全文获取类型
收费全文 | 652篇 |
免费 | 32篇 |
国内免费 | 1篇 |
出版年
2021年 | 7篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 18篇 |
2016年 | 12篇 |
2015年 | 14篇 |
2014年 | 12篇 |
2013年 | 134篇 |
2011年 | 11篇 |
2010年 | 11篇 |
2009年 | 18篇 |
2008年 | 7篇 |
2007年 | 14篇 |
2006年 | 9篇 |
2005年 | 12篇 |
2004年 | 16篇 |
2003年 | 10篇 |
2002年 | 14篇 |
2001年 | 14篇 |
2000年 | 11篇 |
1999年 | 13篇 |
1998年 | 13篇 |
1997年 | 13篇 |
1996年 | 11篇 |
1995年 | 18篇 |
1994年 | 16篇 |
1993年 | 15篇 |
1992年 | 15篇 |
1991年 | 15篇 |
1990年 | 8篇 |
1989年 | 7篇 |
1988年 | 12篇 |
1987年 | 12篇 |
1985年 | 10篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 5篇 |
1981年 | 12篇 |
1980年 | 7篇 |
1979年 | 12篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1976年 | 6篇 |
1975年 | 11篇 |
1974年 | 7篇 |
1973年 | 7篇 |
1972年 | 8篇 |
1971年 | 7篇 |
1968年 | 5篇 |
1967年 | 5篇 |
排序方式: 共有685条查询结果,搜索用时 15 毫秒
671.
Michael Miller 《The Nonproliferation Review》2013,20(1):33-60
Recently, post-explosion nuclear forensics, or nuclear attribution, has gained a new spotlight within the nuclear weapons scientific and policymaking community. Academics are beginning to ask whether post-explosion forensics might create a replacement for an international nonproliferation regime, or at least offer a fallback option to deter states and individuals from selling nuclear materials. This paper examines current attribution technology from unclassified literature and finds the technology to be well developed but not foolproof, such that nuclear attribution currently provides little deterrent value. If current capabilities were publicized more thoroughly and if the post-explosion process of assessing the evidence were internationalized, states and intermediate actors might be deterred more effectively. Developing a nuclear fingerprint database is also discussed. While useful, its impact on deterrence would be minimal. 相似文献
672.
Cécile Aptel Williamson 《African Security Review》2013,22(1):20-31
It came as a surprise to many international observers when, on 31 March 2005, the United Nations Security Council passed resolution 1593, which referred the situation in Darfur to the jurisdiction of the International Criminal Court. Some celebrated this event as initiating a new era in which international criminal justice would prevail, but they might have done well to consider the objections immediately raised by the representatives of the Sudanese government, which was not a party to the ICC, a point that created a series of impediments to the implementation of the resolution. For all that the ICC has been charged with investigating crimes against humanity in Darfur, its investigators are being prevented from seeking the evidence on the ground essential to any successful prosecution. The Sudanese government has so far maintained its obstructive position, arguing that it is capable of handling such cases within its own sovereign jurisdiction. The imperative of excluding the ICC from Darfur has contributed to Khartoum's objections to the deployment of a UN force to replace the African Union mission there. In sum: the challenges faced by the ICC in Darfur demonstrate that international criminal justice does not operate in a political vacuum. 相似文献
673.
Some have argued that the transatlantic rancor over the Iraq war made cooperation, especially on nonproliferation, unlikely. In contrast, this article, documents post-invasion instances of nonproliferation cooperation, with particular emphasis on the Proliferation Security Initiative and the EU-3 Initiative—the British, French, and German negotiations with Iran over its suspected nuclear activities. In addition to documenting French and British participation in these initiatives, the article analyzes why they have chosen to participate and argues that France and Britain have participated in both efforts because they are committed to avoiding future Iraq-like preventive wars. 相似文献
674.
675.
676.
C. Christine Fair 《Small Wars & Insurgencies》2014,25(1):205-235
This essay reviews seven recent books and reports that focus upon the use of US armed drones in Pakistan's Federally Administered Tribal Areas (FATA). This essay synthesizes a historical account of the program, critically interrogates key arguments and evidence advanced by the authors, and draws attention the particular problems that confront those who live in the FATA and the second-class citizenship that the Pakistani state has bestowed upon them for reasons of domestic and foreign policy concerns. This review essay does not intend to be the final word on any of the ongoing policy debates. But it does hope to enable a wider audience to take part in these important deliberations. 相似文献
677.
Freedom C. Onuoha 《African Security Review》2014,23(4):405-411
Trafficking in persons in Nigeria has largely targeted adults and children, particularly women and girls. Of growing concern, however, is the recent emergence and growth of sophisticated and syndicated groups involved in baby ‘factories’ and trafficking in Nigeria. This article examines the nature, actors, modus operandi and motives behind this emergent dimension of human trafficking in Nigeria. It concludes that if concerted efforts are not made to deal with the actors and dismantle the market, its profitability will embolden current actors and even encourage new entrants into the booming trade – now and in the future. 相似文献
678.
679.
We consider a class of facility location problems with a time dimension, which requires assigning every customer to a supply facility in each of a finite number of periods. Each facility must meet all assigned customer demand in every period at a minimum cost via its production and inventory decisions. We provide exact branch‐and‐price algorithms for this class of problems and several important variants. The corresponding pricing problem takes the form of an interesting class of production planning and order selection problems. This problem class requires selecting a set of orders that maximizes profit, defined as the revenue from selected orders minus production‐planning‐related costs incurred in fulfilling the selected orders. We provide polynomial‐time dynamic programming algorithms for this class of pricing problems, as well as for generalizations thereof. Computational testing indicates the advantage of our branch‐and‐price algorithm over various approaches that use commercial software packages. These tests also highlight the significant cost savings possible from integrating location with production and inventory decisions and demonstrate that the problem is rather insensitive to forecast errors associated with the demand streams. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
680.
A Markov chain approach to detecting a threat in a given surveillance zone by a network of steerable sensors is presented. The network has a finite number of predetermined states, and transition from one state to another follows a Markov chain. Under the assumption that the threat avoids detection, two game theoretic problems for finding an optimal Markov chain (two surveillance strategies) are formulated: the first maximizes the probability of threat detection for two consecutive detection periods, whereas the second minimizes the average time of detection for the worst‐case threat's trajectory. Both problems are reduced to linear programming, and special techniques are suggested to solve them. For a dynamic environment with moving noise sources, the optimal Markov chain changes at each detection period, and the rate of convergence of the Markov chain to its stationary distribution is analyzed. Both surveillance strategies are tested in numerical experiments and compared one with another. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献