首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   586篇
  免费   16篇
  2021年   5篇
  2019年   12篇
  2018年   5篇
  2017年   18篇
  2016年   13篇
  2015年   15篇
  2014年   16篇
  2013年   117篇
  2012年   5篇
  2011年   5篇
  2010年   8篇
  2009年   12篇
  2007年   6篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   5篇
  2002年   11篇
  2000年   7篇
  1999年   6篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1994年   16篇
  1993年   14篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   15篇
  1988年   16篇
  1987年   15篇
  1986年   17篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   10篇
  1971年   4篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有602条查询结果,搜索用时 15 毫秒
181.
Despite the large number and variety of studies addressing the relationship between military spending and economic growth, a consensus regarding the exact nature of any relationship between the two has proven elusive. This study uses a panel co-integration approach to examine the relationship between military spending and economic growth in the five South Asian countries of India, Pakistan, Nepal, Sri Lanka and Bangladesh over the period of 1988–2007. It finds that a 1% increase in military spending increases real GDP by only 0.04%, suggesting that the substantial amount of public expenditure that is currently directed towards military purposes in these countries has a negligible impact upon economic growth.  相似文献   
182.
This comment addresses the Rohlfs–Sullivan analysis titled: ‘The Cost-Effectiveness of Armored Tactical Wheeled Vehicles [TWVs] for Overseas US Army Operations.’ The analysis evaluated policies to replace Type 1 and 2 TWVs with Type 3s. There is no evidence the analysis factored in fatality causes, fatality relationships to vehicles, or compared survivability of vehicles. Furthermore, it did not note when Type 3 TWVs were requested, when they impacted fatalities, or TWV use policies. It also assumed Type 3 TWVs prompted negative unit behaviors while discounting evidence of positive behaviors. In summary, the analysis is incomplete and should be revised.  相似文献   
183.
The Sixth Review Conference of the Biological Weapons Convention (BWC) gave the future of biological disarmament new hope. It brought the BWC back closer to the core of multilateral efforts to combat the weaponization of disease, agreed to an intersessional work program for 2007–2010, created an implementation support unit, and revived the interrupted process of BWC evolution through extended understandings agreed at review conferences. However, its aims were deliberately modest. Having set their sights realistically low, delegations did not have to lower them much further. What was most important was to prevent U.S.-Iranian acrimony from paralyzing the conference. With deadlock once again narrowly averted, the conference had to clear away the debris left from past dissensions in order to open the way to constructive evolution for the treaty. In particular the conference avoided contentious subjects such as permanent organization and verification measures for the BWC; its institutional deficit and compliance problems remain. Successes and limitations of the conference are analyzed, as is its equivocal outcome on confidence-building measures. Developing on the endogenous principle, the BWC will continue to need constant attention. At the center of a complex edifice, the BWC must be kept sound, strong, and solid.  相似文献   
184.
185.
186.
This article suggests that the War on Terrorism is actually a campaign against a globalized Islamist 1 1 In this article, the term ‘Islamist’ describes the extremist, radical form of political Islam practiced by some militant groups, as distinct from ‘Islamic’, which describes the religion of Islam, or ‘Muslim’, which describes those who follow the Islamic religion. In this article the term is used to refer primarily to Al Qaeda, its allies and affiliates. View all notes insurgency. Therefore, counterinsurgency approaches are more relevant to the present conflict than traditional terrorism theory. Indeed, a counterinsurgency approach would generate subtly, but substantially different, policy choices in prosecuting the war against Al Qaeda. Based on this analysis, the article proposes a strategy of ‘disaggregation’ that seeks to dismantle, or break, the links in the global jihad.2 2 This article uses the short form of the Islamic term jihad to mean ‘lesser jihad’ (armed struggle against unbelievers), rather than ‘greater jihad’ (jihad fi sabilillah), i.e. moral struggle for the righteousness of God. View all notes Like containment in the Cold War, disaggregation would provide a unifying strategic conception for the war – a conception that has been somewhat lacking to date.  相似文献   
187.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
188.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013  相似文献   
189.
Full‐system testing for large‐scale systems is often infeasible or very costly. Thus, when estimating system reliability, it is desirable to use a method that uses subsystem tests, which are often less expensive and more feasible. This article presents a method for bounding full‐system reliabilities based on subsystem tests and, if available, full‐system tests. The method does not require that subsystems be independent. It accounts for dependencies through the use of certain probability inequalities. The inequalities provide the basis for valid reliability calculations while not requiring independent subsystems or full‐system tests. The inequalities allow for test information on pairwise subsystem failure modes to be incorporated, thereby improving the bound on system reliability. We illustrate some of the properties of the estimates via an example application. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
190.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号