首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   215篇
  免费   8篇
  2021年   4篇
  2020年   2篇
  2019年   6篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2014年   5篇
  2013年   30篇
  2011年   2篇
  2010年   3篇
  2009年   4篇
  2008年   3篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2003年   2篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1997年   5篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   8篇
  1992年   3篇
  1991年   4篇
  1989年   3篇
  1988年   10篇
  1987年   3篇
  1986年   6篇
  1985年   9篇
  1984年   8篇
  1983年   2篇
  1982年   2篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   2篇
  1974年   6篇
  1973年   1篇
  1972年   2篇
  1971年   7篇
  1970年   3篇
  1969年   4篇
  1968年   1篇
  1967年   2篇
  1966年   1篇
排序方式: 共有223条查询结果,搜索用时 15 毫秒
191.
192.
One of the most commonly expressed opinions about victory in the Second World War is that the Soviet Union was mostly responsible for beating Nazi Germany. Supposedly the great land war fought between these two powers in the East was the decisive front in Europe. The West's contribution to German defeat, on the other hand, is often seen as somewhat marginal. The Anglo‐American strategic bombing campaign in 1943 paid few dividends and it was not until after the Normandy landings in June 1944 that the West really began to divert a large amount of German resources.

The purpose of this article is to challenge some of these basic notions. Through analysing what Germany produced, where it was sent and how it was destroyed, the West's contribution to defeating Germany moves from an ancillary position to a dominant one. Taking German war production as a whole, from 1943 onwards the West was responsible for tying down and destroying a significantly larger share than the Soviet Union.  相似文献   
193.
194.
195.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
196.
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated.  相似文献   
197.
198.
We study the quadratic bottleneck problem (QBP) which generalizes several well‐studied optimization problems. A weak duality theorem is introduced along with a general purpose algorithm to solve QBP. An example is given which illustrates duality gap in the weak duality theorem. It is shown that the special case of QBP where feasible solutions are subsets of a finite set having the same cardinality is NP‐hard. Likewise the quadratic bottleneck spanning tree problem (QBST) is shown to be NP‐hard on a bipartite graph even if the cost function takes 0–1 values only. Two lower bounds for QBST are derived and compared. Efficient heuristic algorithms are presented for QBST along with computational results. When the cost function is decomposable, we show that QBP is solvable in polynomial time whenever an associated linear bottleneck problem can be solved in polynomial time. As a consequence, QBP with feasible solutions form spanning trees, s‐t paths, matchings, etc., of a graph are solvable in polynomial time with a decomposable cost function. We also show that QBP can be formulated as a quadratic minsum problem and establish some asymptotic results. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
199.
The bivariate negative binomial distribution of Mitchell and Paulson [17] for the case b = c = 0 is shown to be equivalent to the accident proneness model of Edwards and Gurland [4] and Subrahmaniam [19,20]. The diagonal series expansion of its joint probability function is then derived. Two other formulations of this distribution are also considered: (i) as a mixture model, which showed how it arises as the discrete analogue to the Wicksell-Kibble bivariate gamma distribution, and (ii) as a consequence of the linear birth-and-death process with immigration.  相似文献   
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号