首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   400篇
  免费   22篇
  2021年   11篇
  2020年   6篇
  2019年   10篇
  2018年   6篇
  2017年   7篇
  2016年   10篇
  2015年   11篇
  2014年   8篇
  2013年   59篇
  2012年   4篇
  2011年   8篇
  2010年   5篇
  2009年   9篇
  2007年   10篇
  2006年   4篇
  2005年   6篇
  2004年   11篇
  2003年   7篇
  2002年   10篇
  2001年   8篇
  2000年   6篇
  1999年   14篇
  1998年   7篇
  1997年   4篇
  1996年   4篇
  1995年   11篇
  1994年   6篇
  1993年   5篇
  1992年   11篇
  1991年   12篇
  1990年   6篇
  1989年   8篇
  1988年   9篇
  1987年   11篇
  1986年   9篇
  1985年   3篇
  1984年   7篇
  1983年   3篇
  1981年   7篇
  1980年   3篇
  1979年   6篇
  1978年   6篇
  1977年   7篇
  1975年   3篇
  1974年   5篇
  1973年   5篇
  1972年   3篇
  1971年   6篇
  1969年   4篇
  1968年   5篇
排序方式: 共有422条查询结果,搜索用时 15 毫秒
141.

This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense.  相似文献   
142.
143.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
144.
145.
146.
The pattern of civil–military interaction in India is informed by the notion that civilians should refrain from involvement in operational matters. The emergence of this trend can be traced back to the defeat against China in 1962. In its aftermath, the belief that the debacle occurred because of civilian interference took hold. Thereafter, politicians restricted themselves to giving overall directives, leaving operational matters to the military. The Indian ‘victory’ in the subsequent war with Pakistan was seen as vindicating this arrangement. This essay argues that the conventional reading of the China crisis is at best misleading and at worst erroneous. Further, it contends that the subsequent war with Pakistan actually underscores the problems of civilian non-involvement in operational issues. The historical narrative underpinning the norm of civilian abstention is at the very least dubious.  相似文献   
147.
The debate on the civil–military gap and especially the TISS findings are viewed with a focus on Germany. After outlining the historical development of civil–military relations, the question of a civil–military gap is explored with data from 2001. The study finds similarities and differences in the attitudes of the civilian and the military population on several issues. Overall, there is a broad overlap of attitudes, yet differences do exist, especially on issues of foreign policy and things military. It is argued that at the beginning of the twenty-first century, civil–military relations in Germany are largely uncontested, but will become more strained.  相似文献   
148.
Entering the twenty-first century, China has demonstrated an assertive foreign policy, not only in employing various types of economic and military leverage but also in conducting the Three Warfares (三战) – psychological warfare, public opinion warfare, and legal warfare. This article attempts to identify the motives and methods of China’s Three Warfares by analyzing its history, logic, and agents. Based on this analysis, the author also presents the position of the Three Warfares in China’s foreign policy and the warfares’ impact on the international security environment involving other major powers and China’s neighbors.  相似文献   
149.
Some scholars would have us believe that the distinctions between military and policing roles, methods and objectives have become increasingly blurred by the security demands of a post-Cold War and post-11 September global and domestic order. This article explores the current state of the police–military divide through a conceptual and case study analysis. It concludes that, in this case, there is some conflation occurring at a macro-level as international and domestic affairs have become increasingly indistinct, but the article also demonstrates that the actual ethos and practice of these agencies still differs strongly. Most importantly, the article argues that this distinction is in fact a very useful one in planning for future peace support operations  相似文献   
150.
In this article we introduce a 2‐machine flowshop with processing flexibility. Two processing modes are available for each task: namely, processing by the designated processor, and processing simultaneously by both processors. The objective studied is makespan minimization. This production environment is encountered in repetitive manufacturing shops equipped with processors that have the flexibility to execute orders either individually or in coordination. In the latter case, the product designer exploits processing synergies between two processors so as to execute a particular task much faster than a dedicated processor. This type of flowshop environment is also encountered in labor‐intensive assembly lines where products moving downstream can be processed either in the designated assembly stations or by pulling together the work teams of adjacent stations. This scheduling problem requires determining the mode of operation of each task, and the subsequent scheduling that preserves the flowshop constraints. We show that the problem is ordinary NP‐complete and obtain an optimal solution using a dynamic programming algorithm with considerable computational requirements for medium and large problems. Then, we present a number of dynamic programming relaxations and analyze their worst‐case error performance. Finally, we present a polynomial time heuristic with worst‐case error performance comparable to that of the dynamic programming relaxations. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号