全文获取类型
收费全文 | 585篇 |
免费 | 0篇 |
专业分类
585篇 |
出版年
2019年 | 12篇 |
2017年 | 18篇 |
2016年 | 10篇 |
2015年 | 14篇 |
2014年 | 16篇 |
2013年 | 112篇 |
2012年 | 5篇 |
2011年 | 5篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 9篇 |
2004年 | 11篇 |
2003年 | 5篇 |
2002年 | 10篇 |
2001年 | 4篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 15篇 |
1993年 | 14篇 |
1992年 | 8篇 |
1991年 | 14篇 |
1990年 | 8篇 |
1989年 | 14篇 |
1988年 | 14篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 12篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 9篇 |
1978年 | 12篇 |
1976年 | 7篇 |
1975年 | 6篇 |
1974年 | 8篇 |
1973年 | 7篇 |
1972年 | 9篇 |
1971年 | 4篇 |
1970年 | 9篇 |
1969年 | 6篇 |
1968年 | 4篇 |
1967年 | 6篇 |
排序方式: 共有585条查询结果,搜索用时 15 毫秒
291.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
292.
一、美国陆军随军牧师制度的早期形成与发展(一)随军牧师制度溯源如要探寻美国陆军随军牧师制度的源头,可以追溯到悠远的历史深处。每当出现骚乱、危急和恐怖的时刻,人类总是寄希望于宗教和宗教人士,以获得安慰。战争时期也不例外。在发生战争冲突的时期,无论是古代社会,还是现代社会,人们都会转而求助于宗教。公众总是期望把宗教的抚慰同样传递给那些在战场上服役的士兵们。从人们已知的有文字记载之前的社会开始,祭司和其他宗教人士或许就在为战争的胜利而祈求上帝或众神的保佑了。《旧约》中就常提及随军参战的祭司(priests)。在《摩西五… 相似文献
293.
We examine the behavior of a manufacturer and a retailer in a decentralized supply chain under price‐dependent, stochastic demand. We model a retail fixed markup (RFM) policy, which can arise as a form of vertically restrictive pricing in a supply chain, and we examine its effect on supply chain performance. We prove the existence of the optimal pricing and replenishment policies when demand has a linear additive form and the distribution of the uncertainty component has a nondecreasing failure rate. We numerically compare the relative performance of RFM to a price‐only contract and we find that RFM results in greater profit for the supply chain than the price‐only contract in a variety of scenarios. We find that RFM can lead to Pareto‐improving solutions where both the supplier and the retailer earn more profit than under a price‐only contract. Finally, we compare RFM to a buyback contract and explore the implications of allowing the fixed markup parameter to be endogenous to the model. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006. 相似文献
294.
We consider the problem of maximizing the number of on‐time jobs on two uniform parallel machines. We show that a straightforward extension of an algorithm developed for the simpler two identical parallel machines problem yields a heuristic with a worst‐case ratio bound of at least . We then show that the infusion of a “look ahead” feature into the aforementioned algorithm results in a heuristic with the tight worst‐case ratio bound of , which, to our knowledge, is the tightest worst‐case ratio bound available for the problem. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
295.
Consider the problem of scheduling two products on a single machine or through two machines in series when demand is constant and there is a changeover cost between runs of different products on the same machine. As well as setting batch sizes, it is assumed that the production scheduler can choose the production rate for each product, provided an upper bound is not exceeded. This is equivalent to permitting distributed inserted idle time over the production run. It is shown that characteristic of the optimum schedule is that there is no idle time concentrated between runs; it is all distributed over the run. If the inventory charge is based on average inventory then one product is always produced at maximum rate on the bottleneck stage; however, if there is an inventory constraint based on maximum inventory then in the single-stage case it can occur that neither product is produced at maximum rate. 相似文献
296.
297.
Dr. Ir. F.J. Sluiman 《海军后勤学研究》2017,64(3):225-248
A transit vessel traffic scheduling algorithm has been developed to limit the negative effects on cargo volume throughput in two‐way waterways where separation distances between transiting vessels must be maintained and passage restrictions may hold. It runs in time that is polynomial in the number of ships involved in the computation and finds schedules which increase the utilization of waterways. Three examples illustrate its use. The first example is situated in the Sunda Strait where the algorithm is used to enhance the safety of merchant shipping against a terrorist threat. It illustrates important features of the algorithm and demonstrates how it can be used with cross traffic. The second example is situated in the Strait of Istanbul and offers a comparison between the developed algorithm and the transit vessel scheduling algorithm of Ulusçu et al., J Navig 62 (2009), 59–77. This was done using a plausible model of the Strait of Istanbul. The third and last example shows how the algorithm can be used to schedule transit vessel traffic in two‐way waterways with junctions. This feature is especially useful in congested waters with a high risk of collisions like the Inland Sea of Japan. An extreme test case proves that the developed algorithm is a practical algorithm ready for such use. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 225–248, 2017 相似文献
298.
Since 2012, China’s assertion of its sovereignty claim to the contested Senkaku/Diaoyu Islands has significantly raised the risk of a potentially escalatory political-military crisis with Japan. As circumstances worsen, Japanese Prime Minister Shinzo Abe has championed major institutional reforms aimed at centralizing Japanese security policy decision-making and vastly improving crisis management. This article assesses these reforms’ significance for ameliorating Japan’s long-standing internal crisis management weaknesses, and enhancing its ability to communicate with Beijing promptly under challenging conditions. While significant issues remain, recent developments – especially the establishment of Japan’s first-ever National Security Council – demonstrate significant progress. Bilaterally, however, important firebreaks remain conspicuously absent. 相似文献
299.
Observational data are prevalent in many fields of research, and it is desirable to use this data to make causal inferences. Because this data is nonrandom, additional assumptions are needed in order to construct unbiased estimators for causal effects. The standard assumption is strong ignorability, though it is often impossible to achieve the level of covariate balance that it requires. As such, researchers often settle for lesser balance levels within their datasets. However, these balance levels are generally insufficient to guarantee an unbiased estimate of the treatment effect without further assumptions. This article presents several extensions to the strong ignorability assumption that address this issue. Under these additional assumptions, specific levels of covariate balance are both necessary and sufficient for the treatment effect estimate to be unbiased. There is a trade‐off, however: as balance decreases, stronger assumptions are required to guarantee estimator unbiasedness. These results unify parametric and nonparametric adjustment methods for causal inference and are actualized by the Balance Optimization Subset Selection framework, which identifies the best level of balance that can be achieved within a dataset. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 323–344, 2017 相似文献
300.
Lee J. M. Seymour 《Small Wars & Insurgencies》2017,28(4-5):817-838
AbstractHow do contemporary secessionist movements gain international recognition of their claims to self-determination? I argue that international recognition is forthcoming when a sufficient number of states believe a claim to self-determination ought to be accepted. That is, states recognize claims to self-determination when they perceive them to be legitimate. To convince outsiders of the legitimacy of their claims, separatist movements invoke resonant norms and symbols in a moral economy that structures decision-making. I contrast this argument with prevailing explanations of recognition dynamics. To illustrate the argument, I examine the diplomacy surrounding Kosovo’s independence bid and unilateral secession. 相似文献