全文获取类型
收费全文 | 233篇 |
免费 | 44篇 |
出版年
2021年 | 2篇 |
2019年 | 8篇 |
2018年 | 2篇 |
2017年 | 8篇 |
2016年 | 17篇 |
2015年 | 17篇 |
2014年 | 8篇 |
2013年 | 77篇 |
2012年 | 10篇 |
2011年 | 7篇 |
2010年 | 4篇 |
2009年 | 8篇 |
2008年 | 11篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 11篇 |
2002年 | 11篇 |
2001年 | 7篇 |
2000年 | 6篇 |
1999年 | 7篇 |
1997年 | 2篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有277条查询结果,搜索用时 15 毫秒
61.
This paper employs both linear and non‐linear models to investigate the relationship between national defense spending and economic growth for Taiwan and China. Using data from 1953–2000 on defense spending, GDP, import, export and capital, we find that China's defense spending leads that of Taiwan. There exists the phenomenon of an arms race between both countries when official Chinese data are used. On the one hand, feedback relations prevail between economic growth and defense spending growth in Taiwan. On the other hand, China's national defense is found to lead economic growth. 相似文献
62.
Jean‐Paul Azam † 《Defence and Peace Economics》2013,24(4):343-364
We model an oppressor aiming at victimizing an excluded group in his country, with two main variants. A foreign power affects his behaviour using either conditional aid, subject to the dictator’s participation constraint, or the threat of sanctions, broadly defined, subject to the credibility constraint. The choice between the two is either determined by the latter, or by their relative cost. Aid is preferred when the threat of sanctions is ineffective, and sanctions are too expensive. Sanctions might be imposed, if the threat is ineffective. A case study of the Iraqi Kurds after Iraq was subject to sanctions is presented. 相似文献
63.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed. 相似文献
64.
Yang‐Ming Chang 《Defence and Peace Economics》2013,24(2):183-200
This paper presents a simple model to characterize the outcome of a land dispute between two rival parties using a Stackelberg game. Unlike Gershenson and Grossman (2000), we assume that the opposing parties have access to different technologies for challenging and defending in conflict. We derive the conditions under which territorial conflict between the two parties is less likely to persist indefinitely. Allowing for an exogenous destruction term as in Garfinkel and Skaperdas (2000), we show that, when the nature of conflict becomes more destructive, the likelihood of a peaceful outcome, in which the territory’s initial possessor deters the challenging party, increases if the initial possessor holds more intrinsic value for the disputed land. Following Siqueira (2003), our model has policy implications for peace through third‐party intervention. 相似文献
65.
66.
67.
68.
69.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献
70.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献