全文获取类型
收费全文 | 634篇 |
免费 | 0篇 |
专业分类
634篇 |
出版年
2019年 | 14篇 |
2018年 | 6篇 |
2017年 | 19篇 |
2016年 | 11篇 |
2015年 | 15篇 |
2014年 | 18篇 |
2013年 | 130篇 |
2012年 | 8篇 |
2011年 | 7篇 |
2010年 | 8篇 |
2009年 | 11篇 |
2008年 | 6篇 |
2007年 | 8篇 |
2006年 | 9篇 |
2005年 | 11篇 |
2004年 | 11篇 |
2003年 | 6篇 |
2002年 | 10篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 13篇 |
1997年 | 7篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 16篇 |
1993年 | 15篇 |
1992年 | 8篇 |
1991年 | 16篇 |
1990年 | 8篇 |
1989年 | 15篇 |
1988年 | 14篇 |
1987年 | 16篇 |
1986年 | 16篇 |
1985年 | 12篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 7篇 |
1981年 | 10篇 |
1980年 | 5篇 |
1979年 | 8篇 |
1978年 | 12篇 |
1976年 | 7篇 |
1975年 | 6篇 |
1974年 | 8篇 |
1973年 | 7篇 |
1972年 | 9篇 |
1970年 | 9篇 |
1969年 | 6篇 |
1968年 | 4篇 |
1967年 | 6篇 |
排序方式: 共有634条查询结果,搜索用时 0 毫秒
91.
92.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor. 相似文献
93.
94.
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
95.
David J. Karl 《战略研究杂志》2013,36(4):619-641
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies. 相似文献
96.
97.
This article examines the Ottoman military's escalatory response to violence and frames the Armenian insurrection of 1915 in the historical context of contemporary early twentieth-century counterinsurgency campaigns. A case study is presented, from a military historian's perspective, of counterinsurgency operations conducted by the Ottoman Army's 41st Infantry Division against Armenian insurgents on Musa Da? (Musa Dagh) in an operational area south of Iskenderun (Alexandretta). In this particular operational area, it appears that the modern label which most closely approximates what happened there is ethnic cleansing. Finally, the article concludes with an objective assessment of the effectiveness of the Ottoman Army's counterinsurgency operations. 相似文献
98.
Robert J. Bunker 《Small Wars & Insurgencies》2013,24(1):114-121
During the Nigerian Civil War (1967–1970), France chose to support Biafra, but only on a limited scale, providing mercenaries and obsolete weaponry to Ojukwu's regime. General Charles de Gaulle's assistance to Ojukwu was conditioned by the French military drawdown after 1961, the increased power of French secret services on the continent, and the interventions in Katanga (1960–1963), Gabon (1964) and Chad (1968–1972). France supported Biafra primarily to protect its former colonies from Nigeria, stop Soviet subversion and acquire an economic foothold in the oil-rich Niger Delta. De Gaulle chose a limited strategy for two reasons. If Biafra won the war, France would be Biafra's greatest ally. If Nigeria won the war, France could extricate itself from the situation relatively easily and re-establish relations with the Nigerian government, which is what ultimately occurred. 相似文献
99.
Matthew Stein 《Small Wars & Insurgencies》2013,24(3):394-412
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence. 相似文献
100.
Manuel Acosta Daniel Coronado Esther Ferrandiz M. Rosario Marin Pedro J. Moreno 《Defence and Peace Economics》2013,24(7):821-839
AbstractThis paper examines the generation of technological knowledge by leading companies in the defence industry. In particular, we test whether the characteristics of large defence companies are related to both the production of different types of patents (civilian, military and mixed), and the generation of dual-use technologies. To explore these links, we rely on economic data for the top 100 defence companies from the Stockholm International Peace Research Institute database, and patent information from the Worldwide Patent Statistical Database. Our results show that the relationship between the production of civilian patents and the size of the company is positive and significant. However, this relationship does not hold for the production of military patents. Furthermore, the military commercial profile is unrelated to the generation of military patents. Regarding the involvement in dual-use technologies, firms engaged in dual-use are those with higher military sales, a greater number of employees and a larger number of patents (civilian, military and mixed) than those not engaged in dual-use. Furthermore, we found a skill effect (more involvement in dual-use per employee) in European firms compared to US firms. These findings help to identify which firms should be targeted by government policies if increasing dual-use technologies becomes a political objective. 相似文献