全文获取类型
收费全文 | 3334篇 |
免费 | 82篇 |
国内免费 | 1篇 |
专业分类
3417篇 |
出版年
2021年 | 37篇 |
2019年 | 88篇 |
2018年 | 51篇 |
2017年 | 81篇 |
2016年 | 79篇 |
2015年 | 63篇 |
2014年 | 64篇 |
2013年 | 701篇 |
2010年 | 36篇 |
2009年 | 37篇 |
2008年 | 47篇 |
2007年 | 52篇 |
2006年 | 36篇 |
2005年 | 43篇 |
2004年 | 56篇 |
2003年 | 42篇 |
2002年 | 57篇 |
1999年 | 41篇 |
1998年 | 46篇 |
1997年 | 50篇 |
1996年 | 63篇 |
1995年 | 41篇 |
1994年 | 59篇 |
1993年 | 64篇 |
1992年 | 58篇 |
1991年 | 74篇 |
1990年 | 39篇 |
1989年 | 72篇 |
1988年 | 78篇 |
1987年 | 68篇 |
1986年 | 71篇 |
1985年 | 64篇 |
1984年 | 36篇 |
1983年 | 42篇 |
1982年 | 43篇 |
1981年 | 46篇 |
1980年 | 51篇 |
1979年 | 45篇 |
1978年 | 49篇 |
1977年 | 45篇 |
1976年 | 45篇 |
1975年 | 46篇 |
1974年 | 52篇 |
1973年 | 50篇 |
1972年 | 52篇 |
1971年 | 43篇 |
1970年 | 40篇 |
1969年 | 40篇 |
1968年 | 34篇 |
1967年 | 34篇 |
排序方式: 共有3417条查询结果,搜索用时 15 毫秒
521.
Rendezvous search finds the strategies that players should use in order to find one another when they are separated in a region. Previous papers have concentrated on the case where there are two players searching for one another. This paper looks at the problem when there are more than two players and concentrates on what they should do if some but not all of them meet together. It looks at two strategies—the stick together one and the split up and meet again one. This paper shows that the former is optimal among the class of strategies which require no memory and are stationary, and it gives a method of calculating the expected rendezvous time under it. However, simulation results comparing both strategies suggest that in most situations the split up and meet again strategy which requires some memory leads to faster expected rendezvous times. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48:710–721, 2001 相似文献
522.
R.E. Lillo 《海军后勤学研究》2001,48(3):201-209
An optimal operating policy is characterized for the infinite‐horizon average‐cost case of a single server queueing control problem. The server may be turned on at arrival epochs or off at departure epochs. Two classes of customers, each of them arriving according to an independent Poisson processes, are considered. An arriving 1‐customer enters the system if the server is turned on upon his arrival, or if the server is on and idle. In the former case, the 1‐customer is selected for service ahead of those customers waiting in the system; otherwise he leaves the system immediately. 2‐Customers remain in the system until they complete their service requirements. Under a linear cost structure, this paper shows that a stationary optimal policy exists such that either (1) leaves the server on at all times, or (2) turns the server off when the system is empty. In the latter case, we show that the stationary optimal policy is a threshold strategy, this feature being commonplace in most of priority queueing systems and inventory models. However, the optimal policy in our model is determined by two thresholds instead of one. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 201–209, 2001 相似文献
523.
The “gold‐mining” decision problem is concerned with the efficient utilization of a delicate mining equipment working in a number of different mines. Richard Bellman was the first to consider this type of a problem. The solution found by Bellman for the finite‐horizon, continuous‐time version of the problem with two mines is not overly realistic since he assumed that fractional parts of the same mining equipment could be used in different mines and this fraction could change instantaneously. In this paper, we provide some extensions to this model in order to produce more operational and realistic solutions. Our first model is concerned with developing an operational policy where the equipment may be switched from one mine to the other at most once during a finite horizon. In the next extension we incorporate a cost component in the objective function and assume that the horizon length is not fixed but it is the second decision variable. Structural properties of the optimal solutions are obtained using nonlinear programming. Each model and its solution is illustrated with a numerical example. The models developed here may have potential applications in other areas including production of items requiring the same machine or choosing a sequence of activities requiring the same resource. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 186–203, 2002; DOI 10.1002/nav.10008 相似文献
524.
