全文获取类型
收费全文 | 683篇 |
免费 | 12篇 |
专业分类
695篇 |
出版年
2021年 | 8篇 |
2019年 | 15篇 |
2018年 | 10篇 |
2017年 | 15篇 |
2016年 | 12篇 |
2015年 | 13篇 |
2013年 | 133篇 |
2011年 | 6篇 |
2010年 | 8篇 |
2008年 | 6篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 15篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 16篇 |
1995年 | 9篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 10篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 14篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 14篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1974年 | 15篇 |
1973年 | 13篇 |
1972年 | 14篇 |
1971年 | 19篇 |
1970年 | 6篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 5篇 |
1948年 | 5篇 |
排序方式: 共有695条查询结果,搜索用时 0 毫秒
151.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information. 相似文献
152.
We consider server scheduling on parallel dedicated machines to minimize the makespan. Each job has a loading operation and a processing operation. The loading operation requires a server that serves all the jobs. Each machine has a given set of jobs to process, and the processing sequence is known and fixed. We design a polynomial‐time algorithm to solve the two‐machine case of the problem. When the number of machines is arbitrary, the problem becomes strongly NP‐hard even if all the jobs have the same processing length or all the loading operations require a unit time. We design two heuristic algorithms to treat the case where all the loading times are unit and analyze their performance. 相似文献
153.
Clifford W. Marshall 《海军后勤学研究》1969,16(4):531-541
This paper presents a quantitative index of the level of risk assumed by a contractor in various contract type situations. The definition includes expression of real world uncertainty and contractor's utility for money. Examples are given for the major contract types and special applications are discussed. 相似文献
154.
Richard B. Streeter Guy W. Hagen Edward E. Patenaude Dennis K. Killinger 《Defence and Peace Economics》2013,24(6):569-587
This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense. 相似文献
155.
156.
157.
Thijs W. Brocades Zaalberg 《Small Wars & Insurgencies》2013,24(4):399-420
History teaches that counterinsurgency and counterterrorism campaigns have never been won through purely military action. Defeating an opponent who avoids open battle, but who uses force to reach his goals, including terrorist action, requires a combination of police, administrative, economic and military measures. As a counterinsurgency campaign should pursue a comprehensive political objective, it requires high levels of civil–military cooperation. However, current NATO doctrine for Civil–Military Cooperation (CIMIC) as it emerged from the 1990s is founded in conventional war-fighting and outdated peacekeeping doctrine. CIMIC's focus is on supporting military objectives rather than enabling the military to make a coherent contribution to political objectives. This makes CIMIC unfit for the Alliance's main operational challenges that have expanded from peace operations on the Balkans to countering insurgent terrorism in Afghanistan. When developing CIMIC, the Alliance obviously neglected the historical lessons from counterinsurgency campaigns. 相似文献
158.
Nathan A. Jennings 《Small Wars & Insurgencies》2013,24(2):313-334
This essay explores how federalized Texas Rangers, in the form of scout companies and larger mounted rifle regiments, provided controversial, and ultimately cost-effective, versatility to the US Army during its campaign in Northern Mexico between 1846 and 1848. It argues that their contributions centered on three tactical tasks that enhanced the invading army's maneuvers: reconnaissance, direct assault, and counterguerrilla patrolling. Each of these actions reflected a distinctive skill-set at which the auxiliaries excelled, marking them as exceptionally multifunctional assets. The Texans' augmentation coincided with, and was necessitated by, the evolving stages of the war in Northern Mexico, beginning with the American army's initial invasion, then transitioning to the assault on Monterrey, and finally ending with a troubled occupation where the rangers' brutality both enabled and undermined American pacification efforts. 相似文献
159.
This paper presents a new methodology to solve the cyclic preference scheduling problem for hourly workers. The focus is on nurse rostering but is applicable to any organization in which the midterm scheduling decision must take into account a complex of legal, institutional, and preferential constraints. The objective is to strike a balance between satisfying individual preferences and minimizing personnel costs. The common practice is to consider each planning period independently and to generate new rosters at the beginning of each. To reduce some of the instability in the process, there is a growing trend toward cyclic schedules, which are easier to manage and are generally perceived to be more equitable. To address this problem, a new integer programming model is presented that combines the elements of both cyclic and preference scheduling. To find solutions, a branch‐and‐price algorithm is developed that makes use of several branching rules and an extremely effective rounding heuristic. A unique feature of the formulation is that the master problem contains integer rather than binary variables. Computational results are reported for problem instances with up to 200 nurses. Most were solved within 10 minutes and many within 3 minutes when a double aggregation approach was applicable. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007. 相似文献
160.
This paper treats the problem of sequencing n jobs on two machines in a “flow shop.” (That is, each job in the shop is required to flow through the same sequence of the machines.) The processing time of a given job on a given machine is assumed to be distributed exponentially, with a known mean. The objective is to minimize the expected job completion time. This paper proves an optimal ordering rule, previously conjectured by Talwar [10]. A formula is also derived through Markov Chain analysis, which evaluates the expected job completion time for any given sequence of the jobs. In addition, the performance of a heuristic rule is discussed in the light of the optimal solution. 相似文献