首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   666篇
  免费   11篇
  677篇
  2021年   5篇
  2019年   14篇
  2018年   16篇
  2017年   15篇
  2016年   17篇
  2015年   11篇
  2013年   159篇
  2011年   5篇
  2010年   8篇
  2009年   5篇
  2007年   6篇
  2006年   7篇
  2005年   15篇
  2004年   8篇
  2003年   9篇
  2002年   7篇
  2000年   11篇
  1999年   9篇
  1998年   6篇
  1997年   13篇
  1996年   14篇
  1995年   6篇
  1994年   13篇
  1993年   11篇
  1992年   10篇
  1991年   16篇
  1990年   10篇
  1989年   14篇
  1988年   7篇
  1987年   17篇
  1986年   12篇
  1985年   12篇
  1984年   11篇
  1983年   8篇
  1982年   8篇
  1981年   9篇
  1980年   10篇
  1979年   9篇
  1978年   11篇
  1977年   9篇
  1976年   11篇
  1975年   8篇
  1974年   14篇
  1973年   8篇
  1972年   11篇
  1971年   15篇
  1970年   5篇
  1969年   8篇
  1968年   7篇
  1967年   4篇
排序方式: 共有677条查询结果,搜索用时 15 毫秒
41.
42.
Book Reviews     
Men, Ideas and Tanks: British Military Thought and Armoured Forces, 1903–1939. By J. P. Harris, Manchester University Press, (1995) ISBN 0 7190 3762 (hardback) £40.00 or ISBN 0 7190 4814 (paperback) £14.99

Fighting for Ireland. By M. L. R. Smith. London and New York: Routledge, (1995) ISBN 0–415–09161–6.

The Fundamentals of British Maritime Doctrine (BR1806) HMSO London (1995) ISBN 0–11–772470‐X £9.50

Regional Conflicts: The Challenges to US‐Russian Co‐Operation Edited by James E. Goodby SIPRI: Oxford University Press 1995 ISBN 019‐S29–171X, £30.00

SIPRI Yearbook 1995 ‐ Armaments, Disarmament and International Security Oxford: Oxford University Press 1995. ISBN 019–829–1930, £60.00.

Drug Trafficking in the Americas Edited by Bruce M. Bagley & William O. Walker III Transaction Publishers, New Brunswick, (USA), 1994 ISBN 1–56000–752–4.

Raglan: From the Peninsula to the Crimea By John Sweetman, Arms & Armour 1993. ISBN 1–85409–059–3. £19.00.  相似文献   

43.
Silverman's game on (1, B) × (1, B) was analyzed by R. J. Evans, who showed that optimal strategies exist (and found them) only on a set of measure zero in the parameter plane. We examine the corresponding game on (1, B) × (1, D) with D > B, and show that optimal strategies exist in about half the parameter plane. Optimal strategies and game value are obtained explicitly. © 1995 John Wiley & Sons, Inc.  相似文献   
44.
We consider the problem of optimizing assortments in a multi‐item retail inventory system. In addition to the usual holding and stockout costs, there is a fixed cost for including any item in the assortment. Customers' preferences for items include both probabilistic substitution patterns and the desire to purchase sets of complementary items. We develop a demand model to capture this behavior, and derive tractable approximations that allow us to formulate the optimization problem as a 0–1 mixed integer linear program. Numerical examples are solved to illustrate key insights into how both complementary and substitute items affect the optimal assortment and the expected profit. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 793–822, 2003.  相似文献   
45.
46.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
47.
48.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
49.
50.
As part of the next phase of the Global Jihad, al Qaeda has been committed to winning popular support among Muslims. Ayman al-Zawahiri and the al Qaeda inner circle recognise that a global terror movement and civil conflicts in the Middle East, brought about by the Arab revolutions, necessitate different operational methods. As such, they have disavowed the Islamic State of Iraq and al-Sham for their insubordination and unconstrained tactics, a move that has implications for the Middle East, international relations, the legitimacy of the al Qaeda leadership, and the future of the Global Jihad.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号