全文获取类型
收费全文 | 425篇 |
免费 | 13篇 |
出版年
2021年 | 11篇 |
2019年 | 10篇 |
2017年 | 10篇 |
2016年 | 13篇 |
2015年 | 13篇 |
2014年 | 8篇 |
2013年 | 83篇 |
2011年 | 4篇 |
2008年 | 7篇 |
2007年 | 5篇 |
2006年 | 7篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2002年 | 7篇 |
2001年 | 7篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 8篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 2篇 |
1989年 | 7篇 |
1988年 | 15篇 |
1987年 | 7篇 |
1986年 | 16篇 |
1985年 | 9篇 |
1984年 | 6篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 2篇 |
1975年 | 9篇 |
1974年 | 7篇 |
1973年 | 5篇 |
1972年 | 7篇 |
1971年 | 4篇 |
1970年 | 4篇 |
1969年 | 6篇 |
1968年 | 3篇 |
1967年 | 2篇 |
1966年 | 3篇 |
排序方式: 共有438条查询结果,搜索用时 15 毫秒
141.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献
142.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
143.
Ordered flow shop models have appeared in the literature since the mid‐1970s and proportionate flow shop models have appeared since the early 1980s. We provide a detailed review of these models along with some analysis and potential topics for future research. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
144.
James S. Corum 《战略研究杂志》2013,36(4):50-77
The German invasion in Norway in April 1940 was unique in that it was the first major ‘triphibious’ campaign. It was an operation that was equally dependent upon naval, air and ground forces for success. Norway had long been of interest to German strategists, especially naval thinkers. However, no serious Wehrmacht plans for occupying Norway were even started until December 1939. A small group of staff officers of the three services put together a comprehensive plan in a matter of weeks. The article examines the effectiveness of the German interservice co‐operation and OKW leadership in a very tough and close run campaign. Although there were numerous problems, interservice co‐operation was fairly effective at the tactical and operational levels. Indeed, the Germans won the campaign largely because their services worked together much better than their Allied opponents. 相似文献
145.
146.
David S. Yost 《战略研究杂志》2013,36(3):339-374
Kathleen Burk, Britain, America and the Sinews of War 1914–1918. Boston and London: Allen &; Unwin, 1985. Pp.x + 286; £20.00. Keith Jeffery, The British Army and the Crisis of Empire 1918–1922. Manchester: Manchester University Press, 1984. Pp.viii + 200; £21.00. Carlo D'Este, Decision in Normandy. London: Pan Books in association with Collins, 1984. Pp.xii + 555; £3.95. R. J. Overy, Goering: The ‘Iron Man’, London: Routledge &; Kegan Paul, 1984. Pp. x + 310; bibliography; index; £14.95. John Barron, KGB: The Hidden Hand. New York: Reader's Digest Press, 1983. Pp.489. $15.95. Edward Van Der Rhoer, The Shadow Network: Espionage as an Instrument of Soviet Policy, New York: Charles Scribner's Sons, 1983. Pp.359. $19.95. David Holloway and Jane M. O. Sharp (eds.), The Warsaw Pact: Alliance in Transition? London: Macmillan Press, 1984. Pp.290; £25. A. Ross Johnson, Robert W. Dean and Alexander Alexiev, East European Military Establishments: The Warsaw Pact Northern Tier. New York: Crane, Russak, 1982. Pp.xiii + 182; $19.50. Condoleezza Rice, The Soviet Union and the Czechoslovak Army, 1948–1983: Uncertain Allegiance. Princeton, NJ: Princeton University Press, 1985. Pp.xiv + 303; £40.40. Trevor Taylor, European Defence Cooperation (Chatham House Papers, No. 24). London: Routledge &; Kegan Paul for RIIA, 1984. Pp.97; £4.95. Phil Williams, US Troops in Europe (Chatham House Papers, No. 25). London: Routledge &; Kegan Paul for RIIA, 1984. Pp.87; £5.95. Daniel Frei, Assumptions and Perceptions in Disarmament. New York and Geneva: United Nations, 1984. Pp.xiv + 321; NP. Joseph Rotblat and Alessandro Pascolini (eds.), The Arms Race at a Time of Decision, Annals of Pugwash 1983. London and Basingstoke: Macmillan, 1984. Pp.xxiv + 291; £20 (hardback) and £7.95 (paperback). Philip H. Frankel, Pretoria's Praetorians. Cambridge: Cambridge University Press, 1984. Pp. xx + 215; £23.50. Brian May, Russia, America, the Bomb and the Fall of Western Europe. London: Routledge &; Kegan Paul, 1984. Pp.vii + 248. £11.95. Robert Jervis, The Illogic of American Nuclear Strategy. Ithaca and London: Cornell University Press, 1984. Pp.203; $19.95. 相似文献
147.
