全文获取类型
收费全文 | 638篇 |
免费 | 13篇 |
出版年
2021年 | 11篇 |
2020年 | 6篇 |
2019年 | 25篇 |
2018年 | 18篇 |
2017年 | 16篇 |
2016年 | 16篇 |
2015年 | 15篇 |
2014年 | 12篇 |
2013年 | 153篇 |
2009年 | 6篇 |
2008年 | 7篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 10篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 6篇 |
2000年 | 8篇 |
1999年 | 6篇 |
1998年 | 12篇 |
1997年 | 19篇 |
1996年 | 11篇 |
1994年 | 13篇 |
1992年 | 7篇 |
1991年 | 16篇 |
1990年 | 7篇 |
1989年 | 9篇 |
1988年 | 10篇 |
1987年 | 15篇 |
1986年 | 12篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 8篇 |
1982年 | 11篇 |
1981年 | 5篇 |
1980年 | 8篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1975年 | 9篇 |
1974年 | 7篇 |
1973年 | 13篇 |
1972年 | 7篇 |
1971年 | 7篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 7篇 |
1967年 | 5篇 |
排序方式: 共有651条查询结果,搜索用时 15 毫秒
411.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed. 相似文献
412.
This article analyzes the public side of the NH90 network consisting of four participating countries (Germany, France, Italy, and the Netherlands) and their industrial partners. Comparable to observations in earlier international projects in the defense sector, the development and production of the NH90 defense helicopter did not match original plans and costs estimates. On the basis of four mechanisms that were intended to facilitate the cooperation between the partnering countries (the General Memorandum of Understanding; coalition formation; the role of the central agency; and the process of vertical escalation) the question is posed whether or not there was a true alignment of national interests and “logics.” The lack of standardization, as well as program delays and issues concerning the division of the work-share, lead to the emerging alignment being characterized as “quasi-alignment” at best. 相似文献
413.
414.
415.
416.
Adam M. Scheinman 《The Nonproliferation Review》2013,20(2):257-267
International Atomic Energy Agency (IAEA) safeguards are under more stress today than at any time in their history. Compliance concerns, a shortage of resources and technology, and growing responsibilities threaten to undermine the effectiveness and credibility of this vital and fundamental pillar of the nonproliferation regime. To address this challenge, the United States recently launched the Next Generation Safeguards Initiative. The goal of this initiative is to ensure the IAEA makes the fullest possible use of its existing authority to prevent the diversion of safeguarded material and to investigate suspicious activities. The initiative will advance state-of-the-art technology, foster the development of a new generation of safeguards experts, and promote technology collaborations and safeguards-conscious infrastructure in states using or pursuing nuclear power. Although it has a domestic focus, the initiative's intent is to catalyze a much broader commitment to international safeguards in partnership with other governments and the IAEA. 相似文献
417.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014 相似文献
418.
A mathematical formulation and efficient heuristics for the dynamic container relocation problem 下载免费PDF全文
The container relocation problem (CRP) is concerned with emptying a single yard‐bay which contains J containers each following a given pickup order so as to minimize the total number of relocations made during their retrieval process. The CRP can be modeled as a binary integer programming (IP) problem and is known to be NP‐hard. In this work, we focus on an extension of the CRP to the case where containers are both received and retrieved from a single yard‐bay, and call it the dynamic container relocation problem. The arrival (departure) sequences of containers to (from) the yard‐bay is assumed to be known a priori. A binary IP formulation is presented for the problem. Then, we propose three types of heuristic methods: index based heuristics, heuristics using the binary IP formulation, and a beam search heuristic. Computational experiments are performed on an extensive set of randomly generated test instances. Our results show that beam search heuristic is very efficient and performs better than the other heuristic methods.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 101–118, 2014 相似文献
419.
Moment estimators for the parameters of the Weibull distribution are considered in the context of analysis of field data. The data available are aggregated, with individual failure times not recorded. In this case, the complexity of the likelihood function argues against the use of maximum-likelihood estimation, particularly for relatively large sets of data, and moment estimators are a reasonable alternative. In this article, we derive the asymptotic covariance matrix of the moment estimators, and provide listings for BASIC computer programs which generate tables useful for calculation of the estimates as well as for estimating the asymptotic covariance matrix using aggregated data. 相似文献
420.