全文获取类型
收费全文 | 350篇 |
免费 | 5篇 |
出版年
2021年 | 3篇 |
2019年 | 8篇 |
2018年 | 3篇 |
2017年 | 10篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 7篇 |
2013年 | 105篇 |
2010年 | 4篇 |
2008年 | 3篇 |
2007年 | 4篇 |
2006年 | 2篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1996年 | 6篇 |
1995年 | 7篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 6篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 8篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 7篇 |
1983年 | 3篇 |
1982年 | 9篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1975年 | 5篇 |
1974年 | 5篇 |
1973年 | 6篇 |
1972年 | 5篇 |
1971年 | 9篇 |
1970年 | 4篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 5篇 |
1966年 | 2篇 |
1948年 | 3篇 |
排序方式: 共有355条查询结果,搜索用时 15 毫秒
211.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains. 相似文献
212.
Capability-based planning (CBP) is considered by many defence organisations to be the best practice for enterprise-level planning, analysis and management. This approach, loosely based around investment portfolio theory, is premised on balancing the cost, benefit and risk of capability options across the defence enterprise. However a number of authors have recently noted limitations of its current applications. The authors propose a more general, insurance-based approach, which can support the evolutionary improvement of the current CBP approach. This approach is implemented as hedging-based planning and aims to better reflect the enterprise nature of defence organisations, capturing both force structure and force generation aspects of military systems. 相似文献
213.
This article investigates the little-known plans formulated by Harold Wilson's Labour government to deploy Polaris submarines in the Indo-Pacific region. The scheme was first proposed in 1965 as a response to several problems faced by British policy-makers, including China's acquisition of a nuclear capability, Britain's wish to maintain a meaningful position ‘East of Suez’ at reduced cost, and German pressure for equal treatment within NATO on nuclear matters. Despite extensive high-level discussion, the plans were finally abandoned in mid-1968, as Labour moved more decisively to forsake the world role. 相似文献
214.
Peter Viggo Jakobsen 《战略研究杂志》2013,36(2):1-22
This article demonstrates that assurances and carrots accompanied credible threats every time Western coercion succeeded in Bosnia. This finding is hardly surprising as it merely confirms earlier research on coercive diplomacy, but it is nevertheless important because the crucial role played by assurances and carrots has been completely ignored in most analyses to date. It also has important policy implications at a time when Western, and particularly American, policy‐makers tend to ignore this fact at their peril. US policy towards Iraq and Western policy towards Yugoslavia have been based almost exclusively on the stick in recent years, and its lack of success is therefore not surprising. If Western policy‐makers had learned the right lessons from Bosnia, they would have known that strategies coupling credible threats with credible assurances and carrots would have been more likely to succeed. 相似文献
215.
Jeffrey W. Knopf 《战略研究杂志》2013,36(3):375-399
Strategies that seek to assure other states about their security have the potential to reduce international conflict and dissuade states from seeking nuclear weapons. Yet, relative to other tools of statecraft such as deterrence, assurance remains understudied. To facilitate further empirical research on assurance strategies, this article identifies variations in the terminology scholars and policymakers have used to refer to such strategies and describes the concept of assurance associated with each variant. It seeks to clarify and standardize usage and show that there is a general, overarching concept of assurance that links the different variants. It also summarizes existing bodies of empirical research that are relevant to assessing the utility of different forms of assurance. 相似文献
216.
Matthew Hughes W. J. R. Gardner Ian F. W. Beckett Eric Grove Philip Jones Craig A. Snyder 《战略研究杂志》2013,36(4):160-169
John Horsfield, The Art of Leadership in War. The Royal Navy From the Age of Nelson to the End of World War II. Westport, Conn. and London: Greenwood Press, 1980. Pp. 240; £14.75. John Joseph Timothy Sweet, Iron Arm: The Mechanization of Mussolini's Army, 1920–1940. Westport, Connecticut &; London: Greenwood Press. 1980. Pp. 207; £15.50. Peter H. Merkl, The Making of a Stormtrooper. Princeton, N.J: Princeton U.P., 1980. Pp. 328; £8.60. Greg Herken, The Winning Weapon: The Atomic Bomb in the Cold War 1945–1950. New York: Alfred A. Knopf, 1980. Pp. 425; $15.00. Geoffrey Smith and Nelson W. Polsby, British Government and its Discontents. New York: Basic Books, and London: Harper and Row, 1981. Pp. 202; £7.95. Seweryn Bialer (ed.), The Domestic Context of Soviet Foreign Policy. Boulder, Colorado: Westview Press and London: Croom Helm, 1981. Pp. 441; £14.95. Jerry F. Hough, Soviet Leadership in Transition. Washington, D.C.: Brookings Institution and Oxford, Basil Blackwell, 1981. Pp. 175; £12.00 (hb.) and £3.95 (pb.) Edward F. Mickolus, Transnational Terrorism: A Chronology of Events 1968–1979. London: Aldwych Press, 1980. Pp. 967; £39.95. Barry Rubin, The Great Powers in the Middle East, 1941–47; The Road to the Cold War, London: Frank Cass, 1980. Pp. 254; £14.50; Daniel Heradstveit, The Arab‐Israeli Conflict; Psychological Obstacles to Peace. Oslo: Universittsforlaget, 1979. Pp. 234; £11.60; Janice Gross Stein, and Raymond Tanter, Rational Decision‐making; Israel's Security Choices 1967. Columbus. Ohio; Ohio State University Press, 1980. Pp. 399; $35. 相似文献
217.
W. Alejandro Sanchez 《Small Wars & Insurgencies》2013,24(1):113-133
The Islamic Movement of Uzbekistan (IMU) is a Central Asian terrorist organization that has carried out series of attacks in countries like Uzbekistan, Kyrgyzstan and Tajikistan for years. With the ultimate goal of creating a Central Asian Caliphate, the IMU, even in its current weak state, is a regional threat. A military solution to this problem appears to be the likely answer. Regional powers like the Russian Federation and China should be militarily involved in Uzbekistan, along with Uzbek and neighboring forces in order to defeat the IMU militarily. This will promote greater integration among these countries and eliminate a violent organization which could become a destabilizing factor if not dealt with. 相似文献
218.
Peter M. Sales 《Small Wars & Insurgencies》2013,24(1):93-97
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society. 相似文献
219.
220.
This article introduces maximum cooperative purchasing (MCP)‐situations, a new class of cooperative purchasing situations. Next, an explicit alternative mathematical characterization of the nucleolus of cooperative games is provided. The allocation of possible cost savings in MCP‐situations, in which the unit price depends on the largest order quantity within a group of players, is analyzed by defining corresponding cooperative MCP‐games. We show that a decreasing unit price is a sufficient condition for a nonempty core: there is a set of marginal vectors that belong to the core. The nucleolus of an MCP‐game can be derived in polynomial time from one of these marginal vectors. To show this result, we use the new mathematical characterization for the nucleolus for cooperative games. Using the decomposition of an MCP‐game into unanimity games, we find an explicit expression for the Shapley value. Finally, the behavior of the solution concepts is compared numerically. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 607–624, 2013 相似文献