首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   2篇
  2020年   1篇
  2019年   5篇
  2018年   2篇
  2017年   6篇
  2016年   1篇
  2015年   1篇
  2014年   5篇
  2013年   46篇
  2012年   1篇
  2010年   2篇
  2009年   1篇
  2007年   1篇
  2002年   1篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   3篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有115条查询结果,搜索用时 15 毫秒
41.
This article argues that French naval policy‐makers were slow to adjust to the changed strategic landscape of the 1930s. During the 1920s France did not face a serious land or air threat. Defence policy‐makers were therefore able to devote a large portion of the defence budget to rebuilding French maritime power. But when the Depression and the rise of Nazi Germany overturned the strategic situation in Europe, policy‐makers adjusted by giving priority to land and air rearmament and by placing ever greater emphasis on securing an alliance with Great Britain. The French naval establishment resisted this trend unsuccessfully. The frustration of naval planning increased the resentment and mistrust of both the Third Republic and Great Britain that characterised naval attitudes before and particularly during the Second World War.  相似文献   
42.
Three different solutions to a very simple transfer pricing problem are outlined and contrasted. These are labeled by their authors: Hirshleifer, Enzer, and Ronen and McKinney. Weaknesses associated with each solution are pointed out.  相似文献   
43.
Proposed is a Heuristic Network (HN) Procedure for balancing assembly lines. The procedure uses simple heuristic rules to generate a network which is then traversed using a shortest route algorithm to obtain a heuristic solution. The advantages of the HN Procedure are: a) it generally yields better solutions than those obtained by application of the heuristics, and b) sensitivity analysis with different values of cycle time is possible without having to regenerate the network. The rationale for its effectiveness and its application to problems with paralleling are presented. Computational experience with the procedure on up to 50 task test problems is provided.  相似文献   
44.
45.
Book reviews     
The Balkanization of the West: The Confluence of Postmodernism and Postcommunism By Stjepan G. Mestrovic, Routledge, London (1994). ISBN: 0-414-08755-4, Price £40.00 hardback, £13.99 paperback.

A Naval History of World War I By Professor Paul G. Halpern, UCL Press, 1994. pp. 624 ISBN 1-85728-295-7. Price £25.00

Arms Watch - SIPRI Report on the First Year of the UN Register of Conventional Arms By Edward J. Laurance, Siemon T. Wezeman and Herbert Wulf, Oxford University Press for SIPRI (1993) ISBN 019-829-1795, Price £25.00 hardback, £16.50 paperback.

A League of Airmen By J. A. Winnefeld, (Ed.), RAND, Santa Monica, ISBN 08330-1503-6, Price $30.00 (Hardcover) $15.00 (Softcover)  相似文献   
46.
In this paper a stochastically constrained replacement model is formulated. This model determines a sequence of replacement dates such that the total “current account” cost of all future costs and capital expenditures over an infinite time horizon for the n initial incumbent machines is minimized subject to the constraints that an expected number of machines are in a chosen utility class at any point in time. We then indicate one possible solution method for the model.  相似文献   
47.
48.
On-site verification of ICBMs in the context of an arms control agreement might involve a situation where an inspector would choose one or more of a number of identical areas to inspect and would have confidence that the other areas had the same characteristics. This article considers optimal attack and defense of missiles deceptively based in a number of identical areas. The attacker may allocate warheads across areas as he desires and uniformly within areas. The defender may allocate interceptors across areas as he desires and either uniformly or preferentially within areas. The effect of restricting the defender to uniform allocation across areas is explored for various assumptions. Robustness of surviving missiles with respect to the number of attacking warheads is studied. Results are presented for a wide range of cases.  相似文献   
49.
A theory of additive utilities is discussed for cases where the set X, on which an individual's preference-indifference relation is defined, is a subset of the Cartesian product of n finite sets. A number of potential applications of additive utilities in decision making are presented.  相似文献   
50.
Pakistan confronts numerous domestic security challenges including jihadist extremism, Sunni-Shi'a sectarian violence, drug trafficking, illegal commodity smuggling, endemic corruption, and systemic problems with the provision of justice and law enforcement. While much has been written about US military assistance to the Government of Pakistan (GOP) and the ever-evolving political relations between the two countries, basic questions of highest policy significance related to Pakistan's internal security have never been fully studied or considered. This essay begins to address these empirical lacunae. It first provides a comprehensive examination of Pakistan's internal security environment and the effectiveness of the GOP's criminal justice structures in dealing with these challenges. The paper then goes on to assess the impact and utility of the current suite of US law enforcement assistance in helping to fortify Pakistan's domestic security environment. The study raises a number of difficult questions pertinent to the long-term impact of this support, particularly in terms of its effect on fostering a viable, accountable and transparent system of civilian governance and policing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号