首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   94篇
  免费   4篇
  2021年   2篇
  2020年   3篇
  2019年   14篇
  2018年   8篇
  2017年   3篇
  2016年   6篇
  2015年   4篇
  2014年   5篇
  2013年   25篇
  2012年   2篇
  2010年   5篇
  2009年   3篇
  2008年   2篇
  2007年   3篇
  2006年   1篇
  2005年   3篇
  2004年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1978年   1篇
排序方式: 共有98条查询结果,搜索用时 667 毫秒
61.
This paper investigates what motivates young people to volunteer for peace-keeping or peace-enforcing missions and how their motives change between pre- and post-deployment. Data include information about social and military background, and motives for more than 600 soldiers, 444 of whom answered the survey both before and after deployment. Soldiers are deployed to different missions under the same circumstances. To conceptualize motives among soldiers, we use factor analysis and find three factors: challenge, self-benefit, and fidelity. Challenge represents an occupational orientation; fidelity, an institutional orientation; and self-benefit, a desire for adventure. Exploiting the within-subject design of our data, we find that pre- and post-deployment motives vary significantly according to the type of mission and soldiers’ previous experiences (first-timers or experienced soldiers). Our results suggest that after the mission, peace-keepers are generally more disappointed than peace-enforcers. Our results also show that self-benefit motives are important for younger soldiers with only a high school education, and that this group usually serves as peace-enforcers during their gap year.  相似文献   
62.
We investigate the problem in which an agent has to find an object that moves between two locations according to a discrete Markov process (Pollock, Operat Res 18 (1970) 883–903). At every period, the agent has three options: searching left, searching right, and waiting. We assume that waiting is costless whereas searching is costly. Moreover, when the agent searches the location that contains the object, he finds it with probability 1 (i.e. there is no overlooking). Waiting can be useful because it could induce a more favorable probability distribution over the two locations next period. We find an essentially unique (nearly) optimal strategy, and prove that it is characterized by two thresholds (as conjectured by Weber, J Appl Probab 23 (1986) 708–717). We show, moreover, that it can never be optimal to search the location with the lower probability of containing the object. The latter result is far from obvious and is in clear contrast with the example in Ross (1983) for the model without waiting. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
63.
We study optimal pricing for tandem queueing systems with finite buffers. The service provider dynamically quotes prices to incoming price sensitive customers to maximize the long-run average revenue. We present a Markov decision process model for the optimization problem. For systems with two stations, general-sized buffers, and two or more prices, we describe the structure of the optimal dynamic pricing policy and develop tailored policy iteration algorithms to find an optimal pricing policy. For systems with two stations but no intermediate buffer, we characterize conditions under which quoting either a high or a low price to all customers is optimal and provide an easy-to-implement algorithm to solve the problem. Numerical experiments are conducted to compare the developed algorithms with the regular policy iteration algorithm. The work also discusses possible extensions of the obtained results to both three-station systems and two-station systems with price and congestion sensitive customers using numerical analysis.  相似文献   
64.
The aim of this article is to evaluate how French Major Conventional Weapons (MCW) exports impact on the conflict intensity of recipient countries. The recent increase in French arms exports seems to contradict the French political discourse on the promotion of regional stability. We run zero-inflated ordered probit model in order to analyze the role of the arms trade on the intensity of civil conflicts in 144 countries from 1992 to 2014, using SIPRI and UCDP/PRIO data. Our results suggest that French MCW exports tended not to exacerbate intrastate conflicts during this period. This finding is robust to changes in the empirical framework. We propose two lines of explanations: France seems to be prone to choosing partners that respect human rights and selling more ‘defense-oriented’ MCW than the rest of the world.  相似文献   
65.
The structural changes inside the French innovation system have impacted the role of defense firms since the late 1980s. Major changes have affected the defense budget and public R&D funding system in particular. The aim of this article is to understand French defense firms’ repositioning within the National Innovation System (NIS) based on an analysis of their R&D behavior over a long period of time (1987–2010). We show that French defense firms remain major players in the NIS and faced up to these major changes by adapting the funding of their R&D and their research priorities and rolling out new innovation capabilities. Additionally, they developed new innovation models to take advantage of new collaborative partnerships developed for civil and military markets.  相似文献   
66.
The decision to employ force abroad is often a contentious political decision, where partisanship plays a crucial role. Prior to military intervention, political parties usually make their ideologically distinctive preferences clear and seek to implement them once in power. What remains unclear, however, is how ideology affects the decision to use military force. This article contends that alliance and electoral calculations constrain the ability of political parties to implement their ideological preferences with regards to the use of force. It examines a “most likely” case for the partisan theory of military intervention, namely Canada’s refusal to take part in the invasion of Iraq and its decision to commit forces to the war against the Islamic State. It finds that only in combination with alliance and electoral calculations does executive ideology offer valuable insights into Canada’s military support to U.S.-led coalition operations, which contributes to our understanding of allied decision-making.  相似文献   
67.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
68.
Strategic studies deals intimately with the topic of power. Most scholars in the discipline work with a concept of power as an adversarial zero-sum competition. This is natural and necessary. However, other conceptions of power developed within political science and sociology could enrich strategic studies. Approaching two typical, traditional tasks of strategy – alliance building and war-fighting – this article demonstrates the heuristic mileage of theories of collective power. In particular, we can shed new light on the post-Cold War transformation of NATO as well as state-building as a strategy in counter-insurgencies with new ideas of power. Broadening the palette of theories of power is thus valuable if strategic studies is to prosper as an independent field of study.  相似文献   
69.
Over the last two decades, a number of countries (most notably China, Russia and Iran) have been developing so-called anti-access and area denial (A2/AD) capabilities, such as ballistic and cruise missiles, offensive cyber-weapons, electronic warfare, etc. The development of A2/AD capabilities by non-Western countries undermines the foundations of US power projection and global military-technological supremacy. In order to overcome, or at least mitigate, the impending A2/AD challenge, the US Department of Defense (DoD) began to roll out its so-called ‘third’ offset strategy in late 2014. The strategy aims to bring about innovative operational concepts and technologies and spur new doctrinal and organisational debates. This article assesses which of the operational concepts and capabilities informing current US discussions on offset may be relevant in the context of the A2/AD challenges Europeans face on their eastern ‘flank‘ and in their ‘extended southern neighbourhood‘, and which may not. Europeans must grapple with the same conceptual puzzle as the US: how to strike the right balance between defeating A2/AD capabilities and hedging against them, i.e. through alternative strategies that are less dependent on unhindered access and resort to asymmetric forms of warfare. However, they must take into account the geographical features of their eastern flank and extended southern neighbourhood, the level of technological maturity of their challengers, and their own military-technological prowess and political limitations. This suggests a somewhat different approach to offsetting A2/AD than that adopted by the US.  相似文献   
70.
Suppose that failure times are available from a random sample of N systems of a given, fixed design with components which have i.i.d. lifetimes distributed according to a common distribution F. The inverse problem of estimating F from data on observed system lifetimes is considered. Using the known relationship between the system and component lifetime distributions via signature and domination theory, the nonparametric maximum likelihood estimator N(t) of the component survival function (t) is identified and shown to be accessible numerically in any application of interest. The asymptotic distribution of N(t) is also identified, facilitating the construction of approximate confidence intervals for (t) for N sufficiently large. Simulation results for samples of size N = 50 and N = 100 for a collection of five parametric lifetime models demonstrate the utility of the recommended estimator. Possible extensions beyond the i.i.d. framework are discussed in the concluding section. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号