全文获取类型
收费全文 | 666篇 |
免费 | 11篇 |
出版年
2021年 | 5篇 |
2019年 | 14篇 |
2018年 | 16篇 |
2017年 | 15篇 |
2016年 | 17篇 |
2015年 | 11篇 |
2013年 | 159篇 |
2011年 | 5篇 |
2010年 | 8篇 |
2009年 | 5篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 15篇 |
2004年 | 8篇 |
2003年 | 9篇 |
2002年 | 7篇 |
2000年 | 11篇 |
1999年 | 9篇 |
1998年 | 6篇 |
1997年 | 13篇 |
1996年 | 14篇 |
1995年 | 6篇 |
1994年 | 13篇 |
1993年 | 11篇 |
1992年 | 10篇 |
1991年 | 16篇 |
1990年 | 10篇 |
1989年 | 14篇 |
1988年 | 7篇 |
1987年 | 17篇 |
1986年 | 12篇 |
1985年 | 12篇 |
1984年 | 11篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 9篇 |
1978年 | 11篇 |
1977年 | 9篇 |
1976年 | 11篇 |
1975年 | 8篇 |
1974年 | 14篇 |
1973年 | 8篇 |
1972年 | 11篇 |
1971年 | 15篇 |
1970年 | 5篇 |
1969年 | 8篇 |
1968年 | 7篇 |
1967年 | 4篇 |
排序方式: 共有677条查询结果,搜索用时 15 毫秒
211.
John Ishiyama Felipe Carlos Betancourt Higareda Amalia Pulido Bernardo Almaraz 《Civil Wars》2018,20(1):1-23
What is the relationship between drug violence and political attitudes? In this article, we test the relationship between violence and trust using both individual and municipality data for Mexico from 2006 to 12. Using multilevel analysis, we find no support for the thesis that individual experiences with criminal violence drives trust, nor do we find a relationship between levels of violence at the municipio level and trust. However, we do find that perceived threats to individual security leads to less social and institutional trust, but this is independent of personal experience and whether the individual resides in violent communities. 相似文献
212.
Marjolein B.A. van Asselt 《Contemporary Security Policy》2018,39(4):590-600
While security points to a deliberate harming of humans and/or the environment, safety refers to unintended damage. In this view point, I will analyse how the distinction between safety and security matters in the practice of accident investigation and I will argue that the division between the fields is problematic for the assessment of security-related safety risks. Drawing on the case of the our accident investigation into the downing of flight MH17 above Ukraine in 2014, I highlight key dilemmas the Dutch Safety Board dealt with. 相似文献
213.
This work continues to develop the 'netwar' concept that the authors introduced in 1993 and have expanded upon in their various RAND and other writings ever since. Deeper understanding of the nature, strengths and vulnerabilities of networks will prove useful in combating terrorism and transnational crime, but also in understanding militant social activism, both of the violently disruptive sort and that which aims at fostering the rise of a global civil society. This essay also assesses recent US performance in the terror war, and concludes by raising concerns over the possible rise of a new form of network-based fascism. 相似文献
214.
John E. Angus 《海军后勤学研究》1987,34(6):845-851
The confidence coefficient of a two-sided confidence interval for the binomial parameter p is the infimum of the coverage probability of the interval as p ranges between 0 and 1. The confidence coefficients for five different approximate confidence intervals are computed and compared to the confidence coefficient for the two-sided Clopper-Pearson confidence interval. Pratt's approximation method [10] yields virtually the same confidence coefficients as the Clopper-Pearson interval, and is easily computed without resorting to interative methods. 相似文献
215.
216.
217.
Richard A. Aborisade 《African Security Review》2018,27(2):177-190
This article focuses on the systemic failures of the Nigerian police force to unravel the mysteries surrounding homicides in the country, along with the security, social and political implications of the ongoing trend. The article draws on documented pieces of evidence of high-profile murders, along with the causes of the upsurge in murder incidences and the inhibitive factors relating to the investigative procedures of the police. The suitability of the theory of subaltern realism and the concept of third-world security predicaments in explaining the peculiarities of Nigeria’s internal security challenges is examined, along with the problems of the legitimacy of political regimes and weak borders. There is a need for the National Assembly of Nigeria to exercise its constituted powers in reawakening and supervising investigations into dormant cases of murder through its committees on police affairs, public safety and national security. The police should check its organisational failures, which may be related to using the wrong investigative approaches, low levels of information, limited resources, corrupt practices, and pressure to obtain quick results. 相似文献
218.
AbstractThe utilization of health care services by veterans has received much attention in recent years. However, the impact of the large array of factors affecting the veterans’ demand for health care services remains understudied. These factors include individual socio-demographic and economic characteristics, the availability of various sources of health insurance, and the prevalence of medical conditions. We use public data to analyze how veterans’ utilization of health care services varies with these factors. We also analyze how the reliance on VA services varies when alternative sources of health insurance are available to veterans. Based on the estimated relationships, we use a micro-simulation model to forecast future health care utilization, both inside and outside of VA. 相似文献
219.
This contribution acquaints the reader with a model for multilevel single-machine proportional lot sizing and scheduling problems (PLSPs) that appear in the scope of short-term production planning. It is one of the first articles that deals with dynamic capacitated multilevel lot sizing and scheduling, which is of great practical importance. The PLSP model refines well-known mixed-integer programming formulations for dynamic capacitated lot sizing and scheduling as, for instance, the DLSP or the CSLP. A special emphasis is given on a new method called demand shuffle to solve multilevel PLSP instances efficiently but suboptimally. Although the basic idea is very simple, it becomes clear that in the presence of precedence and capacity constraints many nontrivial details are to be concerned. Computational studies show that the presented approach decidedly improves recent results. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 319–340, 1997 相似文献
220.