全文获取类型
收费全文 | 214篇 |
免费 | 2篇 |
专业分类
216篇 |
出版年
2018年 | 7篇 |
2017年 | 4篇 |
2016年 | 8篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 82篇 |
2012年 | 2篇 |
2011年 | 1篇 |
2010年 | 3篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2006年 | 1篇 |
2005年 | 5篇 |
2004年 | 1篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 6篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有216条查询结果,搜索用时 0 毫秒
211.
212.
John W. Wingate 《海军后勤学研究》1974,21(2):299-306
In this paper, the existence of a saddle point for two-person zero-sum infinite games of a special type is proved. The games have continuous bilinear payoff functions and strategy sets which are convex, noncompact subsets of an infinite-dimensional vector space. The closures of the strategy sets are, however, compact. The payoff functions satisfy conditions which allow the use of dominance arguments to show that points in the closure of a strategy set are dominated by or are strategically equivalent to points in the strategy set itself. Combining the dominance arguments with a well-known existence theorem produces the main result of the paper. The class of games treated is an extension of a class studied by J. D. Matheson, who obtained explicit solutions for the saddle points by using necessary conditions. 相似文献
213.
214.
The U.S. Navy Prowler aircraft is designed for electronic surveillance and countermeasures. In this paper, we describe the problem of scheduling Prowler crew training, and we present two integer programming models to solve it. The first model maximizes the number of aviators trained above 75% in each mission area, subject to the available number of flights, over a single month. The second model distinguishes peacetime from mobilization, and minimizes the number of flights done in mobilization subject to the available number of flights in peacetime. Our models distinguish different types of crew and allow more than one qualification to be earned on a given flight. We give numerical results using real data, comparing our results to the actual readiness of a squadron. We found that crew readiness of Prowler squadrons can be increased by 10%, simply by better scheduling. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 289–305, 2003. 相似文献
215.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
216.
John Arquilla 《Journal of Military Ethics》2013,12(1):80-87
For many years after its introduction in the early 1990s, the cyberwar concept - which outlined a new mode of conflict that would emphasize disruption of information systems and flows - was given little credence. Over the past several years, however, cyberwars of both irregular and somewhat more conventional types have erupted (e.g., see respectively Estonia in 2007 and Georgia in 2008). Global awareness of cyberwar has risen sharply, and many nation-states are preparing their defenses, as well as their capabilities for mounting offensive operations. The American military's declaration in 2011 that cyberspace is a 'warfighting domain' highlights a need to explore the ethical implications and nuances of cyberwar. This article finds that classic jus ad bellum constructs come under great pressure from cyberwar, while jus in bello concerns may prove more manageable. Another key theme is that disproportionate attention is given to the notion of employing cyberwar 'strategically' (i.e., to strike directly at other nations' infrastructures), where its use is less likely to achieve 'victory' and is more problematic ethically. Instead, a focus on the application of cyberwar techniques in battle may lead to shorter, less bloody, 'more ethical' conflicts. 相似文献