首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   492篇
  免费   23篇
  国内免费   1篇
  2021年   6篇
  2019年   11篇
  2018年   9篇
  2017年   13篇
  2016年   10篇
  2015年   9篇
  2014年   10篇
  2013年   125篇
  2012年   7篇
  2011年   9篇
  2010年   8篇
  2009年   7篇
  2008年   7篇
  2007年   6篇
  2006年   11篇
  2005年   9篇
  2004年   6篇
  2003年   5篇
  2002年   6篇
  2000年   5篇
  1997年   7篇
  1996年   10篇
  1995年   6篇
  1994年   8篇
  1993年   12篇
  1992年   12篇
  1991年   9篇
  1990年   4篇
  1989年   10篇
  1988年   9篇
  1987年   8篇
  1986年   7篇
  1985年   10篇
  1984年   5篇
  1983年   6篇
  1982年   5篇
  1981年   7篇
  1980年   9篇
  1979年   8篇
  1978年   8篇
  1976年   7篇
  1975年   13篇
  1974年   6篇
  1973年   9篇
  1972年   5篇
  1971年   5篇
  1970年   6篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
排序方式: 共有516条查询结果,搜索用时 15 毫秒
461.
This essay re-examines coalition warfare during the Napoleonic era by looking at the three eastern European powers – Austria, Prussia and Russia – how they interacted over time with France as well as each other, and how they managed French preponderance on the Continent. Before 1812, coalition warfare was dominated by eighteenth-century military and diplomatic attitudes: overall foreign political goals were ill-defined and were characterised by deep mistrust. The result was that the eastern powers pursued their own interests with little regard to coalition cohesion. If the coalition held together in 1813 and 1814, on the other hand, it was largely because individual powers' self-interest coincided with the overall objectives of the coalition – an increased determination to defeat Napoleon – along with a never before seen numerical superiority in allied troops. In this, Austria and especially Chancellor Metternich's role in juggling conflicting interests between the allies so that they could present, for the first time, a united front against France was fundamental.  相似文献   
462.
This article discusses a two‐player noncooperative nonzero‐sum inspection game. There are multiple sites that are subject to potential inspection by the first player (an inspector). The second player (potentially a violator) has to choose a vector of violation probabilities over the sites, so that the sum of these probabilities do not exceed one. An efficient method is introduced to compute all Nash equilibria parametrically in the amount of resource that is available to the inspector. Sensitivity analysis reveals nonmonotonicity of the equilibrium utility of the inspector, considered as a function of the amount of resource that is available to it; a phenomenon which is a variant of the well‐known Braess paradox. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
463.
Although the Soviet missile defence effort was begun to protect the USSR from attack by nuclear missiles, Khrushchev was quick to see its political value, and used the prospect of an anti‐ballistic missile system to emphasize Soviet technological superiority. Within the Soviet armed forces there was widespread consensus about the importance of ABM's damage‐limiting role. The debates about strategy for future war in Soviet military publications demonstrate that support in the armed forces for an ABM capability transcended service loyalties and remained remarkably strong even after 1962, when technical problems and an effort to improve relations with the US following the Cuban Missile Crisis meant that the missile defence project no longer enjoyed the public backing of senior Party and military figures.  相似文献   
464.
This article begins with a discussion of sovereignty and goes on to discuss the idea of national security threats with reference to two different levels of analysis. First, the traditional-legal versus a more realistic contemporary level of analysis. Second, the operational, strategic, and political levels of analysis. The traditional concept tends to focus attention on the tactical-operational levels of activity, and the more contemporary notion broadens analysis to more strategic-political concerns. The article concludes with the argument that a broadened concept of threat to national security and sovereignty is meaningful and important. This is particularly important for those governments in the Western Hemisphere – and elsewhere – that do not discern any serious security issues, or proverbial clouds, on their peaceful horizons. Ample evidence indicates that non-traditional security problems can lead nation-states to failing or failed state status. That is to say, as examples, dysfunctional states, criminal states, narco-states, rogue states, and new ‘people's democracies'.  相似文献   
465.
Book reviews     
Norman Cigar, Genocide in Bosnia: The Policy of “Ethnic Cleansing”. College Station, Texas: Texas A&M University Press, 1995. Pp.xiv + 247; app., map, notes, cartoon.

Maria Jose Moyano, Argentina's Lost Patrol: Armed Struggle, 1969–1979. New Haven: Connecticut Yale University Press, 1995. Pp.xiii + 226, biblio., abbreviations, 10 figures, 1 map, tables, index; $25/£16.95. ISBN 0–300–01622–6.

Donald E. Schulz and Deborah Sundloff Schulz, The United States, Honduras, and the Crisis in Central America, Westview Thematic Studies in Latin America, Boulder, Co: Westview, 1994. Pp.368, map, figure, select biblio., abbreviations, index. $52.50/£37.50; (cloth) $17.95/£11.95 (paper). ISBN 0–8133–1324–4 and 1323–6.

Joseph H. Alexander and Merrill L. Bartlett, Sea Soldiers in the Cold War: Amphibious Warfare 1945–1991. Annapolis, Maryland: Naval Institute Press, 1995. Pp.iii + 178, 1 map, 29 illus, biblio, index. $32.95. ISBN

Gary P. Cox, The Halt in the Mud: French Strategic Planning from Waterloo to Sedan. Westview Press, 1994. Pp.258, maps, notes, biblio, index. £33.50. ISBN 0–133–1536–0.  相似文献   
466.
467.
Reliability Economics is a field that can be defined as the collection of all problems in which there is tension between the performance of systems of interest and their cost. Given such a problem, the aim is to resolve the tension through an optimization process that identifies the system which maximizes some appropriate criterion function (e.g. expected lifetime per unit cost). In this paper, we focus on coherent systems of n independent and identically distributed (iid) components and mixtures thereof, and characterize both a system's performance and cost as functions of the system's signature vector (Samaniego, IEEE Trans Reliabil (1985) 69–72). For a given family of criterion functions, a variety of optimality results are obtained for systems of arbitrary order n. Approximations are developed and justified when the underlying component distribution is unknown. Assuming the availability of an auxiliary sample of N component failure times, the asymptotic theory of L‐estimators is adapted for the purpose of establishing the consistency and asymptotic normality of the proposed estimators of the expected ordered failure times of the n components of the systems under study. These results lead to the identification of ε‐optimal systems relative to the chosen criterion function. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
468.
This article introduces the twin robots scheduling problem (TRSP), in which two robots positioned at the opposite ends of a rail are required to deliver items to positions along the rail, and the objective is to minimize the makespan. A proof of ‐hardness of the TRSP is presented, along with exact and heuristic algorithms. Computational results on challenging instances are provided.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 119–130, 2014  相似文献   
469.
A Markov chain approach to detecting a threat in a given surveillance zone by a network of steerable sensors is presented. The network has a finite number of predetermined states, and transition from one state to another follows a Markov chain. Under the assumption that the threat avoids detection, two game theoretic problems for finding an optimal Markov chain (two surveillance strategies) are formulated: the first maximizes the probability of threat detection for two consecutive detection periods, whereas the second minimizes the average time of detection for the worst‐case threat's trajectory. Both problems are reduced to linear programming, and special techniques are suggested to solve them. For a dynamic environment with moving noise sources, the optimal Markov chain changes at each detection period, and the rate of convergence of the Markov chain to its stationary distribution is analyzed. Both surveillance strategies are tested in numerical experiments and compared one with another. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
470.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号