首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   640篇
  免费   11篇
  2021年   11篇
  2019年   15篇
  2018年   9篇
  2017年   7篇
  2016年   9篇
  2015年   5篇
  2014年   9篇
  2013年   101篇
  2010年   5篇
  2009年   7篇
  2008年   7篇
  2007年   14篇
  2004年   9篇
  2003年   11篇
  2002年   9篇
  2001年   6篇
  2000年   7篇
  1998年   12篇
  1997年   12篇
  1996年   17篇
  1995年   6篇
  1994年   8篇
  1993年   13篇
  1992年   12篇
  1991年   14篇
  1990年   12篇
  1989年   25篇
  1988年   22篇
  1987年   14篇
  1986年   19篇
  1985年   13篇
  1984年   9篇
  1983年   5篇
  1982年   14篇
  1981年   11篇
  1980年   16篇
  1979年   12篇
  1978年   12篇
  1977年   9篇
  1976年   10篇
  1975年   10篇
  1974年   12篇
  1973年   7篇
  1972年   6篇
  1971年   13篇
  1970年   9篇
  1969年   8篇
  1968年   6篇
  1967年   10篇
  1966年   6篇
排序方式: 共有651条查询结果,搜索用时 31 毫秒
541.
This article further considers the two‐person continuous ambush game introduced by Ruckle. This article extends the work of Ruckle, Baston and Bostock, and Lee by considering the game for a general number of barriers. By supplanting optimal strategies from a discretized version of the game, we show that there always exists a value for the game, which, furthermore, can be found using linear programming techniques. Further to this, we show that the discrete ambush game considered by Garnaev has the same value as a continuous game, allowing many new results to be obtained in both games. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 515–529, 2003  相似文献   
542.
When solving location problems in practice it is quite common to aggregate demand points into centroids. Solving a location problem with aggregated demand data is computationally easier, but the aggregation process introduces error. We develop theory and algorithms for certain types of centroid aggregations for rectilinear 1‐median problems. The objective is to construct an aggregation that minimizes the maximum aggregation error. We focus on row‐column aggregations, and make use of aggregation results for 1‐median problems on the line to do aggregation for 1‐median problems in the plane. The aggregations developed for the 1‐median problem are then used to construct approximate n‐median problems. We test the theory computationally on n‐median problems (n ≥ 1) using both randomly generated, as well as real, data. Every error measure we consider can be well approximated by some power function in the number of aggregate demand points. Each such function exhibits decreasing returns to scale. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 614–637, 2003.  相似文献   
543.
544.
This paper deals with the sequencing problem of minimizing linear delay costs with parallel identical processors. The theoretical properties of this m-machine problem are explored, and the problem of determining an optimum scheduling procedure is examined. Properties of the optimum schedule are given as well as the corresponding reductions in the number of schedules that must be evaluated in the search for an optimum. An experimental comparison of scheduling rules is reported; this indicates that although a class of effective heuristics can be identified, their relative behavior is difficult to characterize.  相似文献   
545.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
546.
When rational choice theory is applied to the study of terrorism, it is important that attention be given to the derived principles of constrained utility maximization. Particularly useful is the Slutsky equation, which rigorously analyzes the quantity response in one activity to a price change in another. By directing attention to assumptions and/or information about compensated cross price elasticities, expenditure shares, and income elasticities, the Slutsky equation can provide critical guidance in both theoretical and empirical analysis.  相似文献   
547.
After a brief survey of the Indian economy, we survey the supply and demand of military expenditures in India over the last four decades. The causes of military expenditures appear to include regional rivalries and protracted conflicts, but it has proven difficult to delineate these with empirical models. The effects of military spending in India on economic growth appear to be benign, despite much speculation to the contrary. However, the opportunity costs of defence spending are shown to be considerable. We conclude with speculation about the role of debt and debt servicing in retarding future economic growth in India. We also speculate about the potential for the creation of a war economy in India.  相似文献   
548.
FOOD AID     
Abstract

This paper seeks to critically appraise Africa's position within the United Nations Security Council from the inception of the UN in 1945 until the end of 2010, spanning the entire history of the world body. A few factors make such an appraisal a useful exercise. These include the ongoing debates about the reform of the Council in particular and the UN as a whole, and the growing interest that many African students and observers of and actors in international relations seem to have developed in recent years in the working of the world body. In this appraisal, emphasis will be placed on the origin and rationale behind the establishment of the Security Council as well as the use of the veto power by its permanent members, with a special reference to Africa.  相似文献   
549.
We identify the causal effect of a reduction in military personnel on a number of socioeconomic indicators within the peripheries of military bases. The base realignments and closures in Germany are used as an exogenous source of variation that allows us to identify the effect of a demand shock on household income, output, unemployment, and tax revenue within a specified buffer zone around each base. The analysis covers 298 communities for the period 2003–2007. Consistent with evidence found elsewhere, we find that these base adjustments have only a marginal impact on the local community in which the bases are located.  相似文献   
550.
CONTRIBUTORS     
Conventional wisdom states that the stability-instability paradox does not explain the effect of nuclear proliferation on the conflict propensity of South Asia, and that nuclear weapons have had a different and more dangerous impact in South Asia than Cold War Europe. I argue that the paradox explains nuclear South Asia; that the similarities between nuclear South Asia and Cold War Europe are strong; and that conventional instability does not cause revisionist challenges in the long run. I develop and probe a psychological causal mechanism that explains the impact of nuclear weapons on Cold War Europe and South Asia. Following the ten-month mobilized crisis in 2002, Pakistani President Pervez Musharraf may have adopted a more moderate foreign policy toward India after experiencing fear of imminent nuclear war, as Soviet Premier Nikita Khrushchev did forty years earlier. I argue that the stability-instability paradox explains Cold War Europe and nuclear South Asia and will, conditional on Iranian and North Korean revisionism, predict the impact of nuclear weapon development on these states' conflict propensities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号