Manuel Acosta Daniel Coronado Esther Ferrandiz M. Rosario Marin Pedro J. Moreno 《Defence and Peace Economics》2013,24(7):821-839
AbstractThis paper examines the generation of technological knowledge by leading companies in the defence industry. In particular, we test whether the characteristics of large defence companies are related to both the production of different types of patents (civilian, military and mixed), and the generation of dual-use technologies. To explore these links, we rely on economic data for the top 100 defence companies from the Stockholm International Peace Research Institute database, and patent information from the Worldwide Patent Statistical Database. Our results show that the relationship between the production of civilian patents and the size of the company is positive and significant. However, this relationship does not hold for the production of military patents. Furthermore, the military commercial profile is unrelated to the generation of military patents. Regarding the involvement in dual-use technologies, firms engaged in dual-use are those with higher military sales, a greater number of employees and a larger number of patents (civilian, military and mixed) than those not engaged in dual-use. Furthermore, we found a skill effect (more involvement in dual-use per employee) in European firms compared to US firms. These findings help to identify which firms should be targeted by government policies if increasing dual-use technologies becomes a political objective. 相似文献
525.
Dr Sarah E. Kreps 《African Security Review》2013,22(4):65-79
With the security situation in Darfur remaining grim, the international community passed United Nations Security Resolution 1769 that authorised a more robust peacekeeping force. This article addresses the security concerns motivating the United Nations-African Union Mission in Darfur (UNAMID), highlights the mandate and implications of the force, and compares the potential command and control issues to the experiences of the Somalia intervention in the 1990s. It closes by analysing the prospects for success of the intervention and offering some limited recommendations on ways to mitigate the risks associated with the peacekeeping effort. 相似文献
526.
527.
Chris M.A. Kwaja 《African Security Review》2013,22(2):153-161
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors. 相似文献
528.
Tlohang W. Letsie 《African Security Review》2013,22(3-4):291-307
ABSTRACTThe Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories. 相似文献
529.
We have used the Michigan Model of World Production and Trade to assess the impact of exports and imports of armaments (based on 1980 data) on sectoral trade and employment and other economic variables in the major Western trading countries. If the United States were to place a unilateral embargo on its arms exports and imports, we calculate that it would experience a comparatively small amount of employment displacement in the aggregate and that most of this displacement would occur in the transport equipment and electric machinery sectors. If all the major Western countries were to place a multilateral embargo on their arms trade, the sectoral effects on the United States would be similarly small. But the sectoral effects in several other industrialized and developing countries measured as a percentage of sectoral employment, would be larger, indicating potential short‐run adjustment problems in labor markets in some cases. 相似文献
530.
Mark A. Boyer 《Defence and Peace Economics》2013,24(3):243-259
The original Olson and Zeckhauser model of alliance burden‐sharing was based on the following four assumptions: (1) alliance defence is a pure public good; (2) allied nations make their security contribution decisions without consulting the other allies; (3) alliances produce only a single public good; and (4) alliance defence is produced with equal degrees of efficiency in all alliance nations. But while the first of these assumptions has received a great deal of attention in the alliance literature, the remaining ones have received comparatively less attention, particularly in terms of empirical analyses. This paper synthesizes a varied literature developed around these four assumptions, both substantively and theoretically, and shows that when these assumptions are brought closer to real world approximations, hypotheses regarding the potential for security cooperation with less free‐riding result. This article also provides a simple test of Western alliance burden‐sharing in the areas of military spending, development resources spending, and research and development spending that supports the hypothesis positing more equitable burden‐sharing. 相似文献