全文获取类型
收费全文 | 651篇 |
免费 | 1篇 |
专业分类
652篇 |
出版年
2021年 | 10篇 |
2019年 | 15篇 |
2018年 | 9篇 |
2017年 | 7篇 |
2016年 | 9篇 |
2015年 | 5篇 |
2014年 | 9篇 |
2013年 | 101篇 |
2010年 | 5篇 |
2009年 | 7篇 |
2008年 | 7篇 |
2007年 | 14篇 |
2004年 | 9篇 |
2003年 | 11篇 |
2002年 | 9篇 |
2001年 | 6篇 |
2000年 | 7篇 |
1998年 | 12篇 |
1997年 | 12篇 |
1996年 | 17篇 |
1995年 | 6篇 |
1994年 | 8篇 |
1993年 | 13篇 |
1992年 | 12篇 |
1991年 | 14篇 |
1990年 | 12篇 |
1989年 | 26篇 |
1988年 | 22篇 |
1987年 | 14篇 |
1986年 | 19篇 |
1985年 | 13篇 |
1984年 | 9篇 |
1983年 | 5篇 |
1982年 | 14篇 |
1981年 | 11篇 |
1980年 | 16篇 |
1979年 | 12篇 |
1978年 | 12篇 |
1977年 | 9篇 |
1976年 | 10篇 |
1975年 | 10篇 |
1974年 | 12篇 |
1973年 | 7篇 |
1972年 | 6篇 |
1971年 | 13篇 |
1970年 | 9篇 |
1969年 | 8篇 |
1968年 | 6篇 |
1967年 | 10篇 |
1966年 | 6篇 |
排序方式: 共有652条查询结果,搜索用时 15 毫秒
631.
Reliability Economics is a field that can be defined as the collection of all problems in which there is tension between the performance of systems of interest and their cost. Given such a problem, the aim is to resolve the tension through an optimization process that identifies the system which maximizes some appropriate criterion function (e.g. expected lifetime per unit cost). In this paper, we focus on coherent systems of n independent and identically distributed (iid) components and mixtures thereof, and characterize both a system's performance and cost as functions of the system's signature vector (Samaniego, IEEE Trans Reliabil (1985) 69–72). For a given family of criterion functions, a variety of optimality results are obtained for systems of arbitrary order n. Approximations are developed and justified when the underlying component distribution is unknown. Assuming the availability of an auxiliary sample of N component failure times, the asymptotic theory of L‐estimators is adapted for the purpose of establishing the consistency and asymptotic normality of the proposed estimators of the expected ordered failure times of the n components of the systems under study. These results lead to the identification of ε‐optimal systems relative to the chosen criterion function. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
632.
A single machine is available to process a collection of stochastic tasks. Processing is interrupted when the machine breaks down. We introduce a new model of breakdowns that more realistically incorporates the effects that job processing may have on the machine. This failure propagation model is equivalent to a Bayesian formulation in which learning about breakdown rates occurs as jobs evolve. Optimal scheduling policies are described in terms of Gittins indices and these indices are characterised in two special cases. For example, we obtain conditions which ensure that an optimal policy will only preempt a job's processing either at its completion or at a machine breakdown. We also bound the value lost by simplistic modelling which ignores the learning phenomenon. © 1996 John Wiley & Sons, Inc. 相似文献
633.
When rational choice theory is applied to the study of terrorism, it is important that attention be given to the derived principles of constrained utility maximization. Particularly useful is the Slutsky equation, which rigorously analyzes the quantity response in one activity to a price change in another. By directing attention to assumptions and/or information about compensated cross price elasticities, expenditure shares, and income elasticities, the Slutsky equation can provide critical guidance in both theoretical and empirical analysis. 相似文献
634.
We identify the causal effect of a reduction in military personnel on a number of socioeconomic indicators within the peripheries of military bases. The base realignments and closures in Germany are used as an exogenous source of variation that allows us to identify the effect of a demand shock on household income, output, unemployment, and tax revenue within a specified buffer zone around each base. The analysis covers 298 communities for the period 2003–2007. Consistent with evidence found elsewhere, we find that these base adjustments have only a marginal impact on the local community in which the bases are located. 相似文献
635.
