全文获取类型
收费全文 | 385篇 |
免费 | 7篇 |
出版年
2021年 | 7篇 |
2019年 | 11篇 |
2018年 | 4篇 |
2017年 | 5篇 |
2016年 | 7篇 |
2015年 | 2篇 |
2014年 | 8篇 |
2013年 | 55篇 |
2012年 | 3篇 |
2009年 | 4篇 |
2007年 | 12篇 |
2005年 | 2篇 |
2004年 | 5篇 |
2003年 | 7篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 9篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 11篇 |
1992年 | 7篇 |
1991年 | 10篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 14篇 |
1987年 | 7篇 |
1986年 | 14篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 10篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 10篇 |
1978年 | 8篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 4篇 |
1974年 | 9篇 |
1973年 | 5篇 |
1972年 | 3篇 |
1971年 | 7篇 |
1970年 | 6篇 |
1969年 | 5篇 |
1967年 | 6篇 |
1948年 | 4篇 |
排序方式: 共有392条查询结果,搜索用时 15 毫秒
131.
We consider the problem of efficiently scheduling deliveries by an uncapacitated courier from a central location under online arrivals. We consider both adversary‐controlled and Poisson arrival processes. In the adversarial setting we provide a randomized (3βΔ/2δ ? 1) ‐competitive algorithm, where β is the approximation ratio of the traveling salesman problem, δ is the minimum distance between the central location and any customer, and Δ is the length of the optimal traveling salesman tour overall customer locations and the central location. We provide instances showing that this analysis is tight. We also prove a 1 + 0.271Δ/δ lower‐bound on the competitive ratio of any algorithm in this setting. In the Poisson setting, we relax our assumption of deterministic travel times by assuming that travel times are distributed with a mean equal to the excursion length. We prove that optimal policies in this setting follow a threshold structure and describe this structure. For the half‐line metric space we bound the performance of the randomized algorithm in the Poisson setting, and show through numerical experiments that the performance of the algorithm is often much better than this bound. 相似文献
132.
In most western countries, there is a strong incentive for defence department budget-holders to expend all of the funds they are authorized to spend in a fiscal year. In this paper, we question whether this emphasis makes sense. We develop a model of a defence department’s operating expenditure assuming a fixed level of funding for a year and uncertain costs. The results of the model suggest that the incentive for departmental managers to expend all authorized funds is inefficient. We explore the implications of the model for the Department of National Defence (DND) in Canada in light of the recent criticism of DND lapsed funding by the Auditor-General of Canada. 相似文献
133.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally. 相似文献
134.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion. 相似文献
135.
136.
Irvin R. Lindemuth 《The Nonproliferation Review》2013,20(3):483-507
Post-Cold War “lab-to-lab” collaborations on unclassified scientific issues between U.S. and Russian nuclear weapons laboratories set the stage for bilateral cooperation in materials control and other nuclear areas. They also became the major element in a cooperative process initiated by a Presidential Decision Directive to ensure Russia's compliance with the Comprehensive Nuclear-Test-Ban Treaty. These collaborations have always been highly favored by leaders of the Russian nuclear weapons complex—the same leaders who oversee Russia's participation in various government-to-government programs. This article reviews these collaborations and examines the possibility that U.S. rebuffs of Russian proposals and the U.S. failure to keep promises of expanded collaboration could contribute to Russia's reluctance in major programs and even lead to a return to nuclear testing by Russia. The author argues that a renewed U.S. commitment to the process should be an immediate goal of the Obama administration and is an essential step in re-engaging Russia to solve the nuclear problems remaining from the Cold War. Steps for doing so are recommended. 相似文献
137.
138.
139.
Michael Barletta Clay Bowen Kimber Cramer R. Adam Moody 《The Nonproliferation Review》2013,20(2):132-145
The material in this overview is drawn from selected abstracts that appear in the Center for Nonproliferation Studies’ nuclear and missile databases. Transactions of nuclear and missile technologies, parts, and materials are listed according o the recipient country. Other developments are listed according to the country where the event or development took place. 相似文献
140.
Strategic terrorism: The framework and its fallacies 总被引:1,自引:0,他引:1
Dr Peter R. Neumann 《战略研究杂志》2013,36(4):571-595
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power. 相似文献