首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   652篇
  免费   32篇
  国内免费   1篇
  2021年   7篇
  2019年   10篇
  2018年   9篇
  2017年   18篇
  2016年   12篇
  2015年   14篇
  2014年   12篇
  2013年   134篇
  2011年   11篇
  2010年   11篇
  2009年   18篇
  2008年   7篇
  2007年   14篇
  2006年   9篇
  2005年   12篇
  2004年   16篇
  2003年   10篇
  2002年   14篇
  2001年   14篇
  2000年   11篇
  1999年   13篇
  1998年   13篇
  1997年   13篇
  1996年   11篇
  1995年   18篇
  1994年   16篇
  1993年   15篇
  1992年   15篇
  1991年   15篇
  1990年   8篇
  1989年   7篇
  1988年   12篇
  1987年   12篇
  1985年   10篇
  1984年   9篇
  1983年   8篇
  1982年   5篇
  1981年   12篇
  1980年   7篇
  1979年   12篇
  1978年   6篇
  1977年   5篇
  1976年   6篇
  1975年   11篇
  1974年   7篇
  1973年   7篇
  1972年   8篇
  1971年   7篇
  1968年   5篇
  1967年   5篇
排序方式: 共有685条查询结果,搜索用时 15 毫秒
671.
Recently, post-explosion nuclear forensics, or nuclear attribution, has gained a new spotlight within the nuclear weapons scientific and policymaking community. Academics are beginning to ask whether post-explosion forensics might create a replacement for an international nonproliferation regime, or at least offer a fallback option to deter states and individuals from selling nuclear materials. This paper examines current attribution technology from unclassified literature and finds the technology to be well developed but not foolproof, such that nuclear attribution currently provides little deterrent value. If current capabilities were publicized more thoroughly and if the post-explosion process of assessing the evidence were internationalized, states and intermediate actors might be deterred more effectively. Developing a nuclear fingerprint database is also discussed. While useful, its impact on deterrence would be minimal.  相似文献   
672.
It came as a surprise to many international observers when, on 31 March 2005, the United Nations Security Council passed resolution 1593, which referred the situation in Darfur to the jurisdiction of the International Criminal Court. Some celebrated this event as initiating a new era in which international criminal justice would prevail, but they might have done well to consider the objections immediately raised by the representatives of the Sudanese government, which was not a party to the ICC, a point that created a series of impediments to the implementation of the resolution. For all that the ICC has been charged with investigating crimes against humanity in Darfur, its investigators are being prevented from seeking the evidence on the ground essential to any successful prosecution. The Sudanese government has so far maintained its obstructive position, arguing that it is capable of handling such cases within its own sovereign jurisdiction. The imperative of excluding the ICC from Darfur has contributed to Khartoum's objections to the deployment of a UN force to replace the African Union mission there. In sum: the challenges faced by the ICC in Darfur demonstrate that international criminal justice does not operate in a political vacuum.  相似文献   
673.
Some have argued that the transatlantic rancor over the Iraq war made cooperation, especially on nonproliferation, unlikely. In contrast, this article, documents post-invasion instances of nonproliferation cooperation, with particular emphasis on the Proliferation Security Initiative and the EU-3 Initiative—the British, French, and German negotiations with Iran over its suspected nuclear activities. In addition to documenting French and British participation in these initiatives, the article analyzes why they have chosen to participate and argues that France and Britain have participated in both efforts because they are committed to avoiding future Iraq-like preventive wars.  相似文献   
674.
675.
676.
This essay reviews seven recent books and reports that focus upon the use of US armed drones in Pakistan's Federally Administered Tribal Areas (FATA). This essay synthesizes a historical account of the program, critically interrogates key arguments and evidence advanced by the authors, and draws attention the particular problems that confront those who live in the FATA and the second-class citizenship that the Pakistani state has bestowed upon them for reasons of domestic and foreign policy concerns. This review essay does not intend to be the final word on any of the ongoing policy debates. But it does hope to enable a wider audience to take part in these important deliberations.  相似文献   
677.
Trafficking in persons in Nigeria has largely targeted adults and children, particularly women and girls. Of growing concern, however, is the recent emergence and growth of sophisticated and syndicated groups involved in baby ‘factories’ and trafficking in Nigeria. This article examines the nature, actors, modus operandi and motives behind this emergent dimension of human trafficking in Nigeria. It concludes that if concerted efforts are not made to deal with the actors and dismantle the market, its profitability will embolden current actors and even encourage new entrants into the booming trade – now and in the future.  相似文献   
678.
679.
We consider a class of facility location problems with a time dimension, which requires assigning every customer to a supply facility in each of a finite number of periods. Each facility must meet all assigned customer demand in every period at a minimum cost via its production and inventory decisions. We provide exact branch‐and‐price algorithms for this class of problems and several important variants. The corresponding pricing problem takes the form of an interesting class of production planning and order selection problems. This problem class requires selecting a set of orders that maximizes profit, defined as the revenue from selected orders minus production‐planning‐related costs incurred in fulfilling the selected orders. We provide polynomial‐time dynamic programming algorithms for this class of pricing problems, as well as for generalizations thereof. Computational testing indicates the advantage of our branch‐and‐price algorithm over various approaches that use commercial software packages. These tests also highlight the significant cost savings possible from integrating location with production and inventory decisions and demonstrate that the problem is rather insensitive to forecast errors associated with the demand streams. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
680.
A Markov chain approach to detecting a threat in a given surveillance zone by a network of steerable sensors is presented. The network has a finite number of predetermined states, and transition from one state to another follows a Markov chain. Under the assumption that the threat avoids detection, two game theoretic problems for finding an optimal Markov chain (two surveillance strategies) are formulated: the first maximizes the probability of threat detection for two consecutive detection periods, whereas the second minimizes the average time of detection for the worst‐case threat's trajectory. Both problems are reduced to linear programming, and special techniques are suggested to solve them. For a dynamic environment with moving noise sources, the optimal Markov chain changes at each detection period, and the rate of convergence of the Markov chain to its stationary distribution is analyzed. Both surveillance strategies are tested in numerical experiments and compared one with another. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号