首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   590篇
  免费   15篇
  605篇
  2020年   5篇
  2019年   14篇
  2018年   7篇
  2017年   20篇
  2016年   11篇
  2015年   15篇
  2014年   17篇
  2013年   121篇
  2012年   5篇
  2011年   5篇
  2010年   8篇
  2009年   11篇
  2007年   7篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   5篇
  2002年   10篇
  2000年   7篇
  1999年   6篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1994年   15篇
  1993年   14篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   14篇
  1988年   15篇
  1987年   15篇
  1986年   16篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   9篇
  1971年   4篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有605条查询结果,搜索用时 0 毫秒
91.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
92.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
93.
94.
95.
A large population of independent identical units having finite mean lifetime T is observed. From the history A(y) of cumulative arrivals and the history B(y) of cumulative removals in the interval 0 ≦ y ≦ τ one must predict at time τ the desired T . Two lifetime predictors X(τ) and Y(τ) and related simple predictors obtained from A(y) and B(y) are shown to converge to T with a rate of convergence dependent on the structure of the failure rate function of the units. This dependence is studied theoretically and numerically.  相似文献   
96.
The purpose of this article is to formulate the multi-commodity maximal flow problem into a node-arc form and to show that when decomposition is applied to this form the resulting master and subproblems become precisely those described by Ford & Fulkerson [3] using the arc-chain formulation. A generalization to the problem is then considered which can potentially speed its convergence.  相似文献   
97.
This paper presents a linear programming model of a fleet of vessels which is required to transport quantities of cargo, such as coal, iron ore, limestone, and salt from certain producing ports to specific destination ports. This model has been implemented and is currently being used both for planning purposes and as an aid in scheduling the trips to be made by each vessel.  相似文献   
98.
The reformulation‐linearization technique (RLT) is a methodology for constructing tight linear programming relaxations of mixed discrete problems. A key construct is the multiplication of “product factors” of the discrete variables with problem constraints to form polynomial restrictions, which are subsequently linearized. For special problem forms, the structure of these linearized constraints tends to suggest that certain classes may be more beneficial than others. We examine the usefulness of subsets of constraints for a family of 0–1 quadratic multidimensional knapsack programs and perform extensive computational tests on a classical special case known as the 0–1 quadratic knapsack problem. We consider RLT forms both with and without these inequalities, and their comparisons with linearizations derived from published methods. Interestingly, the computational results depend in part upon the commercial software used. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
99.
Previous research on African military spending suggests the existence of civil strife as the best predictor of high levels of military spending. However, little is known about why some African nations maintain strong ‘auxiliary’ or paramilitary organizations while others do not. This study finds that the presence of civil or interstate war does not strengthen reserve or irregular forces. Civilian governments promote strong paramilitary organizations to counter any threat the regular military might pose to regime survivability as a form of clientelist politics.  相似文献   
100.
We explore the impact of strategic assessment efforts on military organizations at war. To do so, we construct a model to explore the impact of a principal’s choice among imperfect performance metrics for a military operation. In doing so, the principal must consider both the incentivizing and informational properties of the metric. We show the conditions under which uncertainty regarding the nature of the agent, as well as uncertainty regarding the operational environment, drives a metric choice that induces pathological behavior from the agent. More specifically, a poor metric choice can create an overly optimistic assessment and end up prolonging the conflict. We illustrate the model’s insights in the cases of World War II and the Vietnam War.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号