首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   602篇
  免费   0篇
  602篇
  2021年   5篇
  2019年   12篇
  2018年   5篇
  2017年   18篇
  2016年   13篇
  2015年   15篇
  2014年   16篇
  2013年   117篇
  2012年   5篇
  2011年   5篇
  2010年   8篇
  2009年   12篇
  2007年   6篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   5篇
  2002年   11篇
  2000年   7篇
  1999年   6篇
  1998年   12篇
  1997年   6篇
  1996年   8篇
  1994年   16篇
  1993年   14篇
  1992年   8篇
  1991年   14篇
  1990年   8篇
  1989年   15篇
  1988年   16篇
  1987年   15篇
  1986年   17篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   8篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   8篇
  1973年   7篇
  1972年   10篇
  1971年   4篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有602条查询结果,搜索用时 0 毫秒
461.
    
In this analysis we extend the theory of stochastic duels to include the situation where one of the contestants fires a single infinitely long burst at a fixed rate of fire and secondly where he fires fixed-length, fixed-rate of fire bursts randomly spaced. In both cases the opponent fires single rounds randomly spaced. Special cases and parameter effects are considered.  相似文献   
462.
    
An algorithm, based upon dynamic programming, is developed for a class of fixed-cost cargo loading problems. The problems can be formulated as integer programming problems, but cannot be efficiently solved as such because of computational difficulties. The algorithm developed has proved to be very efficient in an actual operations research study involving over 500 different cargo items, more than 40 possible stops and several types of transportation vehicles. A numerical illustration is provided.  相似文献   
463.
    
This article considers two related questions of tactics in the context of the salvo model for naval missile combat. For a given set of targets, how many missiles should be fired to produce an effective attack? For a given available salvo size, how many enemy targets should be fired at? In the deterministic version of the model I derive a simple optimality relationship between the number of missiles to fire and the number of targets to engage. In the stochastic model I employ the expected loss inflicted and the probability of enemy elimination as the main performance measures and use these to derive salvo sizes that are in some sense “optimal.” I find that the offensive firepower needed for an effective attack depends not only on a target's total strength but also on the relative balance between its active defensive power and passive staying power. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
464.
    
We study the problem of minimizing the makespan in no‐wait two‐machine open shops producing multiple products using lot streaming. In no‐wait open shop scheduling, sublot sizes are necessarily consistent; i.e., they remain the same over all machines. This intractable problem requires finding sublot sizes, a product sequence for each machine, and a machine sequence for each product. We develop a dynamic programming algorithm to generate all the dominant schedule profiles for each product that are required to formulate the open shop problem as a generalized traveling salesman problem. This problem is equivalent to a classical traveling salesman problem with a pseudopolynomial number of cities. We develop and test a computationally efficient heuristic for the open shop problem. Our results indicate that solutions can quickly be found for two machine open shops with up to 50 products. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
465.
    
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   
466.
    
The aim of this article is to consider how Algeria's most prized achievement and treasured memory – the FLN's victory over the French in the war of liberation – has helped stimulate and sustain the violence that has blighted the country since independence. It argues that successive governments have propagated a legend of the war that encourages and legitimises rebellion and armed resistance. By celebrating the actions and achievements of a committed band of revolutionaries they have established a precedent whereby it is every citizen's duty to oppose and resist an unjust government. Time and again therefore, insurgent groups like the FFS, MIA, and AIS have justified their actions and won popular support by portraying themselves as the early FLN's natural heir.  相似文献   
467.
    
The Western way of warfare has not prepared the US Army or American society for appreciating an approach to national security that does not yield decisive and measurable outcomes. This proclivity may have significant consequences given the changing nature of the international security environment in the twenty-first century. In order to preserve national security and global stability, American strategic thinkers must understand the evolution of the national strategic culture. Then adjustments must be made to deal effectively with the challenges of a changed world order. Rather than limiting the use of force to decisive means and outcomes, the American military profession must be seriously prepared for success in less dramatic stability and support missions.  相似文献   
468.
    
This article assesses the existing literature on logistics in war, concluding that there is no satisfactory conceptual definition of logistics. It proposes a concept of logistics derived from Clausewitz's theory of war to fill that void. This is presented as a derivation because Clausewitz's distinction between (1) the use of the fighting forces (tactics and strategy) and (2) all other activities in war that were required so that forces could be taken as a given. The latter, left unnamed by Clausewitz, corresponds to a concept of logistics that proves to be an analytical peer to Clausewitz's categories of politics, tactics and strategy.  相似文献   
469.
    
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar.  相似文献   
470.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号