首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   381篇
  免费   0篇
  381篇
  2021年   6篇
  2019年   7篇
  2018年   5篇
  2017年   3篇
  2016年   7篇
  2015年   2篇
  2014年   7篇
  2013年   57篇
  2012年   3篇
  2009年   4篇
  2007年   12篇
  2005年   2篇
  2004年   3篇
  2003年   7篇
  2002年   7篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   7篇
  1997年   8篇
  1996年   9篇
  1995年   3篇
  1994年   6篇
  1993年   10篇
  1992年   7篇
  1991年   9篇
  1990年   10篇
  1989年   17篇
  1988年   14篇
  1987年   7篇
  1986年   13篇
  1985年   7篇
  1984年   4篇
  1983年   3篇
  1982年   10篇
  1981年   6篇
  1980年   7篇
  1979年   10篇
  1978年   8篇
  1977年   5篇
  1976年   5篇
  1975年   4篇
  1974年   8篇
  1973年   5篇
  1972年   3篇
  1971年   7篇
  1970年   6篇
  1969年   5篇
  1967年   6篇
  1948年   4篇
排序方式: 共有381条查询结果,搜索用时 15 毫秒
371.
    
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
372.
    
Norman Cigar, Genocide in Bosnia: The Policy of “Ethnic Cleansing”. College Station, Texas: Texas A&M University Press, 1995. Pp.xiv + 247; app., map, notes, cartoon.

Maria Jose Moyano, Argentina's Lost Patrol: Armed Struggle, 1969–1979. New Haven: Connecticut Yale University Press, 1995. Pp.xiii + 226, biblio., abbreviations, 10 figures, 1 map, tables, index; $25/£16.95. ISBN 0–300–01622–6.

Donald E. Schulz and Deborah Sundloff Schulz, The United States, Honduras, and the Crisis in Central America, Westview Thematic Studies in Latin America, Boulder, Co: Westview, 1994. Pp.368, map, figure, select biblio., abbreviations, index. $52.50/£37.50; (cloth) $17.95/£11.95 (paper). ISBN 0–8133–1324–4 and 1323–6.

Joseph H. Alexander and Merrill L. Bartlett, Sea Soldiers in the Cold War: Amphibious Warfare 1945–1991. Annapolis, Maryland: Naval Institute Press, 1995. Pp.iii + 178, 1 map, 29 illus, biblio, index. $32.95. ISBN

Gary P. Cox, The Halt in the Mud: French Strategic Planning from Waterloo to Sedan. Westview Press, 1994. Pp.258, maps, notes, biblio, index. £33.50. ISBN 0–133–1536–0.  相似文献   
373.
    
Many authors contend that ethnic extremism coupled with political manipulation were the primary factors behind the Rwandan genocide. Yet, to oversimplify the cause of this tragedy makes one blind to the complicated nexus that generated the outcome. Even though this genocide was quick in its execution, the events that lead to this massacre took years to unfold. We argue that the evolution of human capital and the competition for scarce resources contributed to the genocide.  相似文献   
374.
    
War and drugs share many characteristics – both are destructive of human life, highly profitable to some, and efforts to regulate them have failed. In fact, at various times throughout history, war and drugs have been intertwined, prolonging human suffering, bedeviling political leaders and enriching a select few. The pernicious role of drugs in organized political violence is often overlooked. Drugs have been the cause of war, the funding for military operations, used by combatants and a part of the post-war political landscape. The insidious nature of drugs is especially visible in a certain type of war – small wars – yet is virtually unexamined by scholars and decision-makers.  相似文献   
375.
    
This paper describes a technique for the calculation of the probability that a helicopter can lift a specified load, or number of loads with a specified frequency distribution, in a given geographical region. This probability is computed by determining the bivariate altitude-temperature probability distribution for the specified region. The payload capability at any given temperature and altitude is calculated from standard performance equations. By integrating this over the altitude-temperature distribution, it is possible to obtain the probability distribution of payload capability, from which the required probabilities of lifting specific loads can be determined.  相似文献   
376.
    
In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross‐trained) worker. For a three‐station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using analytical models and extensive simulation experiments, we also evaluate the effectiveness of practical heuristic control policies and provide managerial insights on automation configuration design of the line. This characterization of the worker control policy enables us to develop managerial insights into the design issues of how best to locate and concentrate automation in the line. Finally, we show that, in addition to ease of control and greater design flexibility, the CONWIP protocol also offers higher efficiency and robustness than does the push protocol. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
377.
    
Unit‐load warehouses store and retrieve unit‐loads, typically pallets. When storage and retrieval operations are not coordinated, travel is from a pickup and deposit (P&D) point to a pallet location and back again. In some facilities, workers interleave storage and retrieval operations to form a dual‐command cycle. Two new aisle designs proposed by Gue and Meller (“Improving the unit‐load warehouse.” In Progress in Material Handling Research: 2006. Material Handling Industry of America, Charlotte, NC, 2006) use diagonal aisles to reduce the travel distance to a single pallet location by approximately 10 and 20[percnt] for the two designs, respectively. We develop analytical expressions for travel between pallet locations for one of these—the fishbone design. We then compare fishbone warehouses that have been optimized for dual‐command to traditional warehouses that have been optimized in the same manner, and show that an optimal fishbone design reduces dual‐command travel by 10–15%. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 54: 389–403, 2009  相似文献   
378.
379.
    
It is well known that a minimal makespan permutation sequence exists for the n × 3 flow shop problem and for the n × m flow shop problem with no inprocess waiting when processing times for both types of problems are positive. It is shown in this paper that when the assumption of positive processing times is relaxed to include nonnegative processing times, optimality of permutation schedules cannot be guaranteed.  相似文献   
380.
    
We present techniques for classifying Markov chains with a continuous state space as either ergodic or recurrent. These methods are analogous to those of Foster for countable space chains. The theory is presented in the first half of the paper, while the second half consists of examples illustrating these techniques. The technique for proving ergodicity involves, in practice, three steps: showing that the chain is irreducible in a suitable sense; verifying that the mean hitting times on certain (usually bounded) sets are bounded, by using a “mean drift” criterion analogous to that of Foster; and finally, checking that the chain is such that bounded mean hitting times for these sets does actually imply ergodicity. The examples comprise a number of known and new results: using our techniques we investigate random walks, queues with waiting-time-dependent service times, dams with general and random-release rules, the s-S inventory model, and feedback models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号