首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   683篇
  免费   12篇
  2021年   8篇
  2019年   15篇
  2018年   10篇
  2017年   15篇
  2016年   12篇
  2015年   13篇
  2013年   133篇
  2011年   6篇
  2010年   8篇
  2008年   6篇
  2007年   9篇
  2006年   9篇
  2005年   15篇
  2004年   10篇
  2003年   8篇
  2000年   11篇
  1999年   8篇
  1998年   5篇
  1997年   9篇
  1996年   16篇
  1995年   9篇
  1994年   15篇
  1993年   8篇
  1992年   10篇
  1991年   18篇
  1990年   10篇
  1989年   17篇
  1988年   11篇
  1987年   15篇
  1986年   16篇
  1985年   14篇
  1984年   10篇
  1983年   10篇
  1982年   14篇
  1981年   9篇
  1980年   14篇
  1979年   9篇
  1978年   10篇
  1977年   10篇
  1976年   10篇
  1975年   9篇
  1974年   15篇
  1973年   13篇
  1972年   14篇
  1971年   19篇
  1970年   6篇
  1969年   10篇
  1968年   7篇
  1967年   5篇
  1948年   5篇
排序方式: 共有695条查询结果,搜索用时 15 毫秒
211.
Starting from a safe base, an Infiltrator tries to reach a sensitive zone within a given time limit without being detected by a Guard. The Infiltrator can move with speed at most u, while the Guard can only perform a restricted number of searches. A discrete variant of this zero-sum game played on a graph consisting of two vertices joined by n nonintersecting arcs is investigated. Optimal strategies and an explicit expression for its value are obtained. © 1996 John Wiley & Sons, Inc.  相似文献   
212.
The compound Poisson “local” formulation of the Stein-Chen method is applied to problems in reliability theory. Bounds for the accuracy of the approximation of the reliability by an appropriate compound Poisson distribution are derived under fairly general conditions, and are applied to consecutive-2 and connected-s systems, and the 2-dimensional consecutive-k-out-ofn system, together with a pipeline model. The approximations are usually better than the Poisson “local” approach would give. © 1996 John Wiley & Sons, Inc.  相似文献   
213.
Studied here is the problem of evaluating the formation of coalitions in cooperative games by considering its internal and external effects. Our analysis is based upon a formal theory of the quotient game and the use of multilinear extensions to compute the Shapley value and the coalitional value. When it applies to simple games, a series of interesting results is obtained. © 1996 John Wiley & Sons, Inc.  相似文献   
214.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
215.
How does cultural policy affect violence? While cultural discrimination is frequently cited as a potential grievance motivating political violence, the relationship remains under-theorised and largely untested. I weave theoretical literatures with interviews and secondary sources on the experience of Kurds in Turkey to understand the socio-economic and psychological pathways through which cultural policies impact intrastate conflict. I then analyse cross-national data on political violence, demonstrating that cultural grievances increase support for violence, raise the chance and severity of conflict and prolong violent conflicts. In short, policy matters: cultural restrictions exacerbate violence through multiple pathways.  相似文献   
216.
This article focuses on the systemic failures of the Nigerian police force to unravel the mysteries surrounding homicides in the country, along with the security, social and political implications of the ongoing trend. The article draws on documented pieces of evidence of high-profile murders, along with the causes of the upsurge in murder incidences and the inhibitive factors relating to the investigative procedures of the police. The suitability of the theory of subaltern realism and the concept of third-world security predicaments in explaining the peculiarities of Nigeria’s internal security challenges is examined, along with the problems of the legitimacy of political regimes and weak borders. There is a need for the National Assembly of Nigeria to exercise its constituted powers in reawakening and supervising investigations into dormant cases of murder through its committees on police affairs, public safety and national security. The police should check its organisational failures, which may be related to using the wrong investigative approaches, low levels of information, limited resources, corrupt practices, and pressure to obtain quick results.  相似文献   
217.
While security points to a deliberate harming of humans and/or the environment, safety refers to unintended damage. In this view point, I will analyse how the distinction between safety and security matters in the practice of accident investigation and I will argue that the division between the fields is problematic for the assessment of security-related safety risks. Drawing on the case of the our accident investigation into the downing of flight MH17 above Ukraine in 2014, I highlight key dilemmas the Dutch Safety Board dealt with.  相似文献   
218.
This study applies a non-parametric causality-in-quantiles test to examine the causal effect of geopolitical risks on return and volatility dynamics of Islamic equity and bond markets. Geopolitical risks are generally found to impact Islamic equity market volatility measures, rather than returns. However, geopolitical risks tend to predict both returns and volatility measures of Islamic bonds. Interestingly, causality, when it exists for returns and/or volatility of Islamic equities and bonds, is found to hold over entire conditional distributions of returns and volatilities, barring the extreme ends of the same.  相似文献   
219.
We consider server scheduling on parallel dedicated machines to minimize the makespan. Each job has a loading operation and a processing operation. The loading operation requires a server that serves all the jobs. Each machine has a given set of jobs to process, and the processing sequence is known and fixed. We design a polynomial‐time algorithm to solve the two‐machine case of the problem. When the number of machines is arbitrary, the problem becomes strongly NP‐hard even if all the jobs have the same processing length or all the loading operations require a unit time. We design two heuristic algorithms to treat the case where all the loading times are unit and analyze their performance.  相似文献   
220.
This article provides a new approach to the set of (perfect) equilibria. With the help of an equivalence relation on the strategy space of each player. Nash sets and Selten sets are introduced. The number of these sets is finite and each of these sets is a polytope. As a consequence the set of (perfect) equilibria is a finite union of polytopes. © 1994 John Wiley & Sons. Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号