全文获取类型
收费全文 | 639篇 |
免费 | 10篇 |
出版年
2019年 | 17篇 |
2018年 | 10篇 |
2017年 | 18篇 |
2016年 | 17篇 |
2015年 | 15篇 |
2014年 | 9篇 |
2013年 | 110篇 |
2011年 | 9篇 |
2010年 | 11篇 |
2009年 | 9篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 10篇 |
2005年 | 13篇 |
2004年 | 10篇 |
2003年 | 10篇 |
2002年 | 7篇 |
2001年 | 5篇 |
2000年 | 10篇 |
1999年 | 8篇 |
1998年 | 9篇 |
1997年 | 12篇 |
1996年 | 15篇 |
1995年 | 9篇 |
1994年 | 14篇 |
1993年 | 9篇 |
1992年 | 10篇 |
1991年 | 17篇 |
1990年 | 11篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 13篇 |
1986年 | 14篇 |
1985年 | 15篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 10篇 |
1975年 | 6篇 |
1974年 | 12篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 13篇 |
1969年 | 6篇 |
1968年 | 6篇 |
排序方式: 共有649条查询结果,搜索用时 15 毫秒
51.
52.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
53.
Timothy C. Barkdoll Donald P. Gaver Kevin D. Glazebrook Patricia A. Jacobs Sergio Posadas 《海军后勤学研究》2002,49(8):723-742
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046 相似文献
54.
55.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
56.
A. W. Kemp 《海军后勤学研究》1987,34(6):853-858
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system. 相似文献
57.
Jutta Joachim Marlen Martin Henriette Lange Andrea Schneiker Magnus Dau 《Contemporary Security Policy》2018,39(2):298-316
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies. 相似文献
58.
Mean residual life of coherent systems consisting of multiple types of dependent components
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Mean residual life is a useful dynamic characteristic to study reliability of a system. It has been widely considered in the literature not only for single unit systems but also for coherent systems. This article is concerned with the study of mean residual life for a coherent system that consists of multiple types of dependent components. In particular, the survival signature based generalized mixture representation is obtained for the survival function of a coherent system and it is used to evaluate the mean residual life function. Furthermore, two mean residual life functions under different conditional events on components’ lifetimes are also defined and studied. 相似文献
59.
Susan B. Martin 《战略研究杂志》2016,39(3):321-364
The role of norms and military utility in the use of weapons is disputed by constructivist and realist scholars. Through an examination of US decision-making regarding anti-plant and irritant agents in the Vietnam War, I advance this debate in three key ways. First, I develop structural realism’s expectations regarding the role of military utility. Second, I demonstrate that social and material factors are at play in our understandings of both ‘norms’ and ‘military utility’, and that both played a role in US decisions. Third, I find that the dominant role – as structural realism expects – was played by military utility. 相似文献
60.
Since declaring their nuclear weapons capabilities in 1998, India and Pakistan have engaged in three major crises that each threatened to escalate into war. In each crisis, the USA engaged in active diplomacy to dissuade the South Asian rivals from taking escalatory actions. Previous literature on the crises has described the American role, but has not theorized third-party involvement in a nuclearized regional rivalry. We apply Timothy Crawford’s pivotal deterrence theory to the nuclearized India–Pakistan conflict, and extend the original theory to cover the novel condition of a non-superpower nuclear dyad, in the context of a single-superpower international system. We find that America’s pivotal deterrence generally enhanced stability in the India–Pakistan crises, and unlike in pre-nuclear South Asia, other great powers supported American diplomacy. However, we suggest that future regional crises between nuclear rivals, in South Asia or elsewhere, may present greater challenges for pivotal deterrence. 相似文献