全文获取类型
收费全文 | 375篇 |
免费 | 5篇 |
专业分类
380篇 |
出版年
2021年 | 4篇 |
2019年 | 11篇 |
2018年 | 9篇 |
2017年 | 7篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 69篇 |
2012年 | 5篇 |
2010年 | 4篇 |
2009年 | 5篇 |
2008年 | 6篇 |
2007年 | 3篇 |
2006年 | 4篇 |
2005年 | 3篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1998年 | 6篇 |
1997年 | 4篇 |
1996年 | 12篇 |
1995年 | 6篇 |
1993年 | 4篇 |
1992年 | 6篇 |
1991年 | 10篇 |
1990年 | 5篇 |
1989年 | 9篇 |
1988年 | 10篇 |
1987年 | 8篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 11篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 6篇 |
1974年 | 5篇 |
1972年 | 4篇 |
1971年 | 9篇 |
1970年 | 4篇 |
1969年 | 4篇 |
1968年 | 6篇 |
1967年 | 4篇 |
1966年 | 6篇 |
排序方式: 共有380条查询结果,搜索用时 15 毫秒
61.
Charles D. Melson 《Small Wars & Insurgencies》2013,24(1):130-131
Barry Davies, Joining the SAS: How to Get In and What It's Like.Miami: Lewis International Inc., 1998. Pp.214, photos, index. $22.95. ISBN 0–966771–4–2.Peter McAleese and John Avery, McAleese's Fighting Manual: The Definitive Soldier's Handbook.London: Orion, 1998. Pp.179, illus. £18.95. ISBN 0–75280–063–9.Steve Crawford et al.The SAS Encyclopedia: The Definitive Guide to the World's Crack Regiment.Miami: Lewis International Inc., 1998. Pp.288, photos, maps, index. $29.95. ISBN 0–9666771–0–2.Barry Davies et al.The Complete Encyclopedia of the SAS.London: Virgin Publishing Ltd, 1998. Pp.288, photos, maps, no index. $39.95. ISBN 1–85227–707–6. 相似文献
62.
Ranan D. Kuperman 《战略研究杂志》2013,36(1):1-2
Israel's policy of military reprisals has never seemed to follow any consistent pattern of tit‐for‐tat. On the one hand, not every violent incident was answered with a counterattack. On the other hand, when Israel responded, frequently it employed an excessive amount of force, which was disproportional to the Arab provocation. This behavior has not been the consequence of a premeditated and rational strategy. Instead, it appears to have been the result of a political dispute between alternative approaches regarding the use of military force. The following research analyzes the development of this controversy and how these differences of opinion were resolved. 相似文献
63.
Kevin D. McCranie Marcus Faulkner David French Gregory A. Daddis James Gow Austin Long 《战略研究杂志》2013,36(2):281-293
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X. Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3. Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1. Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X. Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4. Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115. T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8. 相似文献
64.
Raphael D. Marcus 《战略研究杂志》2015,38(4):500-528
This article highlights a pattern of military adaptation and tactical problem-solving utilized by the Israel Defense Forces (IDF) while engaged in protracted conflict with the Lebanese militant group Hizballah. It discusses the IDF’s recent attempts to institutionalize their historically intuitive process of ad-hoc learning by developing a formal tactical-level mechanism for ‘knowledge management’. The diffusion of this battlefield lesson-learning system that originated at lower-levels of the organization is examined, as well as its implementation and effectiveness during the 2006 Lebanon War. A nuanced analysis of IDF adaptation illustrates the dynamic interplay between both ‘top-down’ and ‘bottom-up’ processes of military innovation. 相似文献
65.
The minimum storage‐time sequencing problem generalizes many well‐known problems in combinatorial optimization, such as the directed linear arrangement and the problem of minimizing the weighted sum of completion times, subject to precedence constraints on a single processor. In this paper we propose a new lower bound, based on a Lagrangian relaxation, which can be computed very efficiently. To improve upon this lower bound, we employ a bundle optimization algorithm. We also show that the best bound obtainable by this approach equals the one obtainable from the linear relaxation computed on a formulation whose first Chvàtal closure equals the convex hull of all the integer solutions of the problem. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 313–331, 2001 相似文献
66.
Stephen Blank 《Defense & Security Analysis》2012,28(1):36-54
Asia, where nuclear powers already interact (including North Korea), exerts a growing influence on the thinking and policy underlying Russia's current and future nuclear (and overall defense) posture. China's rise is forcing Russia into a greater reliance on strategic offensive weapons and tactical nuclear weapons. These in turn will reinforce its opposition to US missile defenses, not only in Europe but also in Asia. Russia must now entertain the possibility of nuclear use in regional conflicts that would otherwise remain purely conventional. It cannot be postulated blindly that nuclear weapons serve no discernible purpose other than to deter nuclear attacks by other nuclear powers. The strategic equation in Asia and in the Russian Far East convincingly demonstrates the falsity of this approach. Nuclear weapons will be the essential component of Russia's regional defense policy if not of its overall policies – and this also includes contingencies in Europe. 相似文献
67.
68.
The calculation of the exact reliability of complex systems is a difficult and tedious task. Consequently simple approximating techniques have great practical value. The hazard transform of a system is an invertible transformation of its reliability function which is convenient and useful in both applied and theoretical reliability work. A simple calculus for finding an approximate hazard transform for systems formed by series and parallel combinations of components is extended so that it can be used for any coherent system. The extended calculus is shown to lead to conservative approximations. A first order version of the extended calculus is also discussed. This method of approximation is even more simple to use, but is not always conservative. Examples of its application indicate that it is capable of giving quite accurate results. 相似文献
69.
The reliability of a serial production line is optimized with respect to the location of a single buffer. The problem was earlier defined and solved by Soyster and Toof for the special case of an even number of machines all having equal probability of failure. In this paper we generalize the results for any number of machines and remove the restriction of identical machine reliabilities. In addition, an analysis of multibuffer systems is presented with a closed form solution for the reliability when both the number of buffers and their capacity is limited. For the general multibuffer system we present an approach for determining system reliability. 相似文献
70.
A procedure for obtaining a facilities scatter diagram within a rectangular boundary is developed using a multifacility location model. This method gives favorable computational results and has the advantage over other scatter diagram methods of being able to accommodate fixed facility locations. Examples illustrate how this method can be used by a designer/analyst either as a one-step algorithm or iteratively to build a layout. 相似文献