全文获取类型
收费全文 | 412篇 |
免费 | 0篇 |
专业分类
412篇 |
出版年
2019年 | 13篇 |
2018年 | 12篇 |
2017年 | 15篇 |
2016年 | 12篇 |
2015年 | 3篇 |
2014年 | 8篇 |
2013年 | 140篇 |
2012年 | 3篇 |
2010年 | 7篇 |
2009年 | 3篇 |
2007年 | 2篇 |
2006年 | 3篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 5篇 |
2002年 | 11篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 7篇 |
1987年 | 8篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 7篇 |
1977年 | 2篇 |
1976年 | 5篇 |
1975年 | 4篇 |
1974年 | 5篇 |
1973年 | 2篇 |
1972年 | 3篇 |
1971年 | 7篇 |
1970年 | 3篇 |
1969年 | 5篇 |
1968年 | 4篇 |
1967年 | 4篇 |
排序方式: 共有412条查询结果,搜索用时 0 毫秒
381.
AbstractWhile not always a concern for the general economic growth literature, the debate over the effects of military spending on growth continues to develop, with no consensus, but a deepening understanding of the limitations of previous work. One important issue that has not been adequately dealt with is the endogeneity of military spending in the growth equation, mainly because of the difficulty of finding any variables that would make adequate instruments. This paper considers this issue, using an endogenous growth model estimated on a large sample of 109 non-high-income countries for the period 1998–2012. The empirical analysis is framed within an instrumental variable setting that exploits the increase in military spending that occurs when unrest in a country escalates to turmoil. The estimation results show that endogeneity arising from reverse causality is a crucial issue, with the instrumental variable estimates providing a larger significant negative effect of military spending on growth than OLS would. This result is found to be robust to different sources of heterogeneity and different time periods. 相似文献
382.
383.
With the end of the Cold War and apartheid, a process of demilitarisation and dramatic cuts in military spending has marked the transition to democracy in South Africa. Between 1989 and 1997 the South African defence budget was cut by more than 50% in real terms, with most of the cuts coming from the procurement budget, which was cut by nearly 70% in real terms during the same period. These cuts have had a significant impact on the country's defence industrial base. However, there has been surprisingly little research on the changes to defence companies that have taken place since the late 1980s. This paper makes a start at rectifying that deficiency by providing an analysis of the restructuring of the major defence‐dependent companies over the period 1988–97. It uses a number of financial ratios and other measures of corporate performance to compare their experience with non‐defence companies in the rest of the South African economy during the same period. 相似文献
384.
Peter Jones 《The Nonproliferation Review》2013,20(2):197-217
Claims that China is the only nuclear power currently expanding its arsenal fail to take into account the technical, historical, and bureaucratic realities that shaped China's nuclear posture and drive its ongoing modernization. China's strategic modernization is largely a process of deploying new delivery systems, not designing new nuclear warheads; the majority of its new missiles are conventionally armed. Today, China maintains the smallest operationally deployed nuclear force of any of the legally recognized nuclear weapon states, operates under a no-first-use pledge, and keeps its warheads off alert. The modernization of China's delivery systems is the culmination of a decades-long plan to acquire the same capabilities deployed by the other nuclear powers. U.S. concerns about this modernization focus too much on deterring a deliberate Chinese attack and ignore the risk that modernized U.S. and Chinese forces could interact in unexpected ways during a crisis, creating uncontrollable escalatory pressures. To manage this risk, Washington should assure Chinese leaders that it does not seek to deny China's deterrent, in exchange for some understanding that China will not seek numerical parity with U.S. nuclear forces. 相似文献
385.
Previous studies criticize the general use of the normal approximation of lead-time demand on the grounds that it can lead to serious errors in safety stock. We reexamine this issue for the distribution of fast-moving finished goods. We first determine the optimal reorder points and quantities by using the classical normal-approximation method and a theoretically correct procedure. We then evaluate the misspecification error of the normal approximation solution with respect to safety stock, logistics-system costs, total costs (logistics costs, including acquisition costs), and fill rates. The results provide evidence that the normal approximation is robust with respect to both cost and service for seven major industry groups. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 165–186, 1997 相似文献
386.
John P. Sullivan 《Low Intensity Conflict & Law Enforcement》2002,11(2):239-253
The nature of crime and conflict is rapidly evolving. Postmodern war is increasingly influenced by non-traditional and irregular combatants: non-state soldiers. These actors are exploiting technology and networked doctrine to spread their influence across traditional geographic boundaries. This emphasis on non-traditional actors accompanies a shift in political and social organization. This shift may well be a shift in state form: from nation-state to market-state. This transition is fueled by rapid developments in technology and the adoption of network organizational forms. Conflict during this transition blurs the distinctions between and among crime, terrorism and warfare. This essay explores the dynamics of terrorism, crime and private armies during this epochal shift. 相似文献
387.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
388.
John Stone 《战略研究杂志》2013,36(1):101-108
The question of whether or not cyber war amounts to war per se is difficult to determine given strategic theory's uncertain grasp of the concepts of force, violence and lethality. These three concepts, along with their relationships with one another, are explored in order to demonstrate that cyber attacks can in fact be construed as acts of war. 相似文献
389.
390.