首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   214篇
  免费   2篇
  216篇
  2018年   7篇
  2017年   4篇
  2016年   8篇
  2015年   2篇
  2014年   2篇
  2013年   82篇
  2012年   2篇
  2011年   1篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2005年   5篇
  2004年   1篇
  2003年   4篇
  2002年   5篇
  2000年   3篇
  1999年   3篇
  1998年   1篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   5篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   3篇
  1988年   1篇
  1987年   6篇
  1986年   3篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   6篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
  1974年   3篇
  1972年   3篇
  1971年   3篇
  1970年   2篇
  1969年   3篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有216条查询结果,搜索用时 0 毫秒
211.
212.
In this paper, the existence of a saddle point for two-person zero-sum infinite games of a special type is proved. The games have continuous bilinear payoff functions and strategy sets which are convex, noncompact subsets of an infinite-dimensional vector space. The closures of the strategy sets are, however, compact. The payoff functions satisfy conditions which allow the use of dominance arguments to show that points in the closure of a strategy set are dominated by or are strategically equivalent to points in the strategy set itself. Combining the dominance arguments with a well-known existence theorem produces the main result of the paper. The class of games treated is an extension of a class studied by J. D. Matheson, who obtained explicit solutions for the saddle points by using necessary conditions.  相似文献   
213.
214.
The U.S. Navy Prowler aircraft is designed for electronic surveillance and countermeasures. In this paper, we describe the problem of scheduling Prowler crew training, and we present two integer programming models to solve it. The first model maximizes the number of aviators trained above 75% in each mission area, subject to the available number of flights, over a single month. The second model distinguishes peacetime from mobilization, and minimizes the number of flights done in mobilization subject to the available number of flights in peacetime. Our models distinguish different types of crew and allow more than one qualification to be earned on a given flight. We give numerical results using real data, comparing our results to the actual readiness of a squadron. We found that crew readiness of Prowler squadrons can be increased by 10%, simply by better scheduling. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 289–305, 2003.  相似文献   
215.
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated.  相似文献   
216.
For many years after its introduction in the early 1990s, the cyberwar concept - which outlined a new mode of conflict that would emphasize disruption of information systems and flows - was given little credence. Over the past several years, however, cyberwars of both irregular and somewhat more conventional types have erupted (e.g., see respectively Estonia in 2007 and Georgia in 2008). Global awareness of cyberwar has risen sharply, and many nation-states are preparing their defenses, as well as their capabilities for mounting offensive operations. The American military's declaration in 2011 that cyberspace is a 'warfighting domain' highlights a need to explore the ethical implications and nuances of cyberwar. This article finds that classic jus ad bellum constructs come under great pressure from cyberwar, while jus in bello concerns may prove more manageable. Another key theme is that disproportionate attention is given to the notion of employing cyberwar 'strategically' (i.e., to strike directly at other nations' infrastructures), where its use is less likely to achieve 'victory' and is more problematic ethically. Instead, a focus on the application of cyberwar techniques in battle may lead to shorter, less bloody, 'more ethical' conflicts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号