首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   886篇
  免费   19篇
  2021年   11篇
  2019年   18篇
  2018年   8篇
  2017年   19篇
  2016年   17篇
  2015年   16篇
  2014年   19篇
  2013年   165篇
  2012年   8篇
  2010年   9篇
  2009年   14篇
  2007年   16篇
  2006年   9篇
  2005年   10篇
  2004年   13篇
  2003年   11篇
  2002年   14篇
  2000年   8篇
  1999年   9篇
  1998年   17篇
  1997年   15篇
  1996年   13篇
  1995年   7篇
  1994年   21篇
  1993年   23篇
  1992年   16篇
  1991年   21篇
  1990年   15篇
  1989年   28篇
  1988年   25篇
  1987年   23篇
  1986年   26篇
  1985年   19篇
  1984年   11篇
  1983年   10篇
  1982年   15篇
  1981年   14篇
  1980年   11篇
  1979年   16篇
  1978年   18篇
  1977年   7篇
  1976年   11篇
  1975年   9篇
  1974年   15篇
  1973年   10篇
  1972年   12篇
  1971年   11篇
  1970年   14篇
  1969年   10篇
  1967年   9篇
排序方式: 共有905条查询结果,搜索用时 15 毫秒
81.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   
82.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
83.
The damaging economic effects of the debt crises on Africa in the late 1980s encouraged considerable research on the determinants of external debt in developing economies. Although sub-Saharan Africa's (SSA) debt was cut by two-thirds by 2008, through two debt relief programmes, debt in the region has since been rising at an increasingly rapid pace. This study provides an empirical analysis of the determinants of external debt in SSA over the period 1960–2016, using dynamic panel methods. It also considers two potentially important factors that have received relatively little attention. One is military spending, rarely considered, despite a number of well-publicised scandals over the procurement of unnecessary and expensive high-tech weapons systems. A second, is the possibility that the countries studied have been involved in conflict. The empirical results point to a positive impact of military spending on external debt, but with some evidence of heterogeneity across the countries. Furthermore, findings indicate that the positive effect of military expenditure on debt becomes more marked in countries that have been affected by conflict. These results imply that policies to improve security and reduce military spending could be beneficial in reducing external debt and, potentially, improving economic performance in the region.  相似文献   
84.
85.
An approximation for analyzing transient and nonstationary two-priority non-preemptive queueing systems is presented. This system has a three-dimensional state space, and through use of state-space partitioning in conjunction with use of conditional surrogate distributions with constant parameters an approximation is designed. Regardless of system capacity K, the approximation requires the numerical solution of only ten differential equations, compared to the K2 + K+1 Kolmogorov-forward equations required for the classic solution. Time-dependent approximations of the mean number of entities of type i and of the probability of a type-i entity being in service are obtained. Empirical test results over a wide range of systems indicate the approximation is quite accurate.  相似文献   
86.
We study the (s,S) inventory system in which the server takes a rest when the level of the inventory is zero. The demands are assumed to occur for one unit at a time. The interoccurrence times between successive demands, the lead times, and the rest times are assumed to follow general distributions which are mutually independent. Using renewal and convolution techniques we obtain the state transition probabilities.  相似文献   
87.
A system of two parallel queues where the arrivals from a single stream of customers join the shorter queue is considered. Arrivals form a homogeneous Poisson stream and the service times in each of the two queues are independent exponential variates. By treating one of the queues as bounded, the steady-state probability vector for the system can be expressed in a modified matrix-geometric form and can be computed efficiently. Computational procedures for the sojourn time distribution and characteristics of the departure stream are developed. Some numerical results are presented, and based on these results an efficient approximation scheme for the model is developed which can be readily extended to systems with more than two parallel queues.  相似文献   
88.
89.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
90.
We introduce and develop models for a physical goods storage system based on the 15‐puzzle, a classic children's game in which 15 numbered tiles slide within a 4 × 4 grid. The objective of the game is to arrange the tiles in numerical sequence, starting from a random arrangement. For our purposes, the tiles represent totes, pallets, or even containers that must be stored very densely, and the objective is to maneuver items to an input–output point for retrieval or processing. We develop analytical results for storage configurations having a single empty location (as in the game) and experimental results for configurations with multiple empty locations. Designs with many empty locations can be made to form aisles, allowing us to compare puzzle‐based designs with traditional aisle‐based designs found in warehousing systems. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号