全文获取类型
收费全文 | 242篇 |
免费 | 10篇 |
专业分类
252篇 |
出版年
2020年 | 3篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 7篇 |
2014年 | 7篇 |
2013年 | 77篇 |
2011年 | 8篇 |
2010年 | 2篇 |
2009年 | 3篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 3篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 4篇 |
1971年 | 2篇 |
1970年 | 3篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有252条查询结果,搜索用时 0 毫秒
171.
David Fitzgerald 《战略研究杂志》2013,36(6-7):998-1026
Counter-insurgency scholars have long been familiar with Sir Robert Thompson’s classic work Defeating Communist Insurgency, which combined analysis of the insurgencies in Malaya and Vietnam with advice for counter-insurgents that emphasised the drawn-out nature of insurgency and the importance of focusing on population security. While historians have called attention to his role with the British Advisory Mission in South Vietnam and his later criticism of the US counter-insurgency campaign in Vietnam in his various books, less has been written about his subsequent role as a pacification advisor to the Nixon administration. This article explores Thompson’s relationship with Kissinger and Nixon and his views on the war in Vietnam from 1969 to 1974. An examination of Thompson’s thinking on Vietnam in the Nixon years reveals a theorist whose optimism on US prospects there was based on assumptions about elite and public patience for lengthy wars that were ultimately misplaced. 相似文献
172.
David Syrett 《战略研究杂志》2013,36(3):86-106
In 1941, the British instituted a comprehensive system of convoys in the Atlantic. One of the first convoys, OG 71, while sailing between Britain and Gibraltar, was shadowed by German aircraft and attacked by U‐boats. In the ensuing August battle, while no U‐boats were sunk, the British lost, out of a convoy consisting of 22 vessels, two escorts and eight merchant ships. The German victory was not complete owing to the inability of the German aircraft and U‐boats to cooperate successfully as well as the failure of the U‐boats to fight the battle effectively and aggressively. The British also made many mistakes during the defence of Convoy OG 71. The surface escorts made many errors of tactics; as for the British aircraft, owing to an inability to cooperate with the surface forces, they became almost totally ineffective. One bright spot for the British during the battle, however, was communications intelligence. The battle saw the first use of high frequency direction finders and on several occasions skillful use was made of information obtained from enemy radio transmissions. In fact important lessons were learned by the British from such use of communications intelligence which would pave the way for a more effective implementation of such information in future convoy battles. 相似文献
173.
Washington's so-called Maritime Strategy, which sought to apply US naval might against Soviet vulnerabilities on its maritime flanks, came to full fruition during the 1980s. The strategy, which witnessed a major buildup of US naval forces and aggressive exercising in seas proximate to the USSR, also explicitly targeted Moscow”s strategic missile submarines with the aim of pressuring the Kremlin during crises or the early phases of global war. Relying on a variety of interviews and newly declassified documents, the authors assert that the Maritime Strategy represents one of the rare instances in history when intelligence helped lead a nation to completely revise its concept of military operations. 相似文献
174.
In many routing-location models customers located at nodes of a network generate calls for service with known probabilities. The customers that request service in a particular day are served by a single server that performs a service tour visiting these customers. The order of providing service to customers for each potential list of calls is uniquely defined by some a priori fixed basic sequence of all the customers (a priori tour). The problems addressed in this article are to find an optimal home location or an optimal basic sequence for the server so as to minimize the expectation of a criterion. The following criteria are considered: the total waiting time of all the customers, the total length of the tour, the maximal waiting time of a customer, the average traveled length per customer, and the average waiting time per customer. We present polynomial-time algorithms for the location problems. For the routing problems we present lower bounds that can be calculated efficiently (in polynomial time) and used in a branch-and-bound scheme. © 1994 John Wiley & Sons, Inc. 相似文献
175.
176.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014 相似文献
177.
David O. Smith 《The Nonproliferation Review》2014,21(3-4):275-294
Pakistan, the fastest growing nuclear weapon state in the world, has established over the last decade a nuclear management system it holds to be “foolproof.” Despite the explosion of radical groups challenging the writ of the state, it dismisses concerns by critics that its nuclear weapons are not safe and secure as “preposterous” and an attempt to “malign” the state. This article examines Pakistan's nuclear management system in four functional areas: command-and-control, physical security, nuclear surety, and doctrine. It describes what is publicly known in each area, identifies areas of omission and inadequacy in each one, and examines several premises of the nuclear program the author considers to be unfounded. Comparing these deficiencies in Pakistan's nuclear management system to the current problems plaguing the US nuclear management system, the author concludes that complacency and unfounded confidence in the efficacy of such programs, if not addressed and corrected, could lead to a future nuclear catastrophe in South Asia. 相似文献
178.
179.
180.
David P. Herron 《海军后勤学研究》1966,13(2):167-176
The iteration usually necessary for simultaneous determination of minimum-cost order quantity and reorder point in (Q, r) inventory systems may be eliminated by a graphical technique employing dimensionless ratios. This technique is illustrated for three different types of stock-out penalty. 相似文献