全文获取类型
收费全文 | 549篇 |
免费 | 13篇 |
出版年
2021年 | 11篇 |
2019年 | 22篇 |
2018年 | 11篇 |
2017年 | 12篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2014年 | 9篇 |
2013年 | 145篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 5篇 |
2005年 | 9篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 8篇 |
1999年 | 6篇 |
1998年 | 8篇 |
1997年 | 15篇 |
1996年 | 7篇 |
1994年 | 10篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 14篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 14篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 6篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 8篇 |
1975年 | 7篇 |
1974年 | 10篇 |
1973年 | 13篇 |
1972年 | 7篇 |
1971年 | 6篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 5篇 |
排序方式: 共有562条查询结果,搜索用时 15 毫秒
461.
Christopher M. Faulkner 《Civil Wars》2019,21(1):83-103
Do Private Military and Security Companies (PMSCs) impact peace duration after civil war? I argue that the role these organisations play in a conflict can impact post-conflict stability. Specifically, I suggest that variance in services provided by PMSCs can influence rebels’ calculations about relative capabilities. These calculations then contribute to the probability for civil war recurrence. Building on the bargaining framework, with a focus on information and commitment problems, this article demonstrates that PMSCs participating in armed combat operations can jeopardise the stability of peace following civil war. Three case narratives (Angola, Sierra Leone and Croatia) are used to probe the theoretical argument and results are illustrative – PMSCs serving as force multipliers contribute to an increase in the probability for conflict recurrence. 相似文献
462.
Matthijs M. Maas 《Contemporary Security Policy》2019,40(3):285-311
Many observers anticipate “arms races” between states seeking to deploy artificial intelligence (AI) in diverse military applications, some of which raise concerns on ethical and legal grounds, or from the perspective of strategic stability or accident risk. How viable are arms control regimes for military AI? This article draws a parallel with the experience in controlling nuclear weapons, to examine the opportunities and pitfalls of efforts to prevent, channel, or contain the militarization of AI. It applies three analytical lenses to argue that (1) norm institutionalization can counter or slow proliferation; (2) organized “epistemic communities” of experts can effectively catalyze arms control; (3) many military AI applications will remain susceptible to “normal accidents,” such that assurances of “meaningful human control” are largely inadequate. I conclude that while there are key differences, understanding these lessons remains essential to those seeking to pursue or study the next chapter in global arms control. 相似文献
463.
José M. Fernández 《Defence and Peace Economics》2019,30(3):324-348
The Colombian civil war lasted for nearly six decades with approximately 10 percent of its population being displaced over the same period. The implications of this conflict have transgressed international boundaries. Countries such as Ecuador experienced an exodus of victims as well as an increase in the presence of armed groups, along with the proliferation of illegal businesses. Even though the internal social and economic consequences of the Colombian conflict have been documented in the literature, there is yet to be a study addressing these issues from the perspective of impacted neighboring countries. In this work, we contribute to the literature by evaluating whether the influx of asylum seekers and the increasing presence of armed groups in the bordering provinces of Ecuador have lead to an increase in violence among these provinces. We do not find any link between the arrival of asylum seekers and the incidence of violent crimes in the Ecuadorean bordering provinces. Similarly, our results indicate that despite an increase in the presence of armed groups, these regions did not experience an increase in the homicide rates significantly different from the other provinces. The results are robust to various specifications and econometric techniques. 相似文献
464.
Unit‐load warehouses store and retrieve unit‐loads, typically pallets. When storage and retrieval operations are not coordinated, travel is from a pickup and deposit (P&D) point to a pallet location and back again. In some facilities, workers interleave storage and retrieval operations to form a dual‐command cycle. Two new aisle designs proposed by Gue and Meller (“Improving the unit‐load warehouse.” In Progress in Material Handling Research: 2006. Material Handling Industry of America, Charlotte, NC, 2006) use diagonal aisles to reduce the travel distance to a single pallet location by approximately 10 and 20[percnt] for the two designs, respectively. We develop analytical expressions for travel between pallet locations for one of these—the fishbone design. We then compare fishbone warehouses that have been optimized for dual‐command to traditional warehouses that have been optimized in the same manner, and show that an optimal fishbone design reduces dual‐command travel by 10–15%. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 54: 389–403, 2009 相似文献
465.
In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross‐trained) worker. For a three‐station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using analytical models and extensive simulation experiments, we also evaluate the effectiveness of practical heuristic control policies and provide managerial insights on automation configuration design of the line. This characterization of the worker control policy enables us to develop managerial insights into the design issues of how best to locate and concentrate automation in the line. Finally, we show that, in addition to ease of control and greater design flexibility, the CONWIP protocol also offers higher efficiency and robustness than does the push protocol. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
466.
467.
A unified treatment is given for a class of discrete distributions derived by compounding a bivariate Poisson with a bivariate discrete or continuous distribution. Using generating functions a number of interesting results are obtained for probabilities, moments, cumulants, factorial moments, and factorial cumulants. Conditional distributions and regression functions are also examined. Five illustrative examples are presented in detail. © 1994 John Wiley & Sons, Inc. 相似文献
468.
In this article we study the problem of scheduling independent tasks, each of which requires the simultaneous availability of a set of prespecified processors, with the objective of minimizing the maximum completion time. We propose a graph-theoretical approach and identify a class of polynomial instances, corresponding to comparability graphs. We show that the scheduling problem is polynomially equivalent to the problem of extending a graph to a comparability graph whose maximum weighted clique has minimum weight. Using this formulation we show that in some cases it is possible to decompose the problem according to the canonical decomposition of the graph. Finally, a general solution procedure is given that includes a branch-and-bound algorithm for the solution of subproblems which can be neither decomposed nor solved in polynomial time. Some examples and computational results are presented. © 1994 John Wiley & Sons, Inc. 相似文献
469.
We present an algorithm called the exact ceiling point algorithm (XCPA) for solving the pure, general integer linear programming problem (P). A recent report by the authors demonstrates that, if the set of feasible integer solutions for (P) is nonempty and bounded, all optimal solutions for (P) are “feasible 1-ceiling points,” roughly, feasible integer solutions lying on or near the boundary of the feasible region for the LP-relaxation associated with (P). Consequently, the XCPA solves (P) by implicitly enumerating only feasible 1-ceiling points, making use of conditional bounds and “double backtracking.” We discuss the results of computational testing on a set of 48 problems taken from the literature. 相似文献
470.
Bounds for P(X + X ⩽ k2σ) are given where X1 and X2 are independent normal variables having zero means and variances σ, σ, respectively. This is generalized when X1 and X2 are dependent variables with known covariance matrix. 相似文献