首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   425篇
  免费   13篇
  2021年   11篇
  2019年   10篇
  2017年   10篇
  2016年   13篇
  2015年   13篇
  2014年   8篇
  2013年   83篇
  2011年   4篇
  2008年   7篇
  2007年   5篇
  2006年   7篇
  2005年   7篇
  2004年   4篇
  2002年   7篇
  2001年   7篇
  2000年   5篇
  1999年   4篇
  1998年   8篇
  1997年   9篇
  1996年   5篇
  1995年   6篇
  1994年   8篇
  1993年   7篇
  1992年   7篇
  1991年   8篇
  1990年   2篇
  1989年   7篇
  1988年   15篇
  1987年   7篇
  1986年   16篇
  1985年   9篇
  1984年   6篇
  1983年   6篇
  1982年   4篇
  1981年   8篇
  1980年   6篇
  1979年   11篇
  1978年   7篇
  1977年   8篇
  1976年   2篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有438条查询结果,搜索用时 15 毫秒
141.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
142.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
143.
Ordered flow shop models have appeared in the literature since the mid‐1970s and proportionate flow shop models have appeared since the early 1980s. We provide a detailed review of these models along with some analysis and potential topics for future research. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
144.
The German invasion in Norway in April 1940 was unique in that it was the first major ‘triphibious’ campaign. It was an operation that was equally dependent upon naval, air and ground forces for success. Norway had long been of interest to German strategists, especially naval thinkers. However, no serious Wehrmacht plans for occupying Norway were even started until December 1939. A small group of staff officers of the three services put together a comprehensive plan in a matter of weeks. The article examines the effectiveness of the German interservice co‐operation and OKW leadership in a very tough and close run campaign. Although there were numerous problems, interservice co‐operation was fairly effective at the tactical and operational levels. Indeed, the Germans won the campaign largely because their services worked together much better than their Allied opponents.  相似文献   
145.
146.
Kathleen Burk, Britain, America and the Sinews of War 1914–1918. Boston and London: Allen &; Unwin, 1985. Pp.x + 286; £20.00.

Keith Jeffery, The British Army and the Crisis of Empire 1918–1922. Manchester: Manchester University Press, 1984. Pp.viii + 200; £21.00.

Carlo D'Este, Decision in Normandy. London: Pan Books in association with Collins, 1984. Pp.xii + 555; £3.95.

R. J. Overy, Goering: The ‘Iron Man’, London: Routledge &; Kegan Paul, 1984. Pp. x + 310; bibliography; index; £14.95.

John Barron, KGB: The Hidden Hand. New York: Reader's Digest Press, 1983. Pp.489. $15.95.

Edward Van Der Rhoer, The Shadow Network: Espionage as an Instrument of Soviet Policy, New York: Charles Scribner's Sons, 1983. Pp.359. $19.95.

David Holloway and Jane M. O. Sharp (eds.), The Warsaw Pact: Alliance in Transition? London: Macmillan Press, 1984. Pp.290; £25.

A. Ross Johnson, Robert W. Dean and Alexander Alexiev, East European Military Establishments: The Warsaw Pact Northern Tier. New York: Crane, Russak, 1982. Pp.xiii + 182; $19.50.

Condoleezza Rice, The Soviet Union and the Czechoslovak Army, 1948–1983: Uncertain Allegiance. Princeton, NJ: Princeton University Press, 1985. Pp.xiv + 303; £40.40.

Trevor Taylor, European Defence Cooperation (Chatham House Papers, No. 24). London: Routledge &; Kegan Paul for RIIA, 1984. Pp.97; £4.95.

Phil Williams, US Troops in Europe (Chatham House Papers, No. 25). London: Routledge &; Kegan Paul for RIIA, 1984. Pp.87; £5.95.

Daniel Frei, Assumptions and Perceptions in Disarmament. New York and Geneva: United Nations, 1984. Pp.xiv + 321; NP.

Joseph Rotblat and Alessandro Pascolini (eds.), The Arms Race at a Time of Decision, Annals of Pugwash 1983. London and Basingstoke: Macmillan, 1984. Pp.xxiv + 291; £20 (hardback) and £7.95 (paperback).

Philip H. Frankel, Pretoria's Praetorians. Cambridge: Cambridge University Press, 1984. Pp. xx + 215; £23.50.

