首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   541篇
  免费   1篇
  542篇
  2021年   6篇
  2020年   6篇
  2019年   15篇
  2018年   5篇
  2017年   12篇
  2016年   11篇
  2015年   7篇
  2014年   6篇
  2013年   102篇
  2010年   6篇
  2008年   10篇
  2005年   5篇
  2004年   7篇
  2003年   7篇
  2002年   5篇
  2001年   5篇
  2000年   6篇
  1998年   5篇
  1997年   4篇
  1996年   13篇
  1995年   8篇
  1994年   7篇
  1993年   7篇
  1992年   8篇
  1991年   12篇
  1990年   7篇
  1989年   12篇
  1988年   14篇
  1987年   12篇
  1986年   14篇
  1985年   11篇
  1984年   7篇
  1983年   5篇
  1982年   12篇
  1981年   6篇
  1980年   14篇
  1979年   7篇
  1978年   9篇
  1977年   8篇
  1976年   6篇
  1975年   9篇
  1974年   9篇
  1973年   8篇
  1972年   9篇
  1971年   14篇
  1970年   7篇
  1969年   8篇
  1968年   10篇
  1967年   6篇
  1966年   8篇
排序方式: 共有542条查询结果,搜索用时 0 毫秒
121.
Empirical Bayes' methods had been used by Brier, Zacks, and Marlow [1] for estimating performance characteristic vectors of success probabilities. The problem is that of estimating k-dimensional success probabilities of dependent binomial random variables, which are highly correlated. The present study reinforces the results of the previous one by showing, via simulations, that the relative efficiency of the empirical Bayes estimators, compared to the Stein-type and to the maximum-likelihood ones, is very high. This holds even if the success proportions are based on a small number of trials. We study the case of equicorrelation structure with positive correlations.  相似文献   
122.
A procedure for obtaining a facilities scatter diagram within a rectangular boundary is developed using a multifacility location model. This method gives favorable computational results and has the advantage over other scatter diagram methods of being able to accommodate fixed facility locations. Examples illustrate how this method can be used by a designer/analyst either as a one-step algorithm or iteratively to build a layout.  相似文献   
123.
    
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
124.
    
ABSTRACT

What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions.  相似文献   
125.
    
ABSTRACT

Novichok agents are a class of nerve agents developed by the Soviet Union during the Cold War. In light of the use of a Novichok agent in Salisbury in March 2018, two sets of proposals to amend Schedule 1 of the 1993 Chemical Weapons Convention (CWC) have been put forth, one jointly by the United States, Canada, and the Netherlands, and the other by Russia. Both sets of proposals will be discussed and voted upon at the next Conference of States Parties of the Organisation for the Prohibition of Chemical Weapons (OPCW) in November 2019. If either set of proposals is approved, it will be the first time that the list of chemicals subject to verification under the CWC will have been modified. This viewpoint will discuss these proposals, and argue that, if adopted, the joint proposal and the portions of the Russian proposal upon which consensus can be reached would significantly strengthen the CWC by considerably expanding the coverage of its Schedule 1 and bringing Novichok agents firmly within the CWC’s verification system. We also argue that, since the OPCW Technical Secretariat did not deem the fifth group of chemicals proposed by Russia to meet the criteria for inclusion in Schedule 1, Russia should withdraw this part of its proposal from consideration. The proposals have also served an important purpose in clarifying the identity of the chemical agent used in the Salisbury incident, squarely placing it within one of the two families of Novichok agents described by the Russian chemical-weapons scientist and whistleblower Vil Mirzayanov. If either proposal is approved in November, it will be important to conduct a thorough assessment of key precursors for the synthesis of Novichok agents and assess the need to amend CWC schedules and national and multinational export-control lists accordingly.  相似文献   
126.
    
In this paper a very versatile game model is developed for use in the long range planning of our strategic force posture. This highly aggregate model yields optimal force mixes for the triad (land- and sea-based missile systems and bombers) under a variety of constraints. The model described here is a survivability model; however, it is shown how the model can still be used as a measure of overall system effectiveness. Constraints imposed on the problem include both SALT and budget limitations.  相似文献   
127.
    
  相似文献   
128.
    
Tolerance limits which control both tails of the normal distribution so that there is no more than a proportion β1 in one tail and no more than β2 in the other tail with probability γ may be computed for any size sample. They are computed from X? - k1S and X? - k2S, where X? and S are the usual sample mean and standard deviation and k1 and k2 are constants previously tabulated in Odeh and Owen [3]. The question addressed is, “Just how accurate are the coverages of these intervals (– Infin;, X?k1S) and (X? + k2S, ∞) for various size samples?” The question is answered in terms of how widely the coverage of each tail interval differs from the corresponding required content with a given confidence γ′.  相似文献   
129.
A rule that constrains decision‐makers is enforced by an inspector who is supplied with a fixed level of inspection resources—inspection personnel, equipment, or time. How should the inspector distribute its inspection resources over several independent inspectees? What minimum level of resources is required to deter all violations? Optimal enforcement problems occur in many contexts; the motivating application for this study is the role of the International Atomic Energy Agency in support of the Treaty on the Non‐Proliferation of Nuclear Weapons. Using game‐theoretic models, the resource level adequate for deterrence is characterized in a two‐inspectee problem with inspections that are imperfect in the sense that violations can be missed. Detection functions, or probabilities of detecting a violation, are assumed to be increasing in inspection resources, permitting optimal allocations over inspectees to be described both in general and in special cases. When detection functions are convex, inspection effort should be concentrated on one inspectee chosen at random, but when they are concave it should be spread deterministicly over the inspectees. Our analysis provides guidance for the design of arms‐control verification operations, and implies that a priori constraints on the distribution of inspection effort can result in significant inefficiencies. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
130.
Britain's failure to cut military commitments in spite of escalating defence costs was not the result of blocking policies by disgruntled services. Rather, there was no determination among Whitehall's political departments to cut commitments even before the service departments could obstruct a decision on force levels. The Conservative governments under Macmillan and Douglas‐Home showed a propensity for substantial force reductions in Europe rather than in out‐of NATO areas. This remained London's long‐term aim even after it had been accepted to build up British troops in Europe to agreed force levels. During Alec Douglas‐Home's premiership Britain's global military role, especially east of Suez, gained a greater significance. An Anglo‐American military axis operating in the Far East and the Indian Ocean became a prominent feature. Ultimately, Anglo‐American military interdependence outside NATO was to ensure that Britain would be able to pursue a policy with more room for independent action.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号