首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   710篇
  免费   20篇
  730篇
  2021年   13篇
  2019年   16篇
  2018年   6篇
  2017年   11篇
  2016年   14篇
  2015年   13篇
  2014年   8篇
  2013年   131篇
  2011年   8篇
  2009年   7篇
  2007年   17篇
  2005年   9篇
  2004年   9篇
  2003年   12篇
  2002年   10篇
  2001年   6篇
  2000年   6篇
  1999年   13篇
  1998年   9篇
  1997年   10篇
  1996年   13篇
  1995年   8篇
  1994年   14篇
  1993年   16篇
  1992年   12篇
  1991年   16篇
  1990年   13篇
  1989年   22篇
  1988年   23篇
  1987年   13篇
  1986年   21篇
  1985年   11篇
  1984年   6篇
  1983年   6篇
  1982年   17篇
  1981年   9篇
  1980年   11篇
  1979年   12篇
  1978年   11篇
  1977年   10篇
  1976年   7篇
  1975年   9篇
  1974年   17篇
  1973年   10篇
  1972年   8篇
  1971年   17篇
  1970年   8篇
  1969年   11篇
  1968年   9篇
  1967年   9篇
排序方式: 共有730条查询结果,搜索用时 0 毫秒
531.
Becoming a nuclear weapon state and sustaining a militarily credible nuclear weapons capability is far from trivial, especially for medium powers. Such a capability is demonstrated by much more than firing a first test or acquiring significant quantities of fissile material; capability is indicated by factors including weaponization, delivery of weapons, reliability and effectiveness of weapons and their delivery systems, fissile material availability, and nuclear and non-nuclear testing. Files in the British National Archives shed considerable light on the problems faced by the nuclear weapon program of the United Kingdom from 1952 through the late 1960s. The question is whether this experience is unique or if it instead offers insights into the potential problems faced by, or facing, other medium or aspiring nuclear weapon states. The proliferation-related topics highlighted include: fissile material production, nuclear testing, the first weapon, weapon delivery rates, non-nuclear testing, delivery platform problems, and long-term maintenance and capability sustainability. Further research could provide clearer insights.  相似文献   
532.
While most normative evaluations of military cyber-operations have emerged from the legal community, this article assesses the legitimacy of such operations from a philosophical-ethical perspective. After reviewing the relationship between rights forfeiture and the jus ad bellum and jus in bello criteria of the just war tradition, it applies these criteria to several aspects of cyber-operations, including responses to cyber-activities, the use of cyber-capabilities affecting combatants and civilians, and the use of these capabilities by contractors. Finally, it briefly addresses the legitimacy of limiting rights to privacy and anonymity in service of preventing cyber-harm.  相似文献   
533.
Book reviews     
Small Wars Manual. United States Marine Corps 1940, with introduction by Ronald Schaffer, Sunflower University Press, Manhattan, Kansas, (1990), ISBN: 0-89745-112-0.

Military Mindlessness: an Informal Compendium. Edited by Raymond Horricks. Transaction Publishers, New Brunswick and London, (1993), ISBN: 1-56000-105-4. Price $26.95

Sipri Yearbook 1993: World Armaments and Disarmament, Oxford University Press, Oxford, (1993) ISBN 0-19-829166-3 - Price £50.00

Nigeria: The Politics of Adjustment and Democracy. By Julius O. Ihonvbere. Transaction Publishers, London & New Brunswick (1994), ISBN 1-56000-093-7, Price £34.95  相似文献   
534.
Given a set of jobs, a processing time and a weight for each job, several parallel and identical machines, and a common due date that is not too early to constrain the scheduling decision, we want to find an optimal job schedule so as to minimize the maximum weighted absolute lateness. We show that this problem is NP-complete even for the single-machine case, and is strongly NP-complete for the general case. We present a polynomial time heuristic for this problem and analyze its worst-case performance. Empirical testing of the heuristic is reported, and the results suggest that the performance is asymptotically optimal as the number of jobs tends to infinity. © 1994 John Wiley & Sons, Inc.  相似文献   
535.
The article presents a Bayesian analysis for the environmental stress screening problem. The decision problem of deriving optimal stress screen durations is solved. Given a screen duration, the optimal stress level can also be determined. Indicators of the quality of a screen of any duration are derived. A statistical model is presented which allows a posterior density for the rate of early failures of the production process to be calculated. This enables the user to update his opinion about the quality of the process. © 1994 John Wiley & Sons, Inc.  相似文献   
536.
For the loss system with time-varying intensities and a finite number of identical servers we derive formulas for the expected number of refused customers in a given time interval and for the expected number of servers busy at a given time instant. © 1994 John Wiley & Sons, Inc.  相似文献   
537.
Some properties of the geometric process are studied along with those of a related process which we propose to call the α‐series process. It is shown that the expected number of counts at an arbitrary time does not exist for the decreasing geometric process. The decreasing version of the α‐series process does have a finite expected number of counts, under certain conditions. This process also has the same advantages of tractability as the geometric process; it exhibits some properties which may make it a useful complement to the increasing geometric process. In addition, it may be fit to observed data as easily as the geometric process. Applications in reliability and stochastic scheduling are considered in order to demonstrate the versatility of the alternative model. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
538.
Motivated by the flow of products in the iron and steel industry, we study an identical and parallel machine scheduling problem with batch deliveries, where jobs finished on the parallel machines are delivered to customers in batches. Each delivery batch has a capacity and incurs a cost. The objective is to find a coordinated production and delivery schedule that minimizes the total flow time of jobs plus the total delivery cost. This problem is an extension of the problem considered by Hall and Potts, Ann Oper Res 135 (2005) 41–64, who studied a two‐machine problem with an unbounded number of transporters and unbounded delivery capacity. We first provide a dynamic programming algorithm to solve a special case with a given job assignment to the machines. A heuristic algorithm is then presented for the general problem, and its worst‐case performance ratio is analyzed. The computational results show that the heuristic algorithm can generate near‐optimal solutions. Finally, we offer a fully polynomial‐time approximation scheme for a fixed number of machines. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 492–502, 2016  相似文献   
539.
A military cannot hope to improve in wartime if it cannot learn. Ideally, in wartime, formal learning ceases and the application of knowledge begins. But this is optimistic. In 1942, USAAF Eighth Air Force assumed it had the means necessary for victory. In reality, its technique and technology were only potentially – rather than actually – effective. What remained was to create the practice of daylight bombing – to learn. This article (1) recovers a wartime learning process that created new knowledge, (2) tests existing tacit hypotheses in military adaptation research, and (3) offers additional theoretical foundation to explain how knowledge is created in wartime  相似文献   
540.
The Weapons Acquisition Process: An Economic Analysis By M.J. Peck and F.M. Scherer Boston: Harvard University Press, (1962).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号