首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   0篇
  412篇
  2019年   13篇
  2018年   12篇
  2017年   15篇
  2016年   12篇
  2015年   3篇
  2014年   8篇
  2013年   140篇
  2012年   3篇
  2010年   7篇
  2009年   3篇
  2007年   2篇
  2006年   3篇
  2005年   6篇
  2004年   4篇
  2003年   5篇
  2002年   11篇
  2000年   5篇
  1999年   3篇
  1998年   6篇
  1997年   5篇
  1996年   3篇
  1995年   4篇
  1994年   4篇
  1993年   10篇
  1992年   7篇
  1991年   5篇
  1990年   3篇
  1989年   6篇
  1988年   7篇
  1987年   8篇
  1986年   5篇
  1985年   6篇
  1984年   3篇
  1983年   3篇
  1982年   3篇
  1981年   3篇
  1980年   3篇
  1979年   2篇
  1978年   7篇
  1977年   2篇
  1976年   5篇
  1975年   4篇
  1974年   5篇
  1973年   2篇
  1972年   3篇
  1971年   7篇
  1970年   3篇
  1969年   5篇
  1968年   4篇
  1967年   4篇
排序方式: 共有412条查询结果,搜索用时 0 毫秒
381.
Abstract

While not always a concern for the general economic growth literature, the debate over the effects of military spending on growth continues to develop, with no consensus, but a deepening understanding of the limitations of previous work. One important issue that has not been adequately dealt with is the endogeneity of military spending in the growth equation, mainly because of the difficulty of finding any variables that would make adequate instruments. This paper considers this issue, using an endogenous growth model estimated on a large sample of 109 non-high-income countries for the period 1998–2012. The empirical analysis is framed within an instrumental variable setting that exploits the increase in military spending that occurs when unrest in a country escalates to turmoil. The estimation results show that endogeneity arising from reverse causality is a crucial issue, with the instrumental variable estimates providing a larger significant negative effect of military spending on growth than OLS would. This result is found to be robust to different sources of heterogeneity and different time periods.  相似文献   
382.
383.
With the end of the Cold War and apartheid, a process of demilitarisation and dramatic cuts in military spending has marked the transition to democracy in South Africa. Between 1989 and 1997 the South African defence budget was cut by more than 50% in real terms, with most of the cuts coming from the procurement budget, which was cut by nearly 70% in real terms during the same period. These cuts have had a significant impact on the country's defence industrial base. However, there has been surprisingly little research on the changes to defence companies that have taken place since the late 1980s. This paper makes a start at rectifying that deficiency by providing an analysis of the restructuring of the major defence‐dependent companies over the period 1988–97. It uses a number of financial ratios and other measures of corporate performance to compare their experience with non‐defence companies in the rest of the South African economy during the same period.  相似文献   
384.
Claims that China is the only nuclear power currently expanding its arsenal fail to take into account the technical, historical, and bureaucratic realities that shaped China's nuclear posture and drive its ongoing modernization. China's strategic modernization is largely a process of deploying new delivery systems, not designing new nuclear warheads; the majority of its new missiles are conventionally armed. Today, China maintains the smallest operationally deployed nuclear force of any of the legally recognized nuclear weapon states, operates under a no-first-use pledge, and keeps its warheads off alert. The modernization of China's delivery systems is the culmination of a decades-long plan to acquire the same capabilities deployed by the other nuclear powers. U.S. concerns about this modernization focus too much on deterring a deliberate Chinese attack and ignore the risk that modernized U.S. and Chinese forces could interact in unexpected ways during a crisis, creating uncontrollable escalatory pressures. To manage this risk, Washington should assure Chinese leaders that it does not seek to deny China's deterrent, in exchange for some understanding that China will not seek numerical parity with U.S. nuclear forces.  相似文献   
385.
Previous studies criticize the general use of the normal approximation of lead-time demand on the grounds that it can lead to serious errors in safety stock. We reexamine this issue for the distribution of fast-moving finished goods. We first determine the optimal reorder points and quantities by using the classical normal-approximation method and a theoretically correct procedure. We then evaluate the misspecification error of the normal approximation solution with respect to safety stock, logistics-system costs, total costs (logistics costs, including acquisition costs), and fill rates. The results provide evidence that the normal approximation is robust with respect to both cost and service for seven major industry groups. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 165–186, 1997  相似文献   
386.
The nature of crime and conflict is rapidly evolving. Postmodern war is increasingly influenced by non-traditional and irregular combatants: non-state soldiers. These actors are exploiting technology and networked doctrine to spread their influence across traditional geographic boundaries. This emphasis on non-traditional actors accompanies a shift in political and social organization. This shift may well be a shift in state form: from nation-state to market-state. This transition is fueled by rapid developments in technology and the adoption of network organizational forms. Conflict during this transition blurs the distinctions between and among crime, terrorism and warfare. This essay explores the dynamics of terrorism, crime and private armies during this epochal shift.  相似文献   
387.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
388.
The question of whether or not cyber war amounts to war per se is difficult to determine given strategic theory's uncertain grasp of the concepts of force, violence and lethality. These three concepts, along with their relationships with one another, are explored in order to demonstrate that cyber attacks can in fact be construed as acts of war.  相似文献   
389.
390.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号