首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   233篇
  免费   44篇
  2021年   2篇
  2019年   8篇
  2018年   2篇
  2017年   8篇
  2016年   17篇
  2015年   17篇
  2014年   8篇
  2013年   77篇
  2012年   10篇
  2011年   7篇
  2010年   4篇
  2009年   8篇
  2008年   11篇
  2007年   12篇
  2006年   9篇
  2005年   13篇
  2004年   8篇
  2003年   11篇
  2002年   11篇
  2001年   7篇
  2000年   6篇
  1999年   7篇
  1997年   2篇
  1993年   1篇
  1991年   1篇
  1988年   3篇
  1987年   1篇
  1986年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1971年   1篇
排序方式: 共有277条查询结果,搜索用时 15 毫秒
61.
This paper employs both linear and non‐linear models to investigate the relationship between national defense spending and economic growth for Taiwan and China. Using data from 1953–2000 on defense spending, GDP, import, export and capital, we find that China's defense spending leads that of Taiwan. There exists the phenomenon of an arms race between both countries when official Chinese data are used. On the one hand, feedback relations prevail between economic growth and defense spending growth in Taiwan. On the other hand, China's national defense is found to lead economic growth.  相似文献   
62.
We model an oppressor aiming at victimizing an excluded group in his country, with two main variants. A foreign power affects his behaviour using either conditional aid, subject to the dictator’s participation constraint, or the threat of sanctions, broadly defined, subject to the credibility constraint. The choice between the two is either determined by the latter, or by their relative cost. Aid is preferred when the threat of sanctions is ineffective, and sanctions are too expensive. Sanctions might be imposed, if the threat is ineffective. A case study of the Iraqi Kurds after Iraq was subject to sanctions is presented.  相似文献   
63.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
64.
This paper presents a simple model to characterize the outcome of a land dispute between two rival parties using a Stackelberg game. Unlike Gershenson and Grossman (2000 Gershenson, D. and Grossman, H.I. 2000. Civil conflict: ended or never ending?. Journal of Conflict Resolution, 44(6): 807821.  [Google Scholar]), we assume that the opposing parties have access to different technologies for challenging and defending in conflict. We derive the conditions under which territorial conflict between the two parties is less likely to persist indefinitely. Allowing for an exogenous destruction term as in Garfinkel and Skaperdas (2000 Garfinkel, M. and Skaperdas, S. 2000. Conflict without misperceptions or incomplete information: how the future matters. Journal of Conflict Resolution, 44(6): 793807. [Crossref], [Web of Science ®] [Google Scholar]), we show that, when the nature of conflict becomes more destructive, the likelihood of a peaceful outcome, in which the territory’s initial possessor deters the challenging party, increases if the initial possessor holds more intrinsic value for the disputed land. Following Siqueira (2003 Siqueira, K. 2003. Conflict and third‐party intervention. Defence and Peace Economics, 14(6): 389400. [Taylor & Francis Online], [Web of Science ®] [Google Scholar]), our model has policy implications for peace through third‐party intervention.  相似文献   
65.
66.
67.
68.
69.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
70.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号