首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   979篇
  免费   24篇
  2021年   16篇
  2019年   31篇
  2018年   14篇
  2017年   26篇
  2016年   21篇
  2015年   24篇
  2014年   23篇
  2013年   197篇
  2011年   8篇
  2010年   9篇
  2009年   14篇
  2007年   11篇
  2006年   11篇
  2005年   16篇
  2004年   18篇
  2003年   10篇
  2002年   14篇
  2000年   12篇
  1999年   10篇
  1998年   18篇
  1997年   20篇
  1996年   15篇
  1994年   23篇
  1993年   15篇
  1992年   12篇
  1991年   23篇
  1990年   11篇
  1989年   19篇
  1988年   20篇
  1987年   24篇
  1986年   23篇
  1985年   17篇
  1984年   13篇
  1983年   14篇
  1982年   13篇
  1981年   12篇
  1980年   11篇
  1979年   17篇
  1978年   17篇
  1977年   10篇
  1976年   14篇
  1975年   12篇
  1974年   14篇
  1973年   17篇
  1972年   13篇
  1971年   9篇
  1970年   15篇
  1969年   12篇
  1968年   9篇
  1967年   11篇
排序方式: 共有1003条查询结果,搜索用时 15 毫秒
931.
This paper addresses a two‐machine open shop scheduling problem, in which the machines are not continuously available for processing. The processing of an operation affected by a non‐availability interval can be interrupted and resumed later. The objective is to minimize the makespan. We present two polynomial‐time approximation schemes, one of which handles the problem with one non‐availability interval on each machine and the other for the problem with several non‐availability intervals on one of the machines. Problems with a more general structure of the non‐availability intervals are not approximable in polynomial time within a constant factor, unless . © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
932.
This paper proposes a skewness correction (SC) method for constructing the and R control charts for skewed process distributions. Their asymmetric control limits (about the central line) are based on the degree of skewness estimated from the subgroups, and no parameter assumptions are made on the form of process distribution. These charts are simply adjustments of the conventional Shewhart control charts. Moreover, the chart is almost the same as the Shewhart chart if the process distribution is known to be symmetrical. The new charts are compared with the Shewhart charts and weighted variance (WV) control charts. When the process distribution is in some neighborhood of Weibull, lognormal, Burr or binomial family, simulation shows that the SC control charts have Type I risk (i.e., probability of a false alarm) closer to 0.27% of the normal case. Even in the case where the process distribution is exponential with known mean, not only the control limits and Type I risk, but also the Type II risk of the SC charts are closer to those of the exact and R charts than those of the WV and Shewhart charts. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 555–573, 2003  相似文献   
933.
On War’s unfinished state has been a source of difficulties for interpretation for 180 years. By establishing a hierarchy of revision among the parts, we propose a criterion that can bring any part of On War in line with the most advanced stage of Clausewitz’s thinking. We exemplify the utility, illustrate the underpinnings and appreciate the potential of this criterion. We argue that the criterion offers the prospect of a shared, coherent, fully consistent and faithful rendering of Clausewitz’s theory of war.  相似文献   
934.
Does proliferation increase the risk of war between new nuclear powers? Two schools of thought ‐ proliferation pessimists and optimists ‐ offer very different answers. The former stress the first‐strike danger of nuclear‐armed ballistic missiles and the resulting crisis instability as a cause of preemptive war. The latter stress the caution‐inducing effects of nuclear warheads and fear of retaliation as a check on would‐be attackers.

To bridge the gap between these two schools, Daniel Ellsberg's concept of critical risk is used to show how the likelihood of war changes as new nuclear powers enlarge and improve their missile forces. Ellsberg's framework suggests that the danger of war is low between recent proliferators but rises as nuclear stockpiles grow, thereby changing the payoffs associated with striking first or striking second and increasing the danger of war due to accidents, miscalculations, and uncontrollable interactions between rival nuclear forces.

Ellsberg's framework also suggests that the transition from weaponization to secure second strike force is likely to be long and difficult, in part because short‐range missiles like India's Prithvi are better suited to strike first than to strike second, and in part because negative control procedures reduce the value of striking second, thereby increasing the attraction of a preemptive strike.  相似文献   
935.
This study examines the problems of paramilitary decommissioning in Northern Ireland. It analyses why decommissioning has become so contentious in the Northern Ireland peace process. Decommissioning, though, is not a unique or intrinsically insurmountable problem. This is demonstrated by highlighting the issue in international context. Three examples of decommissioning in conflict resolution processes are assessed: the Lebanon, El Salvador and Mozambique. These varied examples do supply some limited lessons for Northern Ireland. This study argues that the explanation for the intractability of decommissioning in Northern Ireland resides, to a greater extent, in the tactical and strategic reasoning of the main paramilitary groupings in Northern Ireland. The factors that condition their thinking, however, can be found in the nature of the peace process itself which provides the paramilitiaries with every incentive to retain possession of their weapons.  相似文献   
936.
The discovery and elimination of Iraq's alleged weapons of mass destruction (WMD) was a focal point of the Coalition's strategy and operations in the aftermath of Operation ‘Iraqi Freedom’. Despite the failure of the WMD mission to meet expectations after almost two years of intensive operations, the Iraq Survey Group (ISG) was able to integrate multinational and multi-agency forces to provide detailed intelligence regarding the history of Iraq's WMD programs and to assist in the battle against insurgents. The ISG's experience raises the question of whether a standing intelligence force could become a key component in future counterproliferation and counterterrorism efforts around the world.1 1The views expressed in this paper are those of the author and do not reflect the official policy or position of the Defense Intelligence Agency, the Dept. of Defense, or the US Government. View all notes  相似文献   
937.
938.
After World War II, the US Navy confronted the challenge of adapting to dramatically altered geopolitical circumstances. Moscow did not have an ocean-going fleet, and early Cold War strategy was dominated by the salient position of nuclear strategic bombing – a mission thought to be outside the purview of the navy. Traditional roles, such as protecting sea lines of communication and supporting ground forces ashore, quickly proved indispensable. However, the navy eventually also succeeded in fielding dramatic technological and institutional innovations, for example, the strategic missile submarine, which enabled the US to successfully leverage maritime power against the continental power of the USSR.  相似文献   
939.
This paper demonstrates that US–Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed. Bilateral US intelligence liaison relations with nominally neutral Sweden were of particular importance in the early years of the Cold War given its geographic location adjacent to the northwestern portion of the USSR. Moreover, the importance of Sigint received from the three principal Scandinavian countries covered by this paper (Norway, Denmark, and Sweden) proved to be quite important to the US intelligence community during the early years of the Cold War, when the US Sigint infrastructure was relatively weak and stretched thin by commitments in Asia and elsewhere. This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations, demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by.  相似文献   
940.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号