首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   296篇
  免费   4篇
  300篇
  2021年   5篇
  2019年   4篇
  2018年   2篇
  2017年   5篇
  2016年   6篇
  2015年   4篇
  2014年   3篇
  2013年   77篇
  2011年   2篇
  2010年   2篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   7篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   8篇
  1987年   6篇
  1986年   8篇
  1985年   7篇
  1983年   3篇
  1982年   9篇
  1981年   1篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   5篇
  1976年   2篇
  1975年   5篇
  1974年   5篇
  1973年   8篇
  1972年   6篇
  1971年   8篇
  1970年   5篇
  1969年   5篇
  1968年   6篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有300条查询结果,搜索用时 15 毫秒
51.
52.
53.
Book reviews     
John Lawrence Tone, The Fatal Knot: The Guerrilla War in Navarre and the Defeat of Napoleon in Spain. Chapel Hill and London; The University of North Carolina Press 1994. Pp.vii + 239, 1 map, biblio., index. $34.95 (cloth). ISBN 0–8078–2169–1.

Robert Holland (ed), Emergencies and Disorder in the European Empires after 1945. London: Frank Cass, 1994. Pp.x + 256; index. £32 (cloth); £15 (paper). ISBN 0–7146–4516–8 and 4109 X

Deborah L. Norden, Military Rebellion in Argentina: Between Coups and Consolidation. Lincoln, NE: University of Nebraska Press, 1996. Pp.242, index, $35/$17.50 (paper). ISBN 0–8032–8369–5.

William M. Minter, Apartheid's Contras: An Inquiry into the Roots of War in Angola and Mozambique. London and Atlantic Highlands, NJ: Zed Books Ltd; Johannesburg: Witwatersrand University Press, 1994. Pp. xii +308, 3 maps, biblio., index. $69.95/£39.95 (cloth); $29.95/£16.95(paper). ISBN 1–85649–266–4 and 266–4.  相似文献   
54.
Let p(⩾0.5) denote the probability that team A beats B in a single game. The series continues until either A or B wins n games. Assuming that these games are independent replications, we study some features of the distribution of Xn, the number of games played in the series. It is shown that Xn is unimodal, has an IFRA distribution, and is stochastically decreasing in p. Close approximations to its mode, mean, and variance are given. Finally, it is shown that the maximum-likelihood estimator of p based on Xn is unique.  相似文献   
55.
This article details several procedures for using path control variates to improve the accuracy of simulation-based point and confidence-interval estimators of the mean completion time of a stochastic activity network (SAN). Because each path control variate is the duration of the corresponding directed path in the network from the source to the sink, the vector of selected path controls has both a known mean and a known covariance matrix. This information is incorporated into estimation procedures for both normal and nonnormal responses. To evaluate the performance of these procedures experimentally, we examine the bias, variance, and mean square error of the controlled point estimators as well as the average half-length and coverage probability of the corresponding confidence-interval estimators for a set of SANs in which the following characteristics are systematically varied: (a) the size of the network (number of nodes and arcs); (b) the topology of the network; (c) the percentage of activities with exponentially distributed durations; and (d) the relative dominance of the critical path. The experimental results show that although large improvements in accuracy can be achieved with some of these procedures, the confidence-interval estimators for normal responses may suffer serious loss of coverage probability in some applications.  相似文献   
56.
57.
Book reviews     
Red Banner: the Soviet Military System in Peace and War. By Christopher Donnelly. Jane's Information Group, Coulsdon, UK (1988), 288 pp., £35.00

Images of T. E. Lawrence. By S. E. Tabachnick and C. Matheson. Jonathan Cape, London (1988); The Letters of T. E. Lawrence. Edited by Malcolm Brown. Dent, London (1988); T. E. Lawrence. By J. Wilson. National Portrait Gallery Publications, London (1988); Lawrence and the Arab Revolts. By D. Nicolle. Osprey, London (1989)

Liddell Hart and the Weight of History. By John Mearsheimer. Brassey's, London (1989), £15.95

Science and Mythology in the Making of Defence Policy. Edited by Margaret Blunden and Owen Greene. Brassey's, London (1989), £27.50/$44.00

Warfare in the Twentieth Century. Edited by Colin McInnes and G. D. Sheffield. Unwin Hyman, London (1988), 239 pp., £25.00  相似文献   
58.
Building on prior work on optimal replacement of aging aircraft, this paper presents three methodologies to evaluate prospective aviation Service Life Extension Programs (SLEPs) and applies these methodologies to US Navy F/A-18E/F data. While considerable uncertainty remains as to the values of key parameters (e.g. the cost of F/A-18E/F SLEPs), the preponderance of the evidence available at this juncture favors undertaking SLEPs on F/A-18E/Fs rather than replacing them with new Joint Strike Fighters.  相似文献   
59.
60.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号