全文获取类型
收费全文 | 411篇 |
免费 | 9篇 |
出版年
2021年 | 4篇 |
2019年 | 7篇 |
2018年 | 11篇 |
2017年 | 8篇 |
2016年 | 11篇 |
2014年 | 7篇 |
2013年 | 105篇 |
2011年 | 3篇 |
2010年 | 6篇 |
2009年 | 5篇 |
2008年 | 4篇 |
2006年 | 4篇 |
2005年 | 8篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 8篇 |
1996年 | 4篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 12篇 |
1992年 | 6篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 11篇 |
1987年 | 9篇 |
1986年 | 9篇 |
1985年 | 10篇 |
1984年 | 10篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1978年 | 9篇 |
1977年 | 6篇 |
1976年 | 4篇 |
1974年 | 9篇 |
1972年 | 5篇 |
1971年 | 10篇 |
1970年 | 5篇 |
1969年 | 7篇 |
1968年 | 3篇 |
1967年 | 3篇 |
1966年 | 2篇 |
排序方式: 共有420条查询结果,搜索用时 31 毫秒
401.
John McCulloch 《Whitehall Papers》2013,80(1):53-57
Abstract The author provides an introduction to the Package Management System, which is transforming the relationship between MOD and the research establishments of the Defence Research Agency. 相似文献
402.
Domestic factors play an important role in the formulation and evolution of a country's foreign and security policy. This is clearly seen in the case study of a Soviet successor state, Ukraine. The article brings together in seven sections theory with the key domestic factors that influence Ukrainian security policy, such as economics, energy, national identity, elites and political parties. The article provides an insight into how these domestic factors influence the course of Ukrainian security policy which is striking a balance between the twin extremes of Soviet re‐integration, which would be tantamount to the loss of independence, and nationalist maximalism which seeks to place as much distance as possible between Ukraine and Russia. 相似文献
403.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
404.
405.
406.
When rational choice theory is applied to the study of terrorism, it is important that attention be given to the derived principles of constrained utility maximization. Particularly useful is the Slutsky equation, which rigorously analyzes the quantity response in one activity to a price change in another. By directing attention to assumptions and/or information about compensated cross price elasticities, expenditure shares, and income elasticities, the Slutsky equation can provide critical guidance in both theoretical and empirical analysis. 相似文献
407.
This paper reviews some of the theoretical and econometric issues involved in estimating growth models that include military spending. While the mainstream growth literature has not found military expenditure to be a significant determinant of growth, much of the defence economics literature has found significant effects. The paper argues that this is largely the product of the particular specification, the Feder–Ram model, that has been used in the defence economics literature but not in the mainstream literature. The paper critically evaluates this model, detailing its problems and limitations and suggests that it should be avoided. It also critically evaluates two alternative theoretical approaches, the Augmented Solow and the Barro models, suggesting that they provide a more promising avenue for future research. It concludes with some general comments about modelling the links between military expenditure and growth. 相似文献
408.
AbstractWhile not always a concern for the general economic growth literature, the debate over the effects of military spending on growth continues to develop, with no consensus, but a deepening understanding of the limitations of previous work. One important issue that has not been adequately dealt with is the endogeneity of military spending in the growth equation, mainly because of the difficulty of finding any variables that would make adequate instruments. This paper considers this issue, using an endogenous growth model estimated on a large sample of 109 non-high-income countries for the period 1998–2012. The empirical analysis is framed within an instrumental variable setting that exploits the increase in military spending that occurs when unrest in a country escalates to turmoil. The estimation results show that endogeneity arising from reverse causality is a crucial issue, with the instrumental variable estimates providing a larger significant negative effect of military spending on growth than OLS would. This result is found to be robust to different sources of heterogeneity and different time periods. 相似文献
409.
John Arquilla 《Journal of Military Ethics》2013,12(1):80-87
For many years after its introduction in the early 1990s, the cyberwar concept - which outlined a new mode of conflict that would emphasize disruption of information systems and flows - was given little credence. Over the past several years, however, cyberwars of both irregular and somewhat more conventional types have erupted (e.g., see respectively Estonia in 2007 and Georgia in 2008). Global awareness of cyberwar has risen sharply, and many nation-states are preparing their defenses, as well as their capabilities for mounting offensive operations. The American military's declaration in 2011 that cyberspace is a 'warfighting domain' highlights a need to explore the ethical implications and nuances of cyberwar. This article finds that classic jus ad bellum constructs come under great pressure from cyberwar, while jus in bello concerns may prove more manageable. Another key theme is that disproportionate attention is given to the notion of employing cyberwar 'strategically' (i.e., to strike directly at other nations' infrastructures), where its use is less likely to achieve 'victory' and is more problematic ethically. Instead, a focus on the application of cyberwar techniques in battle may lead to shorter, less bloody, 'more ethical' conflicts. 相似文献
410.
Diagnostic clinics are among healthcare facilities that suffer from long waiting times which can worsen medical outcomes and increase patient no-shows. Reducing waiting times without significant capital investments is a challenging task. We tackle this challenge by proposing a new appointment scheduling policy that does not require significant investments for diagnostic clinics. The clinic in our study serves outpatients, inpatients, and emergency patients. Emergency patients must be seen on arrival, and inpatients must be given next day appointments. Outpatients, however, can be given later appointments. The proposed policy takes advantage of this by allowing the postponement of the acceptance of appointment requests from outpatients. The appointment scheduling process is modeled as a two-stage stochastic programming problem where a portion of the clinic capacity is allocated to inpatients and emergency patients in the first stage. In the second stage, outpatients are scheduled based on their priority classes. After a detailed analysis of the solutions obtained from the two-stage stochastic model, we develop a simple, non-anticipative policy for patient scheduling. We evaluate the performance of this proposed, easy-to-implement policy in a simulation study which shows significant improvements in outpatient indirect waiting times. 相似文献