首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   441篇
  免费   10篇
  2023年   2篇
  2020年   5篇
  2019年   18篇
  2018年   11篇
  2017年   12篇
  2016年   17篇
  2015年   13篇
  2014年   16篇
  2013年   121篇
  2012年   4篇
  2011年   13篇
  2010年   7篇
  2009年   8篇
  2008年   8篇
  2007年   9篇
  2006年   5篇
  2005年   7篇
  2004年   5篇
  2003年   8篇
  2002年   9篇
  2001年   4篇
  2000年   2篇
  1999年   7篇
  1998年   5篇
  1997年   6篇
  1996年   6篇
  1995年   8篇
  1994年   10篇
  1993年   7篇
  1992年   10篇
  1991年   8篇
  1990年   6篇
  1989年   10篇
  1988年   9篇
  1987年   7篇
  1986年   6篇
  1985年   6篇
  1983年   3篇
  1981年   2篇
  1979年   3篇
  1976年   2篇
  1975年   2篇
  1974年   2篇
  1973年   3篇
  1972年   4篇
  1971年   2篇
  1970年   3篇
  1968年   3篇
  1967年   2篇
  1966年   1篇
排序方式: 共有451条查询结果,搜索用时 281 毫秒
61.
The role of norms and military utility in the use of weapons is disputed by constructivist and realist scholars. Through an examination of US decision-making regarding anti-plant and irritant agents in the Vietnam War, I advance this debate in three key ways. First, I develop structural realism’s expectations regarding the role of military utility. Second, I demonstrate that social and material factors are at play in our understandings of both ‘norms’ and ‘military utility’, and that both played a role in US decisions. Third, I find that the dominant role – as structural realism expects – was played by military utility.  相似文献   
62.
This article treats an elementary optimization problem, where an inbound stream of successive items is to be resequenced with the help of multiple parallel queues in order to restore an intended target sequence. Whenever early items block the one item to be currently released into the target sequence, they are withdrawn from their queue and intermediately stored in an overflow area until their actual release is reached. We aim to minimize the maximum number of items simultaneously stored in the overflow area during the complete resequencing process. We met this problem in industry practice at a large German automobile producer, who has to resequence containers with car seats prior to the assembly process. We formalize the resulting resequencing problem and provide suited exact and heuristic solution algorithms. In our computational study, we also address managerial aspects such as how to properly avoid the negative effects of sequence alterations. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 401–415, 2016  相似文献   
63.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty.  相似文献   
64.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
65.
66.
67.
68.
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号