全文获取类型
收费全文 | 241篇 |
免费 | 10篇 |
专业分类
251篇 |
出版年
2020年 | 3篇 |
2019年 | 14篇 |
2018年 | 9篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 7篇 |
2014年 | 7篇 |
2013年 | 75篇 |
2011年 | 8篇 |
2010年 | 2篇 |
2009年 | 3篇 |
2008年 | 4篇 |
2007年 | 7篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 3篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 4篇 |
1971年 | 2篇 |
1970年 | 3篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有251条查询结果,搜索用时 0 毫秒
21.
F. G. Hoffman John Bew David French Nicolas Lewkowicz Thomas Rid Paul Staniland 《战略研究杂志》2013,36(5):777-795
22.
David J. Karl 《战略研究杂志》2013,36(4):619-641
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies. 相似文献
23.
24.
25.
David Scott 《战略研究杂志》2013,36(4):484-511
India has increasingly high aspirations in the Indian Ocean, as enunciated by politicians, naval figures and the wider elite. These aspirations, its strategic discourse, are of pre-eminence and leadership. India's maritime strategy for such a self-confessed diplomatic, constabulary and benign role is primarily naval-focused; a sixfold strategy of increasing its naval spending, strengthening its infrastructure, increasing its naval capabilities, active maritime diplomacy, exercising in the Indian Ocean and keeping open the choke points. Through such strategy, and soft balancing with the United States, India hopes to secure its own position against a perceived growing Chinese challenge in the Indian Ocean. 相似文献
26.
27.
David Betz 《Small Wars & Insurgencies》2013,24(4):510-540
This paper looks at the virtual dimension of contemporary insurgency and counterinsurgency. It argues that the West is faltering in the ‘War of Ideas’ with global Jihad for the main reason that the messages that we wish to convey lack narrative coherence. This is a result of the fact that we misapprehend the nature of the virtual operational environment whereas our opponents possess an intuitive grasp of it as a result of which their structure and method of operations are better adapted and more effective than our own. There is no reason, beyond inertia, that this should remain the case. 相似文献
28.
Many Markov chain models have very large state spaces, making the computation of stationary probabilities very difficult. Often the structure and numerical properties of the Markov chain allows for more efficient computation through state aggregation and disaggregation. In this article we develop an efficient exact single pass aggregation/disaggregation algorithm which exploits structural properties of large finite irreducible mandatory set decomposable Markov chains. The required property of being of mandatory set decomposable structure is a generalization of several other Markov chain structures for which exact aggregation/disaggregation algorithms exist. © 1995 John Wiley & Sons, Inc. 相似文献
29.
Kevin D. McCranie Marcus Faulkner David French Gregory A. Daddis James Gow Austin Long 《战略研究杂志》2013,36(2):281-293
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X. Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3. Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1. Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X. Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4. Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115. T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8. 相似文献
30.
David Jordan 《Small Wars & Insurgencies》2013,24(3):89-114
In 1945, the Dutch government was not in a position to re‐impose its control upon its colonies in the East Indies after the surrender of Japan. In their stead, Allied forces were to take control of the islands, disarm Japanese troops and to maintain stability until the Dutch could return. The declaration of an independent Indonesia by nationalists left the British and Indian troops sent to re‐occupy the islands facing a complex situation. Increasing violence culminated in the murder of Brigadier A.W. S. Mallaby in Surabaya, which was followed by a major action by British forces to regain control. In extremely difficult circumstances, the British troops conducted a successful operation which held many lessons for the conduct of counter‐insurgency operations in the years that followed. 相似文献