全文获取类型
收费全文 | 563篇 |
免费 | 18篇 |
出版年
2021年 | 11篇 |
2019年 | 10篇 |
2018年 | 7篇 |
2017年 | 16篇 |
2016年 | 10篇 |
2015年 | 16篇 |
2014年 | 13篇 |
2013年 | 136篇 |
2011年 | 7篇 |
2009年 | 4篇 |
2008年 | 8篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 11篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 7篇 |
1998年 | 10篇 |
1997年 | 10篇 |
1996年 | 8篇 |
1995年 | 10篇 |
1994年 | 12篇 |
1993年 | 11篇 |
1992年 | 12篇 |
1991年 | 12篇 |
1990年 | 4篇 |
1989年 | 10篇 |
1988年 | 18篇 |
1987年 | 10篇 |
1986年 | 16篇 |
1985年 | 11篇 |
1984年 | 6篇 |
1983年 | 7篇 |
1982年 | 4篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 12篇 |
1978年 | 7篇 |
1977年 | 7篇 |
1975年 | 12篇 |
1974年 | 7篇 |
1973年 | 6篇 |
1972年 | 7篇 |
1971年 | 5篇 |
1970年 | 6篇 |
1969年 | 6篇 |
1966年 | 4篇 |
排序方式: 共有581条查询结果,搜索用时 15 毫秒
441.
442.
443.
We analyze an interdiction scenario where an interceptor attempts to catch an intruder as the intruder moves through the area of interest. A motivating example is the detection and interdiction of drug smuggling vessels in the Eastern Pacific and Caribbean. We study two models in this article. The first considers a nonstrategic target that moves through the area without taking evasive action to avoid the interdictor. We determine the optimal location the interceptor should position itself to best respond when a target arrives. The second model analyzes the strategic interaction between the interceptor and intruder using a Blotto approach. The intruder chooses a route to travel on and the interceptor chooses a route to patrol. We model the interaction as a two‐player game with a bilinear payoff function. We compute the optimal strategy for both players and examine several extensions. © 2017 Wiley Periodicals, Inc. Naval Research Logistics, 64: 29–40, 2017 相似文献
444.
S. Yaqub Ibrahimi 《Small Wars & Insurgencies》2017,28(6):947-972
This paper examines the institutional and functional aspects of the Taliban’s Islamic Emirate of Afghanistan (IEA). The Taliban’s coercive approach and its entire reliance on “war-making” to “state-making” shows the difficulty of the transformation of an insurgent group into a state structure. The Taliban was primarily capable of establishing a two-track system of governance. However, the assessment of the IEA’s institutional and functional capabilities shows that the military–political organization formed by the Taliban lacked statehood in all three areas of legitimacy, authority and capacity. 相似文献
445.
Michael Tkacik 《Defence Studies》2017,17(1):84-109
This article argues India is laying the foundation to move away from “no-first-use” (NFU) as its nuclear weapons employment policy. Since the inception of its nuclear weapons program, India has claimed NFU as the centerpiece of its nuclear strategy. But India has a history of developing foundational changes to its nuclear weapons program before such changes actually occur. For example, the infrastructure of India’s nuclear weapons program was already being created in the 1950s under the guise of civilian nuclear power. Similarly, the weaponization of India’s program, which did not officially occur until after the 1998 tests, had its genesis in far earlier decisions. A close examination of trends in India’s nuclear weapons production complex, its delivery systems, and its command and control complex all lead to the conclusion that India is laying the groundwork for more flexible employment options, up to and including first use. This article does not argue such a decision has been taken. Rather, it argues the underpinning is in place to allow for a move to more flexible options, perhaps very quickly, at some point in the future. This could occur during crisis or it could occur incrementally over time. 相似文献
446.
Karl Sörenson 《Defence Studies》2017,17(2):198-213
The last decade has seen several advances in the study of deterrence. These advances have sparked some strong disagreements regarding interpretation of the models and what their contributions signify. This paper appraises the discussions from a model theoretic perspective. It is argued that when comparing rivalling models three aspects; (i) target, (ii) criteria and (iii) type of purpose should be taken into account in order to make a proper appraisal. Informed by these aspects it is evident that the three deterrence models analysed address different aspects, in different ways and to different ends. From this perspective, the so-called Perfect Deterrence model must be recognised as a clear advancement in the research field. Model comparison will always be context relative and a plurality of models should be viewed favourably. 相似文献
447.
The Akko 1 shipwreck is the remains of a 26-metre-long Egyptian armed vessel or auxiliary naval brig built at the beginning of the 19th century. Remains of six flintlock muskets were retrieved from the shipwreck, and characterised by various metallurgical methods. The research aimed to study the composition and microstructure of the musket fittings and their manufacturing processes, and if possible, to determine the date and origin of the raw materials. The lead isotope analysis of the fittings suggests that their raw material originated in Great Britain. Based on their typology and composition, the fittings were made in Great Britain of brass alloy and manufactured by casting, probably at the same workshop; and the staple was manufactured by casting and drawing. Considering the zinc content, combined with the manufacturing techniques, the fittings were manufactured between the latter part of the 18th and the early 19th centuries, which might indicate that they were purchased in the course of 19th century weapons trade to be used on board the Egyptian ship. 相似文献
448.
In this article we present a novel technique for deriving the convex envelope of certain nonconvex fixed-charge functions of the type that arise in several related applications that have been considered in the literature. One common attribute of these problems is that they involve choosing levels for the undertaking of several activities. Two or more activities share a common resource, and a fixed charge is incurred when any of these activities is undertaken at a positive level. We consider nonconvex programming formulations for these problems in which the fixed charges are expressed in the form of concave functions. With the use of the developed convex envelope results, we show that the convex envelope relaxations of the nonconvex formulations lead to the linear programming relaxations of the strong IP/MIP formulations of these problems. Moreover, our technique for deriving convex envelopes offers a useful construct that could be exploited in other related contexts as well. © 1996 John Wiley & Sons, Inc. 相似文献
449.
n independent jobs are to be scheduled nonpreemptively on a single machine so as to minimize some performance measure. Federgruen and Mosheiov [2] show that a large class of such scheduling problems can be optimized by solving either a single instance or a finite sequence of instances of the so-called SQC problem, in which all the jobs have a fixed or controllable common due date and the sum of general quasiconvex functions of the job completion times is to be minimized. In this note we point out that this is not always true. In particular, we show that the algorithm proposed in [2] does not always find a global optimal schedule to the problem of minimizing the weighted sum of the mean and variance of job completion times. © 1996 John Wiley & Sons, Inc. 相似文献
450.