首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   893篇
  免费   21篇
  2021年   14篇
  2019年   29篇
  2018年   19篇
  2017年   20篇
  2016年   20篇
  2015年   20篇
  2014年   11篇
  2013年   166篇
  2011年   8篇
  2009年   9篇
  2008年   8篇
  2007年   11篇
  2006年   11篇
  2005年   15篇
  2004年   16篇
  2003年   10篇
  2002年   8篇
  2000年   14篇
  1999年   10篇
  1998年   12篇
  1997年   24篇
  1996年   19篇
  1994年   18篇
  1993年   7篇
  1992年   11篇
  1991年   22篇
  1990年   12篇
  1989年   19篇
  1988年   12篇
  1987年   21篇
  1986年   16篇
  1985年   16篇
  1984年   12篇
  1983年   15篇
  1982年   13篇
  1981年   13篇
  1980年   16篇
  1979年   17篇
  1978年   14篇
  1977年   15篇
  1976年   14篇
  1975年   12篇
  1974年   18篇
  1973年   18篇
  1972年   15篇
  1971年   19篇
  1970年   9篇
  1969年   11篇
  1968年   10篇
  1967年   8篇
排序方式: 共有914条查询结果,搜索用时 15 毫秒
821.
Robert S. McNamara [and Brian Van De Mark,] In Retrospect: The Tragedy and Lessons of Vietnam, NewYork:NewYork Times Books, Random House, 1995. Pp.xviii + 414. $27.50. ISBN 08129–2523–8.  相似文献   
822.
Many authors contend that ethnic extremism coupled with political manipulation were the primary factors behind the Rwandan genocide. Yet, to oversimplify the cause of this tragedy makes one blind to the complicated nexus that generated the outcome. Even though this genocide was quick in its execution, the events that lead to this massacre took years to unfold. We argue that the evolution of human capital and the competition for scarce resources contributed to the genocide.  相似文献   
823.
A recent article, ‘Rage Against the Machines’, does a disservice to the debate over what explains counterinsurgency (COIN) success. While it establishes a negative correlation between the diffusion of military mechanization in the state system and COIN success, its theoretical argument does not hold up under close scrutiny and its micro-case comparison of two units in Iraq during 2003–2004 ignores obvious counter-examples and factors that influence COIN success, such as leadership. A deeper inquiry would have revealed that there is much more to COIN success than simply not having access to vehicles.  相似文献   
824.
Taking insurgency sponsorship as an instrument states have available for achieving foreign policy objectives, I consider how state-sponsors could best manipulate their support to maximize control of the proxy group. Building on research that models the state-sponsor–insurgent relationship using a principal–agent framework, I identify two key vulnerabilities to which the state-sponsor is exposed: adverse selection and agency slack. As an original contribution to the literature on state-sponsorship of insurgency, I articulate reasons why certain forms of support would be most conducive to overcoming these problems and illustrate how South Africa and Iran used those kinds of support to influence the behavior of their proxies, RENAMO and Hezbollah. Additionally, I consider how this principal–agent analysis of insurgency sponsorship also could apply when the principal is an international terrorist organization such as al Qaeda. Finally, I address the relevance of these ideas to two contemporary conflicts taking place in Syria and the Congo.  相似文献   
825.
ABSTRACT

This paper challenges recent claims that competitive market dynamics incentivize Private Military and Security Companies (PMSCs) to fully commit to providing effective services, thereby reducing the duration of civil war. Our assessment of a most-likely case scenario for this argument – Sierra Leone – reveals four critical problems. First, there is rarely direct competition, even if numerous companies are present. Second, the presence of multiple PMSCs usually represents a collaboration among subsidiaries providing distinct services, often under the same corporate umbrella. Third, data aggregation obfuscates the overlap of PMSC presence, inflating the amount of perceived competition. Finally, we raise concerns regarding how quantitative analyses can conflate conflict intensity with conflict termination.  相似文献   
826.

In October 1959 the Eisenhower administration dispatched a CIA Special Team to survey the violence problem in Colombia. This article, part one of a two‐part series, examines this first significant attempt by a US administration to influence that nation's internal security situation. It investigates the Special Team's actions and analyses its recommendations for transforming Colombia's conventionally‐orientated security forces. The Team's survey, which focuses on counter‐insurgency tactics, civil action, intelligence operations, psychological warfare, and covert action, is the foundation from which Colombia's modern internal security structures are derived.  相似文献   
827.

Despite considerable post‐war planning, the British counter‐insurgency campaign in Kenya did not constitute a Colonial Office strategy for decolonisation. COIN in Kenya had one purpose: to re‐impose law and order, or British control. If for no other reason, this is demonstrated by the initial reluctance of the Colonial Office to intervene. Frequent re‐assessments and postponement of the ending of the State of Emergency, and the subordination of socio‐economic and political reforms to military objectives, show clearly that decolonisation was not high on the British list of priorities in Kenya. This article questions the relationship between COIN and decolonisation, and the validity of models of British counter‐insurgency.  相似文献   
828.
We consider a manufacturer (i.e., a capacitated supplier) that produces to stock and has two classes of customers. The primary customer places orders at regular intervals of time for a random quantity, while the secondary customers request a single item at random times. At a predetermined time the manufacturer receives advance demand information regarding the order size of the primary customer. If the manufacturer is not able to fill the primary customer's demand, there is a penalty. On the other hand, serving the secondary customers results in additional profit; however, the manufacturer can refuse to serve the secondary customers in order to reserve inventory for the primary customer. We characterize the manufacturer's optimal production and stock reservation policies that maximize the manufacturer's discounted profit and the average profit per unit time. We show that these policies are threshold‐type policies, and these thresholds are monotone with respect to the primary customer's order size. Using a numerical study we provide insights into how the value of information is affected by the relative demand size of the primary and secondary customers. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
829.
Designing Code Division Multiple Access networks includes determining optimal locations of radio towers and assigning customer markets to the towers. In this paper, we describe a deterministic model for tower location and a stochastic model to optimize revenue given a set of constructed towers. We integrate these models in a stochastic integer programming problem with simple recourse that optimizes the location of towers under demand uncertainty. We develop algorithms using Benders' reformulation, and we provide computational results. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
830.
This paper investigates civil conflict as a product of the survival strategies of African leaders. Specifically, the paper offers a theory of risk substitution that predicts coup-fearing leaders will undermine the military effectiveness of the state when making an effort to extend their own tenure. While ‘coup-proofing’ practices have often been noted as contributors to political survival, considerably less attention has been paid to the influence of these strategies on other forms of conflict. Utilising data from a number of cross-national datasets, the analyses show that having a higher number of ‘coup-proofing’ counterweights significantly worsens a state's civil conflict prospects. A brief consideration of multiple episodes of conflict further suggests that in addition to coup-proofing undermining the counterinsurgency capacity of the state, some leaders are simply indifferent to – or can even potentially benefit from – the existence of an insurgency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号