全文获取类型
收费全文 | 197篇 |
免费 | 0篇 |
出版年
2023年 | 2篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 5篇 |
2016年 | 3篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 46篇 |
2011年 | 1篇 |
2009年 | 3篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 1篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 6篇 |
1994年 | 5篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1974年 | 4篇 |
1973年 | 3篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 3篇 |
1968年 | 1篇 |
1967年 | 2篇 |
排序方式: 共有197条查询结果,搜索用时 15 毫秒
21.
22.
While the arrival of nuclear weapons coincided roughly with the development of short, medium, intermediate, and eventually intercontinental missiles, the contribution of missile technology to the deterrence equation is often lost. If nuclear weapons were eliminated, even new generation missiles with conventional payloads could struggle to render effective deterrence. But some of the physical and psychological effects commonly ascribed to nuclear weapons could still be in play. And in a world without nuclear weapons, thinking about the use and control of force from the nuclear age would also deserve renewed attention. 相似文献
23.
24.
Let X1 < X2 <… < Xn denote an ordered sample of size n from a Weibull population with cdf F(x) = 1 - exp (?xp), x > 0. Formulae for computing Cov (Xi, Xj) are well known, but they are difficult to use in practice. A simple approximation to Cov(Xi, Xj) is presented here, and its accuracy is discussed. 相似文献
25.
A method is presented to locate and allocate p new facilities in relation to n existing facilities. Each of the n existing facilities has a requirement flow which must be supplied by the new facilities. Rectangular distances are assumed to exist between all facilities. The algorithm proceeds in two stages. In the first stage a set of all possible optimal new facility locations is determined by a set reduction algorithm. The resultant problem is shown to be equivalent to finding the p-median of a weighted connected graph. In the second stage the optimal locations and allocations are obtained by using a technique for solving the p-median problem. 相似文献
26.
Robert A. Agnew 《海军后勤学研究》1972,19(1):137-143
Suppose that a contractor is faced with a sequence of “minimum bid wins contract” competitions. Assuming that a contractor knows his cost to fulfill the contract at each competition and that competitors are merely informed whether or not they have won, bids may be selected sequentially via a tailored stochastic approximation procedure. The efficacy of this approach in certain bidding environments is investigated. 相似文献
27.
28.
29.
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED. 相似文献
30.
Robert Rider 《Defence and Peace Economics》2013,24(1):199-214
Plunder and trade are theoretically and historically entwined in complex ways. This paper examines when rational players will choose one or both by employing a model of plunder within an evolutionary game theoretic framework. Evolutionary stable strategy equilibria are derived and the replicator dynamics are examined for simple two-by-two symmetric games. Not only are positive defense allocations necessary for trade, implying that all trade is of a contested nature, but the defense technology must also exhibit sufficient effectiveness relative to the plunder technology. A continuum of possible exchanges is proposed that is based on the effectiveness of enforcing property claims. For high levels of transactions costs, plunder dominates. As transactions costs decline, mutual trade emerges as one possible exchange mechanism. All market exchange entails some cost of enforcement; it is contested. Insufficient enforcement of property claims produces mutual plunder as the dominant exchange mechanism. Some implications are suggested for institutional evolution. C7 K4 N4 相似文献