全文获取类型
收费全文 | 447篇 |
免费 | 16篇 |
出版年
2021年 | 5篇 |
2020年 | 5篇 |
2019年 | 17篇 |
2018年 | 14篇 |
2017年 | 9篇 |
2016年 | 12篇 |
2015年 | 7篇 |
2014年 | 11篇 |
2013年 | 105篇 |
2011年 | 10篇 |
2010年 | 5篇 |
2009年 | 7篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1997年 | 8篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 9篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 7篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 14篇 |
1987年 | 7篇 |
1986年 | 7篇 |
1985年 | 11篇 |
1984年 | 9篇 |
1983年 | 5篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 6篇 |
1976年 | 3篇 |
1974年 | 7篇 |
1973年 | 4篇 |
1972年 | 5篇 |
1971年 | 8篇 |
1970年 | 6篇 |
1969年 | 5篇 |
1968年 | 3篇 |
1967年 | 3篇 |
排序方式: 共有463条查询结果,搜索用时 31 毫秒
431.
432.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
433.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
434.
David A. Patten 《Small Wars & Insurgencies》2013,24(5):879-906
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo. 相似文献
435.
436.
David A. Percox 《Small Wars & Insurgencies》2013,24(3):46-101
Despite considerable post‐war planning, the British counter‐insurgency campaign in Kenya did not constitute a Colonial Office strategy for decolonisation. COIN in Kenya had one purpose: to re‐impose law and order, or British control. If for no other reason, this is demonstrated by the initial reluctance of the Colonial Office to intervene. Frequent re‐assessments and postponement of the ending of the State of Emergency, and the subordination of socio‐economic and political reforms to military objectives, show clearly that decolonisation was not high on the British list of priorities in Kenya. This article questions the relationship between COIN and decolonisation, and the validity of models of British counter‐insurgency. 相似文献
437.
For a component or a system subject to stochastic degradation with sporadic jumps that occur at random times and have random sizes, we propose to model the cumulative degradation with random jumps using a single stochastic process based on the characteristics of Lévy subordinators, the class of nondecreasing Lévy processes. Based on the inverse Fourier transform, we derive a new closed‐form reliability function and probability density function for lifetime, represented by Lévy measures. The reliability function derived using the traditional convolution approach for common stochastic models such as gamma degradation process with random jumps, is revealed to be a special case of our general model. Numerical experiments are used to demonstrate that our model performs well for different applications, when compared with the traditional convolution method. More importantly, it is a general and useful tool for life distribution analysis of stochastic degradation with random jumps in multidimensional cases. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 483–492, 2015 相似文献
438.
Regardless of the outcome, civil wars are destructive events. They not only devastate the physical and human capital of a society, but also have a direct effect on state capacity. The capacity of the state is critical as it attempts to rebuild society and minimize the risk of a new civil conflict; yet, it is still not clear how civil war precisely affects state capacity. In general, we argue that incumbent victors are more likely to end with a stronger state when the conflict is short and the victory is decisive. In contrast, rebel victors require more time to build their internal capacity and thus have stronger states after a longer conflict, especially when they had access to lootable resources. 相似文献
439.
David Kinsella 《Defence and Peace Economics》2013,24(1):19-36
I explore the relationship between superpower arms transfers and the Arab‐Israeli rivalry. My empirical analysis suggests that Soviet arms transfers to the Middle East, more than American transfers, have exacerbated interstate rivalry in the region. It also suggests that Soviet arms transfers, again more than American transfers, have encouraged compensatory arming by the other superpower. These conclusions derive from the results of cross‐correlation analysis, Granger‐causality tests, and variance decompositions, and are quite robust. While my findings paint a rather unflattering portrait of the effects of superpower involvement in the region, they do constitute grounds for optimism in light of current developments. 相似文献
440.
Michael Asteris Jeffery Grainger David Clark Shabbar Jaffry 《Defence and Peace Economics》2013,24(1):53-73
This paper provides a methodology for estimating the economic impact of defence spending at a sub‐regional level. It does so by calculating the income and employment generated by Britain’s Royal Navy and associated defence activities in the City of Portsmouth and its surrounding area, during the financial year 2003–2004. In an era of military consolidation, the paper offers an insight into the multifaceted impact of defence‐related expenditure. Hence, it presents a generic framework that could prove useful to other researchers when seeking to measure the sub‐regional impact of naval, airforce and army facilities in other national contexts. 相似文献