9篇 |
2014年 | 9篇 |
2013年 | 83篇 |
2012年 | 6篇 |
2011年 | 11篇 |
2010年 | 7篇 |
2009年 | 10篇 |
2008年 | 11篇 |
2007年 | 14篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 20篇 |
1998年 | 5篇 |
1997年 | 13篇 |
1996年 | 8篇 |
1995年 | 6篇 |
1994年 | 10篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1985年 | 2篇 |
1983年 | 3篇 |
1979年 | 2篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 4篇 |
1971年 | 2篇 |
1970年 | 3篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有379条查询结果,搜索用时 15 毫秒
91.
David H. Ucko 《战略研究杂志》2019,42(3-4):448-479
Despite the emphasis in doctrine and academia that counterinsurgency is in its essence political, these operations are all too commonly discussed and approached as primarily military endeavors. Informed by the need to refocus counterinsurgency studies, this article revisits a foundational case of the canon – the Malayan Emergency – to discuss its political (i.e., not military) unfolding. The analysis distinguishes itself by emphasizing the diplomatic processes, negotiations, and deals that gave strategic meaning to the military operations underway. In so doing, the article also generates insight on the use of leverage and elite bargains in creating new political settlements and bringing insurgent conflicts to an end. 相似文献
92.
93.
94.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism. 相似文献
95.
96.
通过测量T06筒身φ127内孔尺寸,发现有10%的尺寸超差。经分析找到了造成筒身内孔尺寸超差的原因,并采取了相应的措施,取得了明显的效果。 相似文献
97.
98.
99.
We consider the problem of efficiently scheduling deliveries by an uncapacitated courier from a central location under online arrivals. We consider both adversary‐controlled and Poisson arrival processes. In the adversarial setting we provide a randomized (3βΔ/2δ ? 1) ‐competitive algorithm, where β is the approximation ratio of the traveling salesman problem, δ is the minimum distance between the central location and any customer, and Δ is the length of the optimal traveling salesman tour overall customer locations and the central location. We provide instances showing that this analysis is tight. We also prove a 1 + 0.271Δ/δ lower‐bound on the competitive ratio of any algorithm in this setting. In the Poisson setting, we relax our assumption of deterministic travel times by assuming that travel times are distributed with a mean equal to the excursion length. We prove that optimal policies in this setting follow a threshold structure and describe this structure. For the half‐line metric space we bound the performance of the randomized algorithm in the Poisson setting, and show through numerical experiments that the performance of the algorithm is often much better than this bound. 相似文献
100.
The global financial turmoil of 2008 has resulted in the curtailment of military expenditure in most western countries. At a sub-regional-level reductions in the level of activity at a major military facility can have significant economic impact. In the light of this, the paper has two objectives: to analyse the impact of the decision to terminate naval shipbuilding at the United Kingdom’s Portsmouth Naval Base; and, for illustrative purposes, to examine the possible economic consequences of further contraction at the facility. In pursuit of these aims, it is necessary to establish the output, income and employment generated by the base using a bespoke input–output model. The methodology employed can, with appropriate adjustments, be utilised in other military or civilian contexts. 相似文献