James S Corum 《战略研究杂志》2013,36(2):345-369
The 1940 Norway campaign was the first truly modern joint operation in which ground, sea and air forces all played major roles. With three services involved over a huge theater of war, the normal friction in obtaining and disseminating intelligence and information that one finds in a joint operation was multiplied. As the two sides were fairly evenly matched, effective use of intelligence and information provided a decisive advantage. This paper analyzes the use of information and intelligence of both sides at the strategic, operational and tactical levels. Both sides performed poorly at the strategic level but the Germans proved far superior to the British at the operational and tactical levels. The paper challenges several common assumptions on the importance of intelligence and information in joint campaigns. 相似文献
148.
Alex S. Wilner 《战略研究杂志》2013,36(1):3-37
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved. 相似文献
149.
Jonathan Krause Thomas S. Wilkins Christopher Baxter P.M.H. Bell Vincent Boutet-Lehouillier Malcolm Hugh Patterson 《战略研究杂志》2013,36(1):145-158
Iain McCallum, Blood Brothers Hiram and Hudson Maxim: Pioneers of Modern Warfare. London: Chatham, 1999. Pp. 224, 33 illus., 2 maps, biblio., index. £20. ISBN 1–86176–096–5. Eric Ash, Sir Frederick Sykes and the Air Revolution, 1912–1918. London and Portland, OR: Frank Cass, 1999. Pp.xviii + 268, 20 illus., 3 maps, biblio., index. £42.50/$59.50 (cloth), £18.50/$27.50 (paper). ISBN 0–7146–4828–0 and ‐4382–3. Azar Gat, Fascist and Liberal Visions of War: Fuller, Liddell Hart, Douhet, and other Modernists. Oxford: Clarendon Press, 1998. Ppviii + 334, biblio., index. £45. ISBN 0–19–820715–8. David B. Woolner (ed.), The Second Quebec Conference Revisited: Waging War, Formulating Peace: Canada, Great Britain, and the United States in 1944–1945. Basingstoke; London: Macmillan Press, 1998. Pp.xiii + 210, index. £32.50. ISBN 0–333–75970–2. Jeffrey Grey. Up Top: The Royal Australian Navy and Southeast Asian Conflicts 1955–1972. St Leonards NSW: Allen &; Unwin in association with the Australian War Memorial, 1998. Pp.xx + 380, 110 illus., 12 tables, 23 maps &; diagrams, appendices, notes, biblio., index. NP. ISBN 1–86448–290–7. Susan L Carruthers, The Media at War. Basingstoke: Macmillan, 2000. Pp.321, biblio., index. £14.99 (paper). ISBN 0–333–69143–1, also available in hardback. Edward J. Marolda and Robert J. Schneller Jr, Shield and Sword: The United States Navy and the Persian Gulf War. Washington DC: Naval Historical Center, 1998. Pp.xxi + 517, 120 illus., 14 maps, biblio., index. NP. ISBN 0–1604–9476–1. Marvin Pokrant, Desert Shield at Sea: What the Navy Really Did and Desert Storm at Sea: What the Navy Really Did. Both Westport, CT: Greenwood Press, 1999. Pp.xxiii + 265,9 illus., biblio., index. £44.95. ISBN 0–313–31023–8. Pp.xxiv + 329,12 illus., biblio., index. NP. ISBN 0–313–31024–6. David Kaularich and Ronald C. Kramer, Crimes of the American Nuclear State: At Home and Abroad. Boston: Northeastern University Press, 1999. Pp.xviii + 195, biblio., index. £42.75. ISBN 1–55553–371‐X. Stanley Hoffmann, World Disorders: Troubled Peace in the Post‐Cold War Era. Lanham, MD: Rowman &; Littlefield, 1998. Pp.viii+279, notes, index. $29.95. ISBN 0–8476–8574–8. Lawrence Freedman (ed.), Strategic Coercion: Concepts and Cases. Oxford: Oxford‐University Press, 1998. Pp.400, index. £48. ISBN 0–19–829–349–6. Stephen J. Cimbala, Coercive Military Strategy. College Station, TX: Texas A&;M University Press, 1998. Pp.229, biblio, index; $39.95. ISBN 0–89096–836–5 相似文献
150.