首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   404篇
  免费   11篇
  国内免费   1篇
  2020年   4篇
  2019年   16篇
  2018年   15篇
  2017年   10篇
  2016年   9篇
  2015年   6篇
  2014年   9篇
  2013年   102篇
  2012年   4篇
  2010年   7篇
  2008年   3篇
  2007年   7篇
  2006年   4篇
  2005年   6篇
  2004年   4篇
  2002年   7篇
  2001年   3篇
  1999年   6篇
  1998年   10篇
  1997年   11篇
  1996年   6篇
  1995年   5篇
  1994年   10篇
  1993年   11篇
  1992年   7篇
  1991年   10篇
  1990年   10篇
  1989年   6篇
  1988年   9篇
  1987年   4篇
  1986年   8篇
  1985年   7篇
  1984年   3篇
  1982年   7篇
  1981年   5篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1976年   3篇
  1975年   5篇
  1974年   3篇
  1973年   5篇
  1972年   4篇
  1971年   2篇
  1969年   2篇
  1968年   7篇
  1967年   2篇
  1966年   4篇
  1948年   2篇
排序方式: 共有416条查询结果,搜索用时 15 毫秒
121.
122.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
123.
Book reviews     
Frank Zimmer, Bismarcks Kampf gegen Kaiser Franz Joseph Konigsgratz und seine Folgen. Graz, Vienna, Cologne: Styria Verlag 1996. Pp.203,49 illus., 1 map. OS 350/DM 49. ISBN 3–222–12377–2.

Saul Zadka, Blood in Zion: How the Jewish Guerrillas drove the British out of Palestine. London and Washington: Brassey's, 1995. Pp.227, chron., illus., index. £19.95. ISBN 1–85753–136–1.

Theodore L. Gatchel, At the Water's Edge: Defending against the Modern Amphibious Assault. Annapolis, MD: Naval Institute Press, 1996. Pp.xvi+217, notes, biblio, index. $36.95. ISBN 1–55750–308–7.

Max G. Manwaring and William J. Olson (eds.) Managing Contemporary Conflict: Pillars of Success. Boulder, CO: Westview Press, 1996. Pp.269, no index. $65 (cloth); $25 (paper). ISBN 0–8133–8969 and 9978–5

Chris Seiple, The US Military/NGO Relationship in Humanitarian Interventions, Carlisle Barracks, PA: The

Richard L. Millett and Michael Gold‐Biss (eds.) Beyond Praetorianism: The Latin American Military in Transition. University of Miami: North/South Center Press; Boulder, CO: Lynne Rienner, 1996. Pp.xv +317, index. $24.95. ISBN 1–5745–000–9.

Rudolph C. Barnes Jr, Military Legitimacy: Might and Right in the New Millennium. London and Portland, OR: Frank Cass, 1996. Pp.199, select biblio., index. £27.50/$39.50, ISBN 0–714–4624–5.  相似文献   
124.
Africa is arguably the most important regional setting for United Nations peacekeeping challenges. In the 1990s, extensive efforts have been made by the United Nations in the fleld of peacekeeping with the speciflc aim of reducing the levels of conflicts on the continent. Another significant development relates to the fact that organisations in Africa have started to feature as important peacekeeping instruments in recent years as it is increasingly being accepted that there is a need for such institutions to take care of their own security requirements. However, a key issue at stake is the need to achieve greater consistency with regard to third-party intervention in African conflicts. A look at the more glaring examples of multinational operations in the name of peace and security gives a sense of the magnitude and difficulties often experienced during such endeavours. In addition, both past and current operations have brought to light certain perspectives and lessons that require careful analysis and study. In this article, an overview is given of some of the perils and challenges associated with multinational operations in the realm of peace and security. Specifically, the focus is on Africa and on key issues and challenges regarding the strategic and operational management of such operations in view of the need to consider a more integrated approach towards multinational operations in support of peace and security in Africa.  相似文献   
125.
The stochastic sequential assignment problem (SSAP) considers how to allocate available distinct workers to sequentially arriving tasks with stochastic parameters such that the expected total reward obtained from the sequential assignments is maximized. Implementing the optimal assignment policy for the SSAP involves calculating a new set of breakpoints upon the arrival of each task (i.e., for every time period), which is impractical for large‐scale problems. This article studies two problems that are concerned with obtaining stationary policies, which achieve the optimal expected reward per task as the number of tasks approaches infinity. The first problem considers independent and identically distributed (IID) tasks with a known distribution function, whereas in the second problem tasks are derived from r different unobservable distributions governed by an ergodic Markov chain. The convergence rate of the expected reward per task to the optimal value is also obtained for both problems. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
126.
Warlord is a label that currently besets us on all fronts. The 2001–2002 military action in Afghanistan is illustrative of the West's ambivalent view of armed factions in the developing world in general. The demonisation of the Taliban and the elevation of the former ‘warlords’ of the opposition to the rather more grandiose sounding ‘Northern Alliance’, at once formalising the hitherto informal nature of the warlord system, implies that the term ‘warlord’ is synonymous with anarchy, violence and a breakdown in civilised values. ‘Warlord’ has become an ugly, detrimental expression, evoking brutality, racketeering and terrorism. Analysts referring to violence across developing countries routinely refer to ‘new wars’ and ‘post-modern’ conflict, and yet the language used to describe these phenomena is usually pre-modern (medievalism, baronial rule, new feudalism). This article outlines some examples of historical warlords and draws out the common issues. In particular it emphasises the fact that warlords have been present for centuries and have periodically emerged whenever centralised political-military control has broken down. All that has changed through history is the technology available to each generation and the relative economic base. The article concludes with a series of implications for policy-makers currently considering intervention in warlord-based economies.  相似文献   
127.
128.
ABSTRACT

In 2014, an affiliate of the Islamic State of Iraq and Syria emerged in Afghanistan. Wilayat Khorasan, or ISIS-K, intends to secure Afghanistan to legitimize the Islamic State’s caliphate across the ‘Khorasan Province’ including portions of Central Asia, China, Iran, the Indian Subcontinent, and Southeast Asia. While the group’s intent is clear, its capability confounds analysts. The authors argue that Wilayat Khorasan is likely the Islamic State’s most viable and lethal regional affiliate based on an expansionist military strategy. This is designed to enable the group’s encirclement of Jalalabad City in Nangarhar Province and is foundational to its expanded operational reach, regionalization, and lethality. Since 2016, the US-led Coalition’s counter-terrorism strategy has disrupted ISIS-K’s critical requirements and prevented external attacks. Yet, raids and strikes alone will not defeat ISIS-K. They must be calibrated against an institution-building approach that legitimizes Afghanistan’s government and redresses grievances that ISIS-K exploits to resolve.  相似文献   
129.
130.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号