首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   377篇
  免费   4篇
  381篇
  2021年   4篇
  2019年   11篇
  2018年   9篇
  2017年   7篇
  2016年   6篇
  2015年   4篇
  2014年   6篇
  2013年   69篇
  2012年   5篇
  2010年   4篇
  2009年   5篇
  2008年   6篇
  2007年   3篇
  2006年   4篇
  2005年   3篇
  2004年   8篇
  2003年   6篇
  2002年   7篇
  2001年   6篇
  2000年   4篇
  1998年   6篇
  1997年   4篇
  1996年   12篇
  1995年   6篇
  1993年   4篇
  1992年   6篇
  1991年   10篇
  1990年   5篇
  1989年   10篇
  1988年   10篇
  1987年   8篇
  1986年   8篇
  1985年   7篇
  1984年   6篇
  1982年   5篇
  1981年   5篇
  1980年   11篇
  1979年   5篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   5篇
  1972年   4篇
  1971年   9篇
  1970年   4篇
  1969年   4篇
  1968年   6篇
  1967年   4篇
  1966年   6篇
排序方式: 共有381条查询结果,搜索用时 15 毫秒
61.
Under what conditions can leaders achieve wartime political–military integration? In the Vietnam War, political–military integration exhibited dramatic variation: in the air war, the US was able to tightly integrate its political objectives and military conduct, but in the ground war, the American military prosecuted a strategy that was both divorced from broader political objectives and was immune from Washington's influence. I argue that the nature of information management between the military and civilian leadership explains the pattern of political–military integration in the Vietnam War more completely than do explanations that focus on the organizational cultures of professional militaries.  相似文献   
62.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
63.
64.
    
In nuclear nonproliferation negotiations, many governments pursue multiple objectives, and changes in policy can occur rapidly—and often unexpectedly. For these reasons, understanding nonproliferation requires empathy and imagination rather than just historical fact. This article considers one teaching tool to encourage such insight—simulations—and demonstrates how teaching and scholarship can interact to improve our understanding of the complex decisions and negotiations involved in nuclear nonproliferation. The article consists of five parts: first, it explains the benefits of simulations as both a policy development tool in Washington and as a teaching tool in universities; second, it describes the pedagogical strategy of the Stanford University simulation program; third, it shows how the simulations have identified and highlighted theoretical and substantive insights that are often neglected in scholarly studies of nonproliferation; and fourth, it describes how students are tested to enhance the learning experience from the simulation. Fifth and finally, the article provides concluding observations about how using simulations in the classroom can help scholars develop insights that improve their understanding of real-world nuclear negotiation dynamics and outcomes.  相似文献   
65.
66.
    
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
67.
    
  相似文献   
68.
    
The calculation of the exact reliability of complex systems is a difficult and tedious task. Consequently simple approximating techniques have great practical value. The hazard transform of a system is an invertible transformation of its reliability function which is convenient and useful in both applied and theoretical reliability work. A simple calculus for finding an approximate hazard transform for systems formed by series and parallel combinations of components is extended so that it can be used for any coherent system. The extended calculus is shown to lead to conservative approximations. A first order version of the extended calculus is also discussed. This method of approximation is even more simple to use, but is not always conservative. Examples of its application indicate that it is capable of giving quite accurate results.  相似文献   
69.
    
Military units can become to some extent self-governing in war-time battle. At times, they may take the discipline of their soldiers into their own hands and such discipline may be severe. This paper examines incidents in the British military, in both World Wars, where British soldiers were killed by their comrades because they would not fight in the heat of battle. The judicial execution by the military authorities of deserters in the First World War led to much controversy in Britain. It may be much less well-known that in both World Wars there was, on occasion, an extra-judicial practice within the British military of executing soldiers who would not fight in the heat of battle. In such situations ethical dilemmas become very difficult indeed and some of the relevant issues are examined here.  相似文献   
70.
    
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号