MARTIN R RUPIYA 《African Security Review》2013,22(1):83-89
Abstract This paper seeks to critically appraise Africa's position within the United Nations Security Council from the inception of the UN in 1945 until the end of 2010, spanning the entire history of the world body. A few factors make such an appraisal a useful exercise. These include the ongoing debates about the reform of the Council in particular and the UN as a whole, and the growing interest that many African students and observers of and actors in international relations seem to have developed in recent years in the working of the world body. In this appraisal, emphasis will be placed on the origin and rationale behind the establishment of the Security Council as well as the use of the veto power by its permanent members, with a special reference to Africa. 相似文献
636.
Randall R. Dipert 《Journal of Military Ethics》2013,12(1):34-53
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices. 相似文献
637.
Thomas R. Mockaitis Max G. Manwaring Daniel W. Fitz‐Simons Richard Holmes 《Small Wars & Insurgencies》2013,24(2):254-260
Norman Cigar, Genocide in Bosnia: The Policy of “Ethnic Cleansing”. College Station, Texas: Texas A&M University Press, 1995. Pp.xiv + 247; app., map, notes, cartoon. Maria Jose Moyano, Argentina's Lost Patrol: Armed Struggle, 1969–1979. New Haven: Connecticut Yale University Press, 1995. Pp.xiii + 226, biblio., abbreviations, 10 figures, 1 map, tables, index; $25/£16.95. ISBN 0–300–01622–6. Donald E. Schulz and Deborah Sundloff Schulz, The United States, Honduras, and the Crisis in Central America, Westview Thematic Studies in Latin America, Boulder, Co: Westview, 1994. Pp.368, map, figure, select biblio., abbreviations, index. $52.50/£37.50; (cloth) $17.95/£11.95 (paper). ISBN 0–8133–1324–4 and 1323–6. Joseph H. Alexander and Merrill L. Bartlett, Sea Soldiers in the Cold War: Amphibious Warfare 1945–1991. Annapolis, Maryland: Naval Institute Press, 1995. Pp.iii + 178, 1 map, 29 illus, biblio, index. $32.95. ISBN Gary P. Cox, The Halt in the Mud: French Strategic Planning from Waterloo to Sedan. Westview Press, 1994. Pp.258, maps, notes, biblio, index. £33.50. ISBN 0–133–1536–0. 相似文献
638.
Paul R. Kan 《Small Wars & Insurgencies》2013,24(2):148-162
War and drugs share many characteristics – both are destructive of human life, highly profitable to some, and efforts to regulate them have failed. In fact, at various times throughout history, war and drugs have been intertwined, prolonging human suffering, bedeviling political leaders and enriching a select few. The pernicious role of drugs in organized political violence is often overlooked. Drugs have been the cause of war, the funding for military operations, used by combatants and a part of the post-war political landscape. The insidious nature of drugs is especially visible in a certain type of war – small wars – yet is virtually unexamined by scholars and decision-makers. 相似文献
639.
This paper describes a technique for the calculation of the probability that a helicopter can lift a specified load, or number of loads with a specified frequency distribution, in a given geographical region. This probability is computed by determining the bivariate altitude-temperature probability distribution for the specified region. The payload capability at any given temperature and altitude is calculated from standard performance equations. By integrating this over the altitude-temperature distribution, it is possible to obtain the probability distribution of payload capability, from which the required probabilities of lifting specific loads can be determined. 相似文献
640.
Paul D. Berger 《海军后勤学研究》1972,19(1):159-164
This paper poses a prediction problem in which a linear model is assumed. With a “zero-one” loss structure as the loss from incorrect prediction, it is suggested that least squares may not be appropriate for estimating the parameters of the model. An alternate criterion is proposed and integer programming is used in order to find the estimates, given the proposed criterion. 相似文献