首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   407篇
  免费   4篇
  2019年   13篇
  2018年   12篇
  2017年   15篇
  2016年   12篇
  2015年   3篇
  2014年   8篇
  2013年   140篇
  2012年   3篇
  2010年   7篇
  2009年   3篇
  2007年   2篇
  2006年   3篇
  2005年   6篇
  2004年   4篇
  2003年   5篇
  2002年   11篇
  2000年   5篇
  1999年   3篇
  1998年   6篇
  1997年   5篇
  1996年   3篇
  1995年   4篇
  1994年   4篇
  1993年   10篇
  1992年   7篇
  1991年   5篇
  1990年   3篇
  1989年   6篇
  1988年   7篇
  1987年   8篇
  1986年   5篇
  1985年   6篇
  1984年   3篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   3篇
  1979年   2篇
  1978年   7篇
  1977年   2篇
  1976年   5篇
  1975年   4篇
  1974年   5篇
  1973年   2篇
  1972年   3篇
  1971年   7篇
  1970年   3篇
  1969年   5篇
  1968年   4篇
  1967年   4篇
排序方式: 共有411条查询结果,搜索用时 15 毫秒
361.
Claims that China is the only nuclear power currently expanding its arsenal fail to take into account the technical, historical, and bureaucratic realities that shaped China's nuclear posture and drive its ongoing modernization. China's strategic modernization is largely a process of deploying new delivery systems, not designing new nuclear warheads; the majority of its new missiles are conventionally armed. Today, China maintains the smallest operationally deployed nuclear force of any of the legally recognized nuclear weapon states, operates under a no-first-use pledge, and keeps its warheads off alert. The modernization of China's delivery systems is the culmination of a decades-long plan to acquire the same capabilities deployed by the other nuclear powers. U.S. concerns about this modernization focus too much on deterring a deliberate Chinese attack and ignore the risk that modernized U.S. and Chinese forces could interact in unexpected ways during a crisis, creating uncontrollable escalatory pressures. To manage this risk, Washington should assure Chinese leaders that it does not seek to deny China's deterrent, in exchange for some understanding that China will not seek numerical parity with U.S. nuclear forces.  相似文献   
362.
The question of whether or not cyber war amounts to war per se is difficult to determine given strategic theory's uncertain grasp of the concepts of force, violence and lethality. These three concepts, along with their relationships with one another, are explored in order to demonstrate that cyber attacks can in fact be construed as acts of war.  相似文献   
363.
364.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
365.
Abstract

The author provides an introduction to the Package Management System, which is transforming the relationship between MOD and the research establishments of the Defence Research Agency.  相似文献   
366.
Britain underestimated the importance of the naval mine in the years leading up to the First World War and entered the conflict unprepared for an extended mine campaign. Traditional interpretations of the mine's position are limited and neglect the broader political and economic factors influencing its development. The mine was a peripheral technology representative of the rapid technological change in the period, and its development was affected by financial constraints, international diplomacy and naval administration. Because of structural impediments, however, and despite significant resources devoted to the weapon, the mine faced obstacles which led to both limited stocks and inadequate plans for use at the opening of the First World War.  相似文献   
367.
Domestic factors play an important role in the formulation and evolution of a country's foreign and security policy. This is clearly seen in the case study of a Soviet successor state, Ukraine. The article brings together in seven sections theory with the key domestic factors that influence Ukrainian security policy, such as economics, energy, national identity, elites and political parties. The article provides an insight into how these domestic factors influence the course of Ukrainian security policy which is striking a balance between the twin extremes of Soviet re‐integration, which would be tantamount to the loss of independence, and nationalist maximalism which seeks to place as much distance as possible between Ukraine and Russia.  相似文献   
368.
369.
Reviews     
Ian Castle and Ian Knight, Fearful Hard Times: The Siege and Relief of Eshowe, 1879. Greenhill Books, London 1994, Pp.256, 85 illus, 6 maps, index. £17.95. ISBN 1–85367–180–0.

Michael E. Brown (ed.), Ethnic Conflict and International Security. Princeton: Princeton University Press, 1993, Pp.263, selected biblio, index. $45/£30 (cloth); $14.95/£12.95 (paper). ISBN 0–691–03368 and 00068–9.

Deborah Poole and Gerardo Renique, Peru: Time of Fear. London: Latin American Bureau (Research and Action) Ltd., 1992. Pp.212, 7 maps, photographs, glossary, sources/further reading, index. £17.99 ISBN 0–906156–70‐X and ‐71–8.

David A. Charters (ed.), Peacekeeping and the Challenge of Civil Conflict Resolution. Center for Conflict Studies, University of New Brunswick, 1994. Pp.viii+220. NP.

Joachim Remak, A Very Civil War: The Swiss Sonderbund War of 1847. Boulder, Colorado: Westview Press, 1993. Pp.xvi+221, 6 map's, 68 illus, biblio, index. $24.95/£16.95.  相似文献   
370.
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号