首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   426篇
  免费   18篇
  国内免费   1篇
  2021年   6篇
  2019年   12篇
  2018年   13篇
  2017年   8篇
  2016年   9篇
  2015年   7篇
  2014年   10篇
  2013年   98篇
  2012年   5篇
  2011年   5篇
  2010年   5篇
  2009年   4篇
  2008年   5篇
  2007年   4篇
  2006年   8篇
  2005年   7篇
  2004年   5篇
  2003年   6篇
  2002年   4篇
  2000年   3篇
  1998年   4篇
  1997年   6篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   11篇
  1992年   8篇
  1991年   8篇
  1989年   10篇
  1988年   7篇
  1987年   6篇
  1986年   7篇
  1985年   10篇
  1984年   8篇
  1983年   4篇
  1982年   6篇
  1981年   4篇
  1980年   9篇
  1979年   7篇
  1978年   8篇
  1976年   8篇
  1975年   10篇
  1974年   8篇
  1973年   11篇
  1972年   6篇
  1971年   4篇
  1970年   6篇
  1969年   5篇
  1968年   5篇
  1967年   3篇
排序方式: 共有445条查询结果,搜索用时 15 毫秒
141.
Why did the United States fail to stop Israeli acquisition of nuclear weapons? Existing research argues that patrons such as the U.S. should have an easy time halting proliferation by militarily and economically vulnerable clients. Nevertheless, Israel acquired nuclear weapons with relatively little American opposition. Utilizing extensive primary source research, we argue that problematic intelligence-policy relations hindered U.S. efforts to arrest Israeli proliferation as (1) policymakers often gave mixed guidance to the intelligence community, resulting in (2) limited information on Israeli efforts that reinforced policy ambiguity. The results carry implications for understanding the dynamics of nuclear proliferation and intelligence-policy relations.  相似文献   
142.
This article analyzes a class of stochastic contests among multiple players under risk‐averse exponential utility. In these contests, players compete over the completion of a task by simultaneously deciding on their investment, which determines how fast they complete the task. The completion time of the task for each player is assumed to be an exponentially distributed random variable with rate linear in the player's investment and the completion times of different players are assumed to be stochastically independent. The player that completes the task first earns a prize whereas the remaining players earn nothing. The article establishes a one‐to‐one correspondence between the Nash equilibrium of this contest with respect to risk‐averse exponential utilities and the nonnegative solution of a nonlinear equation. Using the properties of the latter, it proves the existence and the uniqueness of the Nash equilibrium, and provides an efficient method to compute it. It exploits the resulting representation of the equilibrium investments to determine the effects of risk aversion and the differences between the outcome of the Nash equilibrium and that of a centralized version.© 2016 Wiley Periodicals, Inc. Naval Research Logistics 66:4–14, 2019  相似文献   
143.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
144.
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm.  相似文献   
145.
We consider the problem of efficiently scheduling deliveries by an uncapacitated courier from a central location under online arrivals. We consider both adversary‐controlled and Poisson arrival processes. In the adversarial setting we provide a randomized (3βΔ/2δ ? 1) ‐competitive algorithm, where β is the approximation ratio of the traveling salesman problem, δ is the minimum distance between the central location and any customer, and Δ is the length of the optimal traveling salesman tour overall customer locations and the central location. We provide instances showing that this analysis is tight. We also prove a 1 + 0.271Δ/δ lower‐bound on the competitive ratio of any algorithm in this setting. In the Poisson setting, we relax our assumption of deterministic travel times by assuming that travel times are distributed with a mean equal to the excursion length. We prove that optimal policies in this setting follow a threshold structure and describe this structure. For the half‐line metric space we bound the performance of the randomized algorithm in the Poisson setting, and show through numerical experiments that the performance of the algorithm is often much better than this bound.  相似文献   
146.
This article is the latest in a series of published articles systematically examining Afghan Presidential and legislative elections. Structural problems including fraud, ethno-linguistic block voting, and the Single Non-Transferable Vote have had significant impacts on the development of Afghan democratic elections. The challenge now facing the current Afghan government and future elections is the daunting task of uniting the Afghan people while not repeating the electoral mistakes of the past. The tricky balancing act of fostering an overarching national identity without being perceived as privileging particular identities requires strong leadership and a willingness to challenge traditional ethnic, linguistic, and religious norms when need be. Karzai and Ghani Administrations have seriously failed relative to this dynamic.  相似文献   
147.
This article investigates the relationship between U.S. overseas troops and the willingness of the citizens of host states to fight for their country. The study joins the long-running debate about burden-sharing and free-riding among U.S. allies. Unlike most previous empirical studies, we focus on non-material or intangible measures of the underlying concepts. Our dependent variable estimates the proportion of citizens expressing a willingness to fight for their country. Scores at the aggregate-national as well as the individual level are shaped by the presence of U.S. military forces, which act as a “tripwire” signaling credible security commitments. This increases opportunities of (non-material) free-riding. We present both bivariate and multivariate analyses covering the period 1981–2014 to test this supposition. Findings indicate that once U.S. troop levels reach a certain threshold (between 100 and 500 troops), citizens’ willingness to fight drops significantly. This likely reflects non-material free-riding.  相似文献   
148.
This data study provides the first comprehensive empirical overview of organised violence across the Shia and Sunni Muslim divide, 1989–2017. We present a conceptual framework of sectarian dimensions of armed conflicts: sectarian identities; sectarian ideologies; and sectarian alliances. Our analysis demonstrates the extent to which organised violence has been fought across the Shia-Sunni divide. We also explore the sectarian identity dimension in non-state armed conflicts and one-sided violence. Overall, our study shows that most of the organised violence across the Shia-Sunni divide is driven by states, rebel groups, and militias, rather than communities.  相似文献   
149.
150.
This article considers a particular printed circuit board (PCB) assembly system employing surface mount technology. Multiple, identical automatic placement machines, a variety of board types, and a large number of component types characterize the environment studied. The problem addressed is that of minimizing the makespan for assembling a batch of boards with a secondary objective of reducing the mean flow time. The approach adopted is that of grouping boards into production families, allocating component types to placement machines for each family, dividing of families into board groups with similar processing times, and the scheduling of groups. A complete setup is incurred only when changing over between board families. For the environment studied, precedence constraints on the order of component placement do not exist, and placement times are independent of feeder location. Heuristic solution procedures are proposed to create board subfamilies (groups) for which the component mounting times are nearly identical within a subfamily. Assignment of the same component type to multiple machines is avoided. The procedures use results from the theory of open-shop scheduling and parallel processor scheduling to sequence boards on machines. Note that we do not impose an open-shop environment but rather model the problem in the context of an open shop, because the order of component mountings is immaterial. Three procedures are proposed for allocating components to machines and subsequently scheduling boards on the machines. The first two procedures assign components to machines to balance total work load. For scheduling purposes, the first method groups boards into subfamilies to adhere to the assumptions of the open-shop model, and the second procedure assumes that each board is a subfamily and these are scheduled in order of shortest total processing time. The third procedure starts by forming board subfamilies based on total component similarity and then assigns components to validate the open-shop model. We compare the performance of the three procedures using estimated daily, two-day, and weekly production requirements by averaging quarterly production data for an actual cell consisting of five decoupled machines. © 1994 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号