全文获取类型
收费全文 | 234篇 |
免费 | 3篇 |
专业分类
237篇 |
出版年
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 9篇 |
2016年 | 6篇 |
2015年 | 3篇 |
2014年 | 4篇 |
2013年 | 67篇 |
2011年 | 3篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 2篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1980年 | 4篇 |
1979年 | 1篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1974年 | 6篇 |
1973年 | 4篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1970年 | 3篇 |
1969年 | 1篇 |
1968年 | 2篇 |
1967年 | 2篇 |
排序方式: 共有237条查询结果,搜索用时 15 毫秒
131.
James Dingley 《Low Intensity Conflict & Law Enforcement》2005,13(1):1-23
The Belfast Agreement of 1998 was hailed at the time as a breakthrough in conflict resolution both in Northern Ireland and as a model for international emulation. In fact it has turned out to be neither; rather it has been a sad exercise in surrendering to terrorism and the cause of increased sectarian segregation and enmity. The core of the problem lies in the 'constructive ambiguity' at the heart of the Agreement - that is, a form of words that all could sign up to because each party could interpret them differently. This may have enabled everyone to sign up, but also implied they were signing up to different things and therefore were not in agreement. Consequently clever word games and spin by politicians and senior civil servants have created an, in some ways, worse situation, largely because real, substantive issues were ducked. This in turn has its roots in postmodernism, whose baleful influence can be seen throughout not only the Agreement but most government policy over the past 20 odd years. 相似文献
132.
133.
The problem is to protect a set of T identical targets that may come under attack by A identical weapons. The targets are to be defended by D identical interceptors, which must be preallocated to defend selected targets. The attacker is aware of the number of interceptors, but is ignorant of their allocation. The size of the attack is chosen by the attacker from within a specified range. The robust strategies developed in this article do not require the defender to assume an attack size. Rather, the defender chooses a strategy which is good over a wide range of attack sizes, though not necessarily best for any particular attack size. The attacker, knowing that the defender is adopting a robust strategy, chooses the optimal attack strategy for the number of weapons he chooses to expend. The expected number of survivors is a function of the robust defense strategy and optimal attack strategy against this robust defense. 相似文献
134.
This paper presents a branch and bound algorithm for computing optimal replacement policies in a discrete‐time, infinite‐horizon, dynamic programming model of a binary coherent system with n statistically independent components, and then specializes the algorithm to consecutive k‐out‐of‐n systems. The objective is to minimize the long‐run expected average undiscounted cost per period. (Costs arise when the system fails and when failed components are replaced.) An earlier paper established the optimality of following a critical component policy (CCP), i.e., a policy specified by a critical component set and the rule: Replace a component if and only if it is failed and in the critical component set. Computing an optimal CCP is a optimization problem with n binary variables and a nonlinear objective function. Our branch and bound algorithm for solving this problem has memory storage requirement O(n) for consecutive k‐out‐of‐n systems. Extensive computational experiments on such systems involving over 350,000 test problems with n ranging from 10 to 150 find this algorithm to be effective when n ≤ 40 or k is near n. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 288–302, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10017 相似文献
135.
CYLINDRICITYERRORCOMPENSATIONINDIAMONDTURNINGVIAP-INTEGRATORREPETITIVECONTROLLiShengyi(DepartmentofMechantronicsandInstrument... 相似文献
136.
为了对轴承局部损伤进行自动检测与诊断,本文对声发射分析的新方法进行了探讨。损伤的特征量由短时信号处理技术来提取,用模式识别技术进行分析,用散布矩阵进行评价。实验和分析的结果表明这种新方法优于振动分析法。 相似文献
137.
James Manicom 《战略研究杂志》2014,37(3):345-371
AbstractDebates about the future of American seapower in East Asia turn on the argument that American seapower presents a risky and costly luxury that undercuts the cooperative potential of US–China relations. This article asks whether accommodation between China and the United States on the possession and exercise of American seapower in East Asia is possible. Accommodation on this front could significantly lower the risks of unintended escalation and in turn undermine arguments that favour an American retreat from East Asia. The article outlines how accommodation can be achieved on the exercise of American seapower in the region. 相似文献
138.
It is often assumed in the facility location literature that functions of the type øi(xi, y) = βi[(xi-x)2+(yi-y)2]K/2 are twice differentiable. Here we point out that this is true only for certain values of K. Convexity proofs that are independent of the value of K are given. 相似文献
139.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here. 相似文献
140.