首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   768篇
  免费   15篇
  783篇
  2019年   15篇
  2017年   21篇
  2016年   13篇
  2015年   16篇
  2014年   16篇
  2013年   159篇
  2012年   6篇
  2011年   6篇
  2010年   10篇
  2009年   12篇
  2008年   7篇
  2007年   8篇
  2006年   10篇
  2005年   12篇
  2004年   13篇
  2003年   8篇
  2002年   12篇
  2000年   9篇
  1999年   8篇
  1998年   12篇
  1997年   6篇
  1996年   11篇
  1995年   8篇
  1994年   18篇
  1993年   16篇
  1992年   11篇
  1991年   18篇
  1990年   10篇
  1989年   17篇
  1988年   20篇
  1987年   20篇
  1986年   21篇
  1985年   17篇
  1984年   9篇
  1983年   10篇
  1982年   15篇
  1981年   9篇
  1980年   10篇
  1979年   11篇
  1978年   13篇
  1976年   9篇
  1975年   8篇
  1974年   12篇
  1973年   12篇
  1972年   13篇
  1971年   10篇
  1970年   12篇
  1969年   10篇
  1968年   9篇
  1967年   8篇
排序方式: 共有783条查询结果,搜索用时 0 毫秒
581.
“Smart Defense” is NATO's new approach to risk- and burden-sharing, which has been a chronic problem within the alliance since the 1950s. Numerous solutions have been proposed, but initiatives resulting in more equitable burden-sharing have never been fully implemented. There are two driving forces influencing a county's willingness to support such initiatives – the economic theory of alliances and the risks posed by the implementation of capability sharing. The authors examine each of these and propose that rather than aiming for group consensus on the production of capabilities, NATO should focus on interoperability through support functions. This approach provides the most likely solution for connecting the forces, doctrine, procedures, standards and other factors of joint capability production such that country leaders find the risks of doing so to be politically and militarily acceptable.  相似文献   
582.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014  相似文献   
583.
Abstract

Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed.  相似文献   
584.
585.
586.
587.
A network model incorporating stochastic features is considered. The model represents a complex sequential process where an object or system moves through a succession of states (nodes) and operating modes (classes) in the course of carrying out its function (fulfilling its purpose). Transitions between states and operating modes occur in a possibly random manner and require (consume) some resource in randomly varying amounts. We discuss the routing behavior and resource requirements of a typical object as it moves through (and eventually out of) the network. We then shift our focus from a single object and its odyssey to the network as a whole, where time is the resource and many objects are entering the network according to a possibly nonhomogeneous Poisson pattern; in this vein, we discuss the evolution of the network over time. Finally, we consider some applications of the formulation, and results.  相似文献   
588.
589.
A search model is formulated in which positive information may be obtained, through the detection of trails, as to the target's earlier whereabouts. The corresponding Bayesian update formulas for target location probabilities are derived. The model does not appear to be amenable to rigorous optimization. A moving-horizon rule, and a heuristic simplification thereof, are, however, derived. In two numerical examples it is demonstrated that actively designing for detecting trail information, through use of these moving-horizon rules, has substantial potential advantage over using, for example, myopic rules even if the positive information is adaptively incorporated into location probabilities before applying the latter rules in each time period.  相似文献   
590.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号