全文获取类型
收费全文 | 768篇 |
免费 | 15篇 |
专业分类
783篇 |
出版年
2019年 | 15篇 |
2017年 | 21篇 |
2016年 | 13篇 |
2015年 | 16篇 |
2014年 | 16篇 |
2013年 | 159篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 10篇 |
2009年 | 12篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 13篇 |
2003年 | 8篇 |
2002年 | 12篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 11篇 |
1995年 | 8篇 |
1994年 | 18篇 |
1993年 | 16篇 |
1992年 | 11篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 20篇 |
1987年 | 20篇 |
1986年 | 21篇 |
1985年 | 17篇 |
1984年 | 9篇 |
1983年 | 10篇 |
1982年 | 15篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1978年 | 13篇 |
1976年 | 9篇 |
1975年 | 8篇 |
1974年 | 12篇 |
1973年 | 12篇 |
1972年 | 13篇 |
1971年 | 10篇 |
1970年 | 12篇 |
1969年 | 10篇 |
1968年 | 9篇 |
1967年 | 8篇 |
排序方式: 共有783条查询结果,搜索用时 0 毫秒
581.
“Smart Defense” is NATO's new approach to risk- and burden-sharing, which has been a chronic problem within the alliance since the 1950s. Numerous solutions have been proposed, but initiatives resulting in more equitable burden-sharing have never been fully implemented. There are two driving forces influencing a county's willingness to support such initiatives – the economic theory of alliances and the risks posed by the implementation of capability sharing. The authors examine each of these and propose that rather than aiming for group consensus on the production of capabilities, NATO should focus on interoperability through support functions. This approach provides the most likely solution for connecting the forces, doctrine, procedures, standards and other factors of joint capability production such that country leaders find the risks of doing so to be politically and militarily acceptable. 相似文献
582.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014 相似文献
583.
Thomas J. Christensen 《战略研究杂志》2013,36(4):447-487
Abstract Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed. 相似文献
584.
K.‐J. Müller 《战略研究杂志》2013,36(2):123-152
585.
586.
587.
Austin J. Lemoine 《海军后勤学研究》1986,33(3):431-443
A network model incorporating stochastic features is considered. The model represents a complex sequential process where an object or system moves through a succession of states (nodes) and operating modes (classes) in the course of carrying out its function (fulfilling its purpose). Transitions between states and operating modes occur in a possibly random manner and require (consume) some resource in randomly varying amounts. We discuss the routing behavior and resource requirements of a typical object as it moves through (and eventually out of) the network. We then shift our focus from a single object and its odyssey to the network as a whole, where time is the resource and many objects are entering the network according to a possibly nonhomogeneous Poisson pattern; in this vein, we discuss the evolution of the network over time. Finally, we consider some applications of the formulation, and results. 相似文献
588.
589.
Theodor J. Stewart 《海军后勤学研究》1985,32(2):263-274
A search model is formulated in which positive information may be obtained, through the detection of trails, as to the target's earlier whereabouts. The corresponding Bayesian update formulas for target location probabilities are derived. The model does not appear to be amenable to rigorous optimization. A moving-horizon rule, and a heuristic simplification thereof, are, however, derived. In two numerical examples it is demonstrated that actively designing for detecting trail information, through use of these moving-horizon rules, has substantial potential advantage over using, for example, myopic rules even if the positive information is adaptively incorporated into location probabilities before applying the latter rules in each time period. 相似文献
590.