首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369篇
  免费   6篇
  2021年   7篇
  2019年   7篇
  2018年   4篇
  2017年   3篇
  2016年   7篇
  2015年   2篇
  2014年   5篇
  2013年   55篇
  2012年   3篇
  2009年   4篇
  2007年   12篇
  2005年   2篇
  2004年   3篇
  2003年   7篇
  2002年   6篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   7篇
  1997年   8篇
  1996年   9篇
  1995年   3篇
  1994年   6篇
  1993年   10篇
  1992年   7篇
  1991年   9篇
  1990年   11篇
  1989年   17篇
  1988年   14篇
  1987年   7篇
  1986年   13篇
  1985年   7篇
  1984年   4篇
  1983年   3篇
  1982年   10篇
  1981年   6篇
  1980年   7篇
  1979年   9篇
  1978年   8篇
  1977年   5篇
  1976年   5篇
  1975年   4篇
  1974年   8篇
  1973年   5篇
  1972年   3篇
  1971年   7篇
  1970年   6篇
  1969年   5篇
  1967年   5篇
  1948年   4篇
排序方式: 共有375条查询结果,搜索用时 0 毫秒
121.
In this paper we study a machine repair problem in which a single unreliable server maintains N identical machines. The breakdown times of the machines are assumed to follow an exponential distribution. The server is subject to failure and the failure times are exponentially distributed. The repair times of the machine and the service times of the repairman are assumed to be of phase type. Using matrix‐analytic methods, we perform steady state analysis of this model. The time spent by a failed machine in service and the total time in the repair facility are shown to be of phase type. Several performance measures are evaluated. An optimization problem to determine the number of machines to be assigned to the server that will maximize the expected total profit per unit time is discussed. An illustrative numerical example is presented. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 462–480, 2003  相似文献   
122.
In this paper we consider networks that consist of components operating under a randomly changing common environment. Our work is motivated by power system networks that are subject to fluctuating weather conditions over time that affect the performance of the network. We develop a general setup for any network that is subject to such environment and present results for network reliability assessment under two repair scenarios. We also present Bayesian analysis of network failure data and illustrate how reliability predictions can be obtained for the network. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 574–591, 2003  相似文献   
123.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
124.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion.  相似文献   
125.
126.
Post-Cold War “lab-to-lab” collaborations on unclassified scientific issues between U.S. and Russian nuclear weapons laboratories set the stage for bilateral cooperation in materials control and other nuclear areas. They also became the major element in a cooperative process initiated by a Presidential Decision Directive to ensure Russia's compliance with the Comprehensive Nuclear-Test-Ban Treaty. These collaborations have always been highly favored by leaders of the Russian nuclear weapons complex—the same leaders who oversee Russia's participation in various government-to-government programs. This article reviews these collaborations and examines the possibility that U.S. rebuffs of Russian proposals and the U.S. failure to keep promises of expanded collaboration could contribute to Russia's reluctance in major programs and even lead to a return to nuclear testing by Russia. The author argues that a renewed U.S. commitment to the process should be an immediate goal of the Obama administration and is an essential step in re-engaging Russia to solve the nuclear problems remaining from the Cold War. Steps for doing so are recommended.  相似文献   
127.
128.
129.
The material in this overview is drawn from selected abstracts that appear in the Center for Nonproliferation Studies’ nuclear and missile databases. Transactions of nuclear and missile technologies, parts, and materials are listed according o the recipient country. Other developments are listed according to the country where the event or development took place.  相似文献   
130.
Strategic terrorism: The framework and its fallacies   总被引:1,自引:0,他引:1  
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号