全文获取类型
收费全文 | 729篇 |
免费 | 14篇 |
出版年
2020年 | 6篇 |
2019年 | 16篇 |
2017年 | 24篇 |
2016年 | 18篇 |
2015年 | 19篇 |
2014年 | 22篇 |
2013年 | 141篇 |
2012年 | 8篇 |
2011年 | 9篇 |
2010年 | 13篇 |
2009年 | 16篇 |
2008年 | 8篇 |
2007年 | 8篇 |
2006年 | 11篇 |
2005年 | 11篇 |
2004年 | 13篇 |
2003年 | 10篇 |
2002年 | 15篇 |
2001年 | 5篇 |
2000年 | 8篇 |
1999年 | 8篇 |
1998年 | 16篇 |
1997年 | 9篇 |
1996年 | 11篇 |
1995年 | 9篇 |
1994年 | 19篇 |
1993年 | 17篇 |
1992年 | 12篇 |
1991年 | 16篇 |
1990年 | 11篇 |
1989年 | 19篇 |
1988年 | 19篇 |
1987年 | 17篇 |
1986年 | 21篇 |
1985年 | 16篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 9篇 |
1980年 | 5篇 |
1979年 | 8篇 |
1978年 | 12篇 |
1976年 | 7篇 |
1975年 | 6篇 |
1974年 | 9篇 |
1973年 | 7篇 |
1972年 | 9篇 |
1970年 | 9篇 |
1969年 | 6篇 |
1967年 | 7篇 |
排序方式: 共有743条查询结果,搜索用时 15 毫秒
601.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t. 相似文献
602.
A general model for the failure of fibrous composite materials is described. It is shown to contain some of the well-known models in the literature. The composite material is viewed as a coherent system of independent identically distributed component strengths. Under the assumption that the applied load is redistributed “homotonically” to the unfailed components upon the failure of a component (an individual fiber segment) and that the distributions of component strengths are IFRA, it is shown that the system (composite) strength distribution is also IFRA. Examples are given using carbon reinforced composite data to illustrate the IFRA property. 相似文献
603.
J. George Shanthikumar 《海军后勤学研究》1989,36(6):797-806
The two purposes of this article are to illustrate the power and simplicity of level crossing analysis and to present a conservation identity for M/G/1 priority queues with server vacations. To illustrate the use of level crossing analysis we apply it to preemptive (resume) priority M/G/1 queues with single- and multiple-server vacations considered by Kella and Yechiali (1986) and to non-preemptive priority M/M/c queues considered by Kella and Yechiali (1985). The conservation identity presented here states that the ratios of mean waiting times in an M/G/1 queue with and without server vacation policies are independent of the service discipline for first come first served, shortest processing time, shortest processing time within generations and non-preemptive priority service disciplines. 相似文献
604.
605.
Dennis J. Blasko 《战略研究杂志》2016,39(5-6):685-708
ABSTRACTThe Chinese People’s Liberation Army (PLA) is halfway through a multi-decade modernization process. It has begun a major restructuring effort as it shifts its focus from a traditional continental defensive posture to a more maritime-oriented emphasis. In order to create more balanced joint force, it has adjusted the structure of its highest command organization, the Central Military Commission; abolished the former four General Departments and seven Military Regions; created five new joint Theater Commands and service-level commands for the Army and Rocket Force; and is reducing the size of its active duty force by 300,000 personnel. While seeking to overcome numerous internal obstacles, the PLA continues to develop and improve its capabilities to conduct integrated joint operations to deter a variety of threats to China’s sovereignty and territory and, if deterrence fails, to win informationized local war. 相似文献
606.
Timothy J. Lomperis 《Small Wars & Insurgencies》2016,27(1):132-153
In a military intervention, do surges work? I compare the failed ‘surge’ in Vietnam, the repulse of the Easter Invasion in 1972, as a means of assessing the more ambiguous surges in Iraq and Afghanistan. I identify four features of a surge for this analysis: the military dimensions and strategy of the surging forces, the military capabilities of the host forces, the political vitality and will of the host country, and the political commitment in the domestic politics of the intervener. I find that the last feature is the most critical; and, in all three surges, the American political commitment was lacking. 相似文献
607.
The relationship between economic growth and military expenditure has been the subject of a large literature in defence economics. This study analyses the influence of military expenditures on economic growth in a global perspective for the time period 2000–2010 taking spatial dimension into account. The augmented Solow model is employed to investigate the defence-growth nexus using the cross-sectional data relating to 128 countries. Following a traditional regression analysis, spatial variations in the relationships are examined utilizing different spatial econometric specifications estimated by maximum likelihood. The regressions are compared with each other via likelihood ratio tests, and the spatial Durbin model is found to be the most appropriate one suggesting that the typical least-squares model is misspecified. Empirical evidence indicates that military expenditure has a positive effect on economic growth with a significant spatial dependence for the time period under consideration. 相似文献
608.
Bryan J. Arva 《Defence and Peace Economics》2016,27(1):1-36
Qualitative studies of terrorist movements frequently highlight the importance of diaspora communities as important factors in producing and sustaining terrorist activity in countries. The underlying theoretical argument is that bifurcation of tight-knit minority communities between countries nurtures separatist or irredentist sentiments among affected community members, thus prompting terrorist activity, while minority community members in other countries might mobilize financial and political resources to support terrorist activity among their compatriots. In this study, we empirically test whether transnational dispersion, versus domestic concentration, of minority communities in countries produces higher incidents of terrorism. Conducting a series of negative binomial estimations on a reshaped database of around 170 countries from 1981 to 2006, derived from the Minorities at Risk database and the Global Terrorism Database, we determine that both transnational dispersion of kin minority communities and domestic concentration of minorities within countries increase terrorism and that transnational dispersion is a particularly robust predictor of terrorist attacks. 相似文献
609.
610.