全文获取类型
收费全文 | 369篇 |
免费 | 6篇 |
出版年
2021年 | 7篇 |
2019年 | 7篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 7篇 |
2015年 | 2篇 |
2014年 | 5篇 |
2013年 | 55篇 |
2012年 | 3篇 |
2009年 | 4篇 |
2007年 | 12篇 |
2005年 | 2篇 |
2004年 | 3篇 |
2003年 | 7篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 3篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 9篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 14篇 |
1987年 | 7篇 |
1986年 | 13篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 10篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 9篇 |
1978年 | 8篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 4篇 |
1974年 | 8篇 |
1973年 | 5篇 |
1972年 | 3篇 |
1971年 | 7篇 |
1970年 | 6篇 |
1969年 | 5篇 |
1967年 | 6篇 |
1948年 | 4篇 |
排序方式: 共有375条查询结果,搜索用时 15 毫秒
121.
In this paper we study a machine repair problem in which a single unreliable server maintains N identical machines. The breakdown times of the machines are assumed to follow an exponential distribution. The server is subject to failure and the failure times are exponentially distributed. The repair times of the machine and the service times of the repairman are assumed to be of phase type. Using matrix‐analytic methods, we perform steady state analysis of this model. The time spent by a failed machine in service and the total time in the repair facility are shown to be of phase type. Several performance measures are evaluated. An optimization problem to determine the number of machines to be assigned to the server that will maximize the expected total profit per unit time is discussed. An illustrative numerical example is presented. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 462–480, 2003 相似文献
122.
In this paper we consider networks that consist of components operating under a randomly changing common environment. Our work is motivated by power system networks that are subject to fluctuating weather conditions over time that affect the performance of the network. We develop a general setup for any network that is subject to such environment and present results for network reliability assessment under two repair scenarios. We also present Bayesian analysis of network failure data and illustrate how reliability predictions can be obtained for the network. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 574–591, 2003 相似文献
123.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally. 相似文献
124.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion. 相似文献
125.
126.
Irvin R. Lindemuth 《The Nonproliferation Review》2013,20(3):483-507
Post-Cold War “lab-to-lab” collaborations on unclassified scientific issues between U.S. and Russian nuclear weapons laboratories set the stage for bilateral cooperation in materials control and other nuclear areas. They also became the major element in a cooperative process initiated by a Presidential Decision Directive to ensure Russia's compliance with the Comprehensive Nuclear-Test-Ban Treaty. These collaborations have always been highly favored by leaders of the Russian nuclear weapons complex—the same leaders who oversee Russia's participation in various government-to-government programs. This article reviews these collaborations and examines the possibility that U.S. rebuffs of Russian proposals and the U.S. failure to keep promises of expanded collaboration could contribute to Russia's reluctance in major programs and even lead to a return to nuclear testing by Russia. The author argues that a renewed U.S. commitment to the process should be an immediate goal of the Obama administration and is an essential step in re-engaging Russia to solve the nuclear problems remaining from the Cold War. Steps for doing so are recommended. 相似文献
127.
128.
129.
Michael Barletta Clay Bowen Kimber Cramer R. Adam Moody 《The Nonproliferation Review》2013,20(2):132-145
The material in this overview is drawn from selected abstracts that appear in the Center for Nonproliferation Studies’ nuclear and missile databases. Transactions of nuclear and missile technologies, parts, and materials are listed according o the recipient country. Other developments are listed according to the country where the event or development took place. 相似文献
130.
Strategic terrorism: The framework and its fallacies 总被引:1,自引:0,他引:1
Dr Peter R. Neumann 《战略研究杂志》2013,36(4):571-595
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power. 相似文献