Brian May, Russia, America, the Bomb and the Fall of Western Europe. London: Routledge &; Kegan Paul, 1984. Pp.vii + 248. £11.95.

Robert Jervis, The Illogic of American Nuclear Strategy. Ithaca and London: Cornell University Press, 1984. Pp.203; $19.95.  相似文献   
147.
The 1940 Norway campaign was the first truly modern joint operation in which ground, sea and air forces all played major roles. With three services involved over a huge theater of war, the normal friction in obtaining and disseminating intelligence and information that one finds in a joint operation was multiplied. As the two sides were fairly evenly matched, effective use of intelligence and information provided a decisive advantage. This paper analyzes the use of information and intelligence of both sides at the strategic, operational and tactical levels. Both sides performed poorly at the strategic level but the Germans proved far superior to the British at the operational and tactical levels. The paper challenges several common assumptions on the importance of intelligence and information in joint campaigns.  相似文献   
148.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   
149.
Book Reviews     
Iain McCallum, Blood Brothers Hiram and Hudson Maxim: Pioneers of Modern Warfare. London: Chatham, 1999. Pp. 224, 33 illus., 2 maps, biblio., index. £20. ISBN 1–86176–096–5.

Eric Ash, Sir Frederick Sykes and the Air Revolution, 1912–1918. London and Portland, OR: Frank Cass, 1999. Pp.xviii + 268, 20 illus., 3 maps, biblio., index. £42.50/$59.50 (cloth), £18.50/$27.50 (paper). ISBN 0–7146–4828–0 and ‐4382–3.

Azar Gat, Fascist and Liberal Visions of War: Fuller, Liddell Hart, Douhet, and other Modernists. Oxford: Clarendon Press, 1998. Ppviii + 334, biblio., index. £45. ISBN 0–19–820715–8.

David B. Woolner (ed.), The Second Quebec Conference Revisited: Waging War, Formulating Peace: Canada, Great Britain, and the United States in 1944–1945. Basingstoke; London: Macmillan Press, 1998. Pp.xiii + 210, index. £32.50. ISBN 0–333–75970–2.

Jeffrey Grey. Up Top: The Royal Australian Navy and Southeast Asian Conflicts 1955–1972. St Leonards NSW: Allen &; Unwin in association with the Australian War Memorial, 1998. Pp.xx + 380, 110 illus., 12 tables, 23 maps &; diagrams, appendices, notes, biblio., index. NP. ISBN 1–86448–290–7.

Susan L Carruthers, The Media at War. Basingstoke: Macmillan, 2000. Pp.321, biblio., index. £14.99 (paper). ISBN 0–333–69143–1, also available in hardback.

Edward J. Marolda and Robert J. Schneller Jr, Shield and Sword: The United States Navy and the Persian Gulf War. Washington DC: Naval Historical Center, 1998. Pp.xxi + 517, 120 illus., 14 maps, biblio., index. NP. ISBN 0–1604–9476–1.

Marvin Pokrant, Desert Shield at Sea: What the Navy Really Did and Desert Storm at Sea: What the Navy Really Did. Both Westport, CT: Greenwood Press, 1999. Pp.xxiii + 265,9 illus., biblio., index. £44.95. ISBN 0–313–31023–8. Pp.xxiv + 329,12 illus., biblio., index. NP. ISBN 0–313–31024–6.

David Kaularich and Ronald C. Kramer, Crimes of the American Nuclear State: At Home and Abroad. Boston: Northeastern University Press, 1999. Pp.xviii + 195, biblio., index. £42.75. ISBN 1–55553–371‐X.

Stanley Hoffmann, World Disorders: Troubled Peace in the Post‐Cold War Era. Lanham, MD: Rowman &; Littlefield, 1998. Pp.viii+279, notes, index. $29.95. ISBN 0–8476–8574–8.

Lawrence Freedman (ed.), Strategic Coercion: Concepts and Cases. Oxford: Oxford‐University Press, 1998. Pp.400, index. £48. ISBN 0–19–829–349–6.

Stephen J. Cimbala, Coercive Military Strategy. College Station, TX: Texas A&;M University Press, 1998. Pp.229, biblio, index; $39.95. ISBN 0–89096–836–5  相似文献   
150.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号