首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   425篇
  免费   13篇
  2021年   11篇
  2019年   10篇
  2017年   10篇
  2016年   13篇
  2015年   13篇
  2014年   8篇
  2013年   83篇
  2011年   4篇
  2008年   7篇
  2007年   5篇
  2006年   7篇
  2005年   7篇
  2004年   4篇
  2002年   7篇
  2001年   7篇
  2000年   5篇
  1999年   4篇
  1998年   8篇
  1997年   9篇
  1996年   5篇
  1995年   6篇
  1994年   8篇
  1993年   7篇
  1992年   7篇
  1991年   8篇
  1990年   2篇
  1989年   7篇
  1988年   15篇
  1987年   7篇
  1986年   16篇
  1985年   9篇
  1984年   6篇
  1983年   6篇
  1982年   4篇
  1981年   8篇
  1980年   6篇
  1979年   11篇
  1978年   7篇
  1977年   8篇
  1976年   2篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有438条查询结果,搜索用时 15 毫秒
131.
1 1This research was funded in part by a grant from the Lowe Institute of Political Economy. The corresponding author is S. Brock Blomerg. We thank Chris Blomberg and Brianna Loyosa for their excellent research assistance on the project. This paper presents an empirical analysis of what drives congressional legislation on terrorism during the period 1995 to 2010. We utilize and augment current methodology to compile and analyze data on sponsorship and cosponsorship of terrorism related data. Our results on the sources of legislation on terrorism are largely in line with past examinations of the importance of committee membership and leadership, party majority-ship, and other political factors. Further, we find that the most significant and robust drive for legislation on terrorism is the September 11th attacks. And while the impact of 9/11 affected legislative productivity everywhere, we find that it most significantly affected states surrounding New York and Washington D.C. Our results indicate that the economy may be one factor motivating politicians to legislate on terrorism; however, these results are not robust.  相似文献   
132.
Export controls and international safeguards are central to ensuring international confidence in the peaceful uses of nuclear materials and technologies and to achieving adequate oversight on the transfer and use of nuclear materials, technology, and equipment required for the development of proliferation-sensitive parts of the nuclear fuel cycle. Although the independent strengths of export controls and international safeguards rely largely on universal adherence, there may be opportunities to exploit the shared strengths of these systems. This article provides background information on the separate evolution of export controls and international safeguards, considers how these two elements of the nonproliferation regime interact, and identifies some possible avenues that could, over time, lead to wholly integrated activities.  相似文献   
133.
How do we assess the health of international regimes? Many analysts have insisted recently that the nuclear nonproliferation regime is in urgent need of repair or that it should even be discarded because of its supposed ineffectiveness. However, it is essential that statements about the regime being in crisis be scrutinized for veracity and utility. While the spread of nuclear weapons poses an undeniable and serious threat to international security, a mistaken crisis mentality with respect to the regime could lead to rash attempts to alter it in unnecessary or ineffective ways or, at worst, to discard it completely. This paper returns to a theoretical framework that differentiates regimes, across both issue areas and time, to provide a more specified evaluation of regime health. By disaggregating the nuclear nonproliferation regime and assessing the individual and interactive health of multiple dimensions, a number of dimension-specific, regime-strengthening policy recommendations emerge.  相似文献   
134.
135.
The 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) produced a Final Document calling for an extension of the principles of the nonproliferation norm as well as steps toward complete disarmament. This article looks beyond the rhetoric, however, to examine recent decisions by great powers to expand nuclear trade with non-NPT countries and the implications of these decisions on the traditional nonproliferation norm of restraint. This article seeks to contribute to constructivist theory by supplementing existing accounts of norm creation and establishment with a new model of norm change. The article develops a case study of the 2008 US-India nuclear deal to highlight the role of elite agency in key stages of norm change, including redefinition and constructive substitution through contestation. It concludes that the traditional nonproliferation norm may be evolving in new directions that are not well captured by existing theoretical frames.  相似文献   
136.
137.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
138.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
139.
Ordered flow shop models have appeared in the literature since the mid‐1970s and proportionate flow shop models have appeared since the early 1980s. We provide a detailed review of these models along with some analysis and potential topics for future research. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
140.
The German invasion in Norway in April 1940 was unique in that it was the first major ‘triphibious’ campaign. It was an operation that was equally dependent upon naval, air and ground forces for success. Norway had long been of interest to German strategists, especially naval thinkers. However, no serious Wehrmacht plans for occupying Norway were even started until December 1939. A small group of staff officers of the three services put together a comprehensive plan in a matter of weeks. The article examines the effectiveness of the German interservice co‐operation and OKW leadership in a very tough and close run campaign. Although there were numerous problems, interservice co‐operation was fairly effective at the tactical and operational levels. Indeed, the Germans won the campaign largely because their services worked together much better than their Allied opponents.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号