全文获取类型
收费全文 | 474篇 |
免费 | 13篇 |
出版年
2021年 | 5篇 |
2019年 | 12篇 |
2018年 | 10篇 |
2017年 | 12篇 |
2016年 | 7篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 107篇 |
2011年 | 5篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2006年 | 7篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 12篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 11篇 |
1991年 | 11篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 11篇 |
1987年 | 11篇 |
1986年 | 8篇 |
1985年 | 8篇 |
1984年 | 6篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 8篇 |
1980年 | 11篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 9篇 |
1974年 | 4篇 |
1971年 | 9篇 |
1970年 | 5篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 5篇 |
1966年 | 7篇 |
排序方式: 共有487条查询结果,搜索用时 15 毫秒
101.
Spencer D. Bakich 《Small Wars & Insurgencies》2013,24(4):688-711
Under what conditions can leaders achieve wartime political–military integration? In the Vietnam War, political–military integration exhibited dramatic variation: in the air war, the US was able to tightly integrate its political objectives and military conduct, but in the ground war, the American military prosecuted a strategy that was both divorced from broader political objectives and was immune from Washington's influence. I argue that the nature of information management between the military and civilian leadership explains the pattern of political–military integration in the Vietnam War more completely than do explanations that focus on the organizational cultures of professional militaries. 相似文献
102.
Michael Dartnell 《Small Wars & Insurgencies》2013,24(3):116-135
The article takes the cases of Peru's Tupac Amaru Revolutionary Movement (MRTA) as the pont of departure to discuss how a insurgent political movement uses the Internet and World Wide Web (WWW). During the 1996–97 Japanese Embassy hostage incident in Lima, Peru, MRTA supporters in Japan, Europe and North America used online technology to relay the group's message to a global public. The resulting direct media access provided the MRTA with an unprecendented level of global publicity. Through referring to the ‘MRTA Solidarity Page’, the types of message transmitted, the forms of transmission (text, video, audio, e‐mail or other), and target publics (national, global, political elites, media), the article outlines the issues and theoretical challenges raised by electronic anti‐government information provision. The Internet and WWW do not alone constitute the threat to state power as some analysts suggest but does in some sense dramatically alter political communication. New media will probably co‐exist with other forms of political communication for some time. 相似文献
103.
Majak D’Agoôt 《Small Wars & Insurgencies》2013,24(3):679-702
ABSTRACTWhen on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states. 相似文献
104.
Edward G. Keating Irv Blickstein Michael Boito Jess Chandler Deborah Peetz 《Defence and Peace Economics》2014,25(3):271-280
Building on prior work on optimal replacement of aging aircraft, this paper presents three methodologies to evaluate prospective aviation Service Life Extension Programs (SLEPs) and applies these methodologies to US Navy F/A-18E/F data. While considerable uncertainty remains as to the values of key parameters (e.g. the cost of F/A-18E/F SLEPs), the preponderance of the evidence available at this juncture favors undertaking SLEPs on F/A-18E/Fs rather than replacing them with new Joint Strike Fighters. 相似文献
105.
106.
Single- and multi-facility location problems are often solved with iterative computational procedures. Although these procedures have proven to converage, in practice it is desirable to be able to compute a lower bound on the objective function at each iteration. This enables the user to stop the iterative process when the objective function is within a prespecified tolerance of the optimum value. In this article we generalize a new bounding method to include multi-facility problems with lp distances. A proof is given that for Euclidean distance problems the new bounding procedure is superior to two other known methods. Numerical results are given for the three methods. 相似文献
107.
Tolerance limits which control both tails of the normal distribution so that there is no more than a proportion β1 in one tail and no more than β2 in the other tail with probability γ may be computed for any size sample. They are computed from X? - k1S and X? - k2S, where X? and S are the usual sample mean and standard deviation and k1 and k2 are constants previously tabulated in Odeh and Owen [3]. The question addressed is, “Just how accurate are the coverages of these intervals (– Infin;, X? – k1S) and (X? + k2S, ∞) for various size samples?” The question is answered in terms of how widely the coverage of each tail interval differs from the corresponding required content with a given confidence γ′. 相似文献
108.
109.
110.
In this article, we describe a new algorithm for solving all-integer, integer programming problems. We generate upper bounds on the decision variables, and use these bounds to create an advanced starting point for a dual all-integer cutting plane algorithm. In addition, we use a constraint derived from the objective function to speed progress toward the optimal solution. Our basic vehicle is the dual all-integer algorithm of Gomory, but we incorporate certain row- and column-selection criteria which partially avoid the problem of dual-degenerate iterations. We present the results of computational testing. 相似文献