首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   805篇
  免费   0篇
  805篇
  2021年   6篇
  2019年   20篇
  2018年   10篇
  2017年   20篇
  2016年   14篇
  2015年   14篇
  2014年   21篇
  2013年   150篇
  2012年   8篇
  2011年   6篇
  2010年   13篇
  2009年   11篇
  2007年   11篇
  2006年   10篇
  2005年   14篇
  2004年   14篇
  2003年   6篇
  2002年   15篇
  2000年   8篇
  1999年   10篇
  1998年   17篇
  1997年   13篇
  1996年   11篇
  1995年   6篇
  1994年   21篇
  1993年   22篇
  1992年   13篇
  1991年   20篇
  1990年   13篇
  1989年   18篇
  1988年   20篇
  1987年   18篇
  1986年   20篇
  1985年   18篇
  1984年   9篇
  1983年   9篇
  1982年   12篇
  1981年   12篇
  1980年   7篇
  1979年   12篇
  1978年   15篇
  1976年   9篇
  1975年   8篇
  1974年   11篇
  1973年   11篇
  1972年   12篇
  1970年   9篇
  1969年   8篇
  1968年   7篇
  1967年   8篇
排序方式: 共有805条查询结果,搜索用时 0 毫秒
161.
    
This study models the structural sources of variation in the use of selective (discriminate) repression within 89 civil wars fought between 1981 and 2005. The severity of repressive violence is modeled as a function of the amount of territory being contested by the insurgents. This idea is operationalized using measures of the location, size, and density of insurgency violence. The analysis finds evidence that the repressive behavior of both governments and rebel groups is linked to conflict geography. Governments violate physical integrity rights more frequently and kill more civilians the greater the overall amount of territory under contestation. Rebels kill more civilians in highly dispersed insurgencies that lack a clear epicenter.  相似文献   
162.
    
We explore the impact of strategic assessment efforts on military organizations at war. To do so, we construct a model to explore the impact of a principal’s choice among imperfect performance metrics for a military operation. In doing so, the principal must consider both the incentivizing and informational properties of the metric. We show the conditions under which uncertainty regarding the nature of the agent, as well as uncertainty regarding the operational environment, drives a metric choice that induces pathological behavior from the agent. More specifically, a poor metric choice can create an overly optimistic assessment and end up prolonging the conflict. We illustrate the model’s insights in the cases of World War II and the Vietnam War.  相似文献   
163.
    
This study uses the Feder-Ram model in conjunction with the military Keynesian model to examine the nexus between defence spending and economic growth in Sri Lanka. We find that the Keynesian aggregate demand model is better suited to analyse the link than the Feder-Ram model for the case of Sri Lanka. Based upon our results we expect a higher economic growth rate in Sri Lanka if more public resources are diverted from the defence to civilian sectors of the economy, now that the war between the government and separatist guerrillas has come to an end. However, recent post war events cast doubt upon whether a diversion of sources from military to non-military spending will actually occur. We conclude that the sanguine predictions of our economic analysis are entirely dependent upon the political decisions of the Sri Lankan government for their realization.  相似文献   
164.
165.
    

Although a number of studies concerning Turkish defence-growth relation have been published in recent years, little attention is given the demand for Turkish defence expenditure. This is an important issue for understanding which variables contribute to the determination of the demand for military expenditure. However, it is difficult to develop a general theory or a standard empirical approach for the determination of the demand military expenditure. This study models and estimates the demand for Turkish defence expenditure for the period 1951-1998 using autoregressive distributed lag approach to cointegration (ARDL) following the methodology outlined in Pesaran and Shin (1999). This procedure can be applied regardless of the stationary properties of the variables in the sample and allows for inferences on long-run estimates, which is not possible under alternative cointegration procedures. The findings suggest that Turkish defence spending is determined by NATO's defence spending, Greece's defence spending and some security considerations.  相似文献   
166.
    
  相似文献   
167.
    
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
168.
    
Assemble in Advance (AIA) policy reduces assembly cost due to advance planning, while Assemble to Order (ATO) policy eliminates assembly of excessive (more than demanded) units. The tradeoffs between the two policies have been studied in the past for single product environments. Moreover, it was shown that it is beneficial to employ AIA and ATO simultaneously. In this article, we study the employment of such a composite assembly policy in a multiproduct environment with component commonality. When common components are used, ATO may also enable us to benefit from the risk pooling effect. We provide important managerial insights such as: the multiperiod problem is myopic and changes in inventory levels due to the use of common components, and demonstrate the potential profit increase compared to other policies.© 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
169.
    
We consider a system that depends on a single vital component. If this component fails, the system life will terminate. If the component is replaced before its failure then the system life may be extended; however, there are only a finite number of spare components. In addition, the lifetimes of these spare components are not necessarily identically distributed. We propose a model for scheduling component replacements so as to maximize the expected system survival. We find the counterintuitive result that when comparing components' general lifetime distributions based on stochastic orderings, not even the strongest ordering provides an a priori guarantee of the optimal sequencing of components. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
170.
    
The reformulation‐linearization technique (RLT) is a methodology for constructing tight linear programming relaxations of mixed discrete problems. A key construct is the multiplication of “product factors” of the discrete variables with problem constraints to form polynomial restrictions, which are subsequently linearized. For special problem forms, the structure of these linearized constraints tends to suggest that certain classes may be more beneficial than others. We examine the usefulness of subsets of constraints for a family of 0–1 quadratic multidimensional knapsack programs and perform extensive computational tests on a classical special case known as the 0–1 quadratic knapsack problem. We consider RLT forms both with and without these inequalities, and their comparisons with linearizations derived from published methods. Interestingly, the computational results depend in part upon the commercial software used. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号