全文获取类型
收费全文 | 293篇 |
免费 | 8篇 |
出版年
2021年 | 6篇 |
2019年 | 10篇 |
2018年 | 6篇 |
2017年 | 10篇 |
2016年 | 7篇 |
2014年 | 6篇 |
2013年 | 44篇 |
2011年 | 3篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 3篇 |
2006年 | 5篇 |
2005年 | 4篇 |
2004年 | 6篇 |
2003年 | 3篇 |
2002年 | 10篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 11篇 |
1992年 | 4篇 |
1991年 | 6篇 |
1989年 | 4篇 |
1988年 | 13篇 |
1987年 | 3篇 |
1986年 | 6篇 |
1985年 | 11篇 |
1984年 | 8篇 |
1983年 | 4篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 7篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 8篇 |
1973年 | 3篇 |
1972年 | 2篇 |
1971年 | 10篇 |
1970年 | 3篇 |
1969年 | 5篇 |
1968年 | 2篇 |
1967年 | 2篇 |
排序方式: 共有301条查询结果,搜索用时 15 毫秒
281.
282.
Phillips P. O'Brien 《战略研究杂志》2013,36(2):89-113
One of the most commonly expressed opinions about victory in the Second World War is that the Soviet Union was mostly responsible for beating Nazi Germany. Supposedly the great land war fought between these two powers in the East was the decisive front in Europe. The West's contribution to German defeat, on the other hand, is often seen as somewhat marginal. The Anglo‐American strategic bombing campaign in 1943 paid few dividends and it was not until after the Normandy landings in June 1944 that the West really began to divert a large amount of German resources. The purpose of this article is to challenge some of these basic notions. Through analysing what Germany produced, where it was sent and how it was destroyed, the West's contribution to defeating Germany moves from an ancillary position to a dominant one. Taking German war production as a whole, from 1943 onwards the West was responsible for tying down and destroying a significantly larger share than the Soviet Union. 相似文献
283.
284.
285.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
286.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
287.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
288.
Justin O. Smith 《Small Wars & Insurgencies》2013,24(3):448-466
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months. 相似文献
289.
290.
This paper reviews some of the theoretical and econometric issues involved in estimating growth models that include military spending. While the mainstream growth literature has not found military expenditure to be a significant determinant of growth, much of the defence economics literature has found significant effects. The paper argues that this is largely the product of the particular specification, the Feder–Ram model, that has been used in the defence economics literature but not in the mainstream literature. The paper critically evaluates this model, detailing its problems and limitations and suggests that it should be avoided. It also critically evaluates two alternative theoretical approaches, the Augmented Solow and the Barro models, suggesting that they provide a more promising avenue for future research. It concludes with some general comments about modelling the links between military expenditure and growth. 相似文献