首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   634篇
  免费   0篇
  634篇
  2019年   14篇
  2018年   6篇
  2017年   19篇
  2016年   11篇
  2015年   15篇
  2014年   18篇
  2013年   130篇
  2012年   8篇
  2011年   7篇
  2010年   8篇
  2009年   11篇
  2008年   6篇
  2007年   8篇
  2006年   9篇
  2005年   11篇
  2004年   11篇
  2003年   6篇
  2002年   10篇
  2000年   7篇
  1999年   6篇
  1998年   13篇
  1997年   7篇
  1996年   8篇
  1995年   5篇
  1994年   16篇
  1993年   15篇
  1992年   8篇
  1991年   16篇
  1990年   8篇
  1989年   15篇
  1988年   14篇
  1987年   16篇
  1986年   16篇
  1985年   12篇
  1984年   8篇
  1983年   8篇
  1982年   7篇
  1981年   10篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   9篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有634条查询结果,搜索用时 0 毫秒
91.
92.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
93.
94.
    
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
95.
    
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   
96.
    
  相似文献   
97.
This article examines the Ottoman military's escalatory response to violence and frames the Armenian insurrection of 1915 in the historical context of contemporary early twentieth-century counterinsurgency campaigns. A case study is presented, from a military historian's perspective, of counterinsurgency operations conducted by the Ottoman Army's 41st Infantry Division against Armenian insurgents on Musa Da? (Musa Dagh) in an operational area south of Iskenderun (Alexandretta). In this particular operational area, it appears that the modern label which most closely approximates what happened there is ethnic cleansing. Finally, the article concludes with an objective assessment of the effectiveness of the Ottoman Army's counterinsurgency operations.  相似文献   
98.
    
During the Nigerian Civil War (1967–1970), France chose to support Biafra, but only on a limited scale, providing mercenaries and obsolete weaponry to Ojukwu's regime. General Charles de Gaulle's assistance to Ojukwu was conditioned by the French military drawdown after 1961, the increased power of French secret services on the continent, and the interventions in Katanga (1960–1963), Gabon (1964) and Chad (1968–1972). France supported Biafra primarily to protect its former colonies from Nigeria, stop Soviet subversion and acquire an economic foothold in the oil-rich Niger Delta. De Gaulle chose a limited strategy for two reasons. If Biafra won the war, France would be Biafra's greatest ally. If Nigeria won the war, France could extricate itself from the situation relatively easily and re-establish relations with the Nigerian government, which is what ultimately occurred.  相似文献   
99.
    
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
100.
    
Abstract

This paper examines the generation of technological knowledge by leading companies in the defence industry. In particular, we test whether the characteristics of large defence companies are related to both the production of different types of patents (civilian, military and mixed), and the generation of dual-use technologies. To explore these links, we rely on economic data for the top 100 defence companies from the Stockholm International Peace Research Institute database, and patent information from the Worldwide Patent Statistical Database. Our results show that the relationship between the production of civilian patents and the size of the company is positive and significant. However, this relationship does not hold for the production of military patents. Furthermore, the military commercial profile is unrelated to the generation of military patents. Regarding the involvement in dual-use technologies, firms engaged in dual-use are those with higher military sales, a greater number of employees and a larger number of patents (civilian, military and mixed) than those not engaged in dual-use. Furthermore, we found a skill effect (more involvement in dual-use per employee) in European firms compared to US firms. These findings help to identify which firms should be targeted by government policies if increasing dual-use technologies becomes a political objective.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号