首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   700篇
  免费   15篇
  2021年   11篇
  2020年   8篇
  2019年   25篇
  2018年   14篇
  2017年   19篇
  2016年   17篇
  2015年   15篇
  2014年   13篇
  2013年   156篇
  2011年   7篇
  2009年   8篇
  2008年   7篇
  2007年   7篇
  2006年   7篇
  2005年   12篇
  2004年   9篇
  2003年   8篇
  2002年   8篇
  2001年   7篇
  2000年   9篇
  1998年   10篇
  1997年   17篇
  1996年   9篇
  1995年   9篇
  1994年   14篇
  1992年   11篇
  1991年   22篇
  1989年   9篇
  1988年   9篇
  1987年   20篇
  1986年   12篇
  1985年   11篇
  1984年   6篇
  1983年   10篇
  1982年   9篇
  1981年   6篇
  1980年   11篇
  1979年   12篇
  1978年   11篇
  1977年   10篇
  1976年   9篇
  1975年   10篇
  1974年   13篇
  1973年   16篇
  1972年   7篇
  1971年   7篇
  1970年   10篇
  1969年   7篇
  1968年   7篇
  1967年   7篇
排序方式: 共有715条查询结果,搜索用时 15 毫秒
441.
Book review     
Tritium on ice: the dangerous new alliance of nuclear weapons and nuclear power by Kenneth D. Bergeron  相似文献   
442.
443.
444.
445.
446.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   
447.
This study examines the failures of the William J. Clinton and Barack Obama administrations to secure ratification of the Comprehensive Nuclear-Test-Ban Treaty (CTBT). It applies an integrated analytical framework for assessing treaty ratification that builds upon previous research in order to understand why the Clinton administration failed to achieve CTBT ratification in 1999 and why the Obama administration has so far failed to advance the treaty in the Senate. The study concludes that CTBT ratification, despite Obama administration pledges of support, remains highly unlikely. Finally, the study analyzes the common domestic political factors present in both cases and suggests areas for further research.  相似文献   
448.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014  相似文献   
449.
The container relocation problem (CRP) is concerned with emptying a single yard‐bay which contains J containers each following a given pickup order so as to minimize the total number of relocations made during their retrieval process. The CRP can be modeled as a binary integer programming (IP) problem and is known to be NP‐hard. In this work, we focus on an extension of the CRP to the case where containers are both received and retrieved from a single yard‐bay, and call it the dynamic container relocation problem. The arrival (departure) sequences of containers to (from) the yard‐bay is assumed to be known a priori. A binary IP formulation is presented for the problem. Then, we propose three types of heuristic methods: index based heuristics, heuristics using the binary IP formulation, and a beam search heuristic. Computational experiments are performed on an extensive set of randomly generated test instances. Our results show that beam search heuristic is very efficient and performs better than the other heuristic methods.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 101–118, 2014  相似文献   
450.
Abstract

Debates about the future of American seapower in East Asia turn on the argument that American seapower presents a risky and costly luxury that undercuts the cooperative potential of US–China relations. This article asks whether accommodation between China and the United States on the possession and exercise of American seapower in East Asia is possible. Accommodation on this front could significantly lower the risks of unintended escalation and in turn undermine arguments that favour an American retreat from East Asia. The article outlines how accommodation can be achieved on the exercise of American seapower in the region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号