全文获取类型
收费全文 | 768篇 |
免费 | 15篇 |
出版年
2019年 | 15篇 |
2017年 | 21篇 |
2016年 | 13篇 |
2015年 | 16篇 |
2014年 | 16篇 |
2013年 | 159篇 |
2012年 | 6篇 |
2011年 | 6篇 |
2010年 | 10篇 |
2009年 | 12篇 |
2008年 | 7篇 |
2007年 | 8篇 |
2006年 | 10篇 |
2005年 | 12篇 |
2004年 | 13篇 |
2003年 | 8篇 |
2002年 | 12篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 11篇 |
1995年 | 8篇 |
1994年 | 18篇 |
1993年 | 16篇 |
1992年 | 11篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 20篇 |
1987年 | 20篇 |
1986年 | 21篇 |
1985年 | 17篇 |
1984年 | 9篇 |
1983年 | 10篇 |
1982年 | 15篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1978年 | 13篇 |
1976年 | 9篇 |
1975年 | 8篇 |
1974年 | 12篇 |
1973年 | 12篇 |
1972年 | 13篇 |
1971年 | 10篇 |
1970年 | 12篇 |
1969年 | 10篇 |
1968年 | 9篇 |
1967年 | 8篇 |
排序方式: 共有783条查询结果,搜索用时 15 毫秒
771.
Reliability Economics is a field that can be defined as the collection of all problems in which there is tension between the performance of systems of interest and their cost. Given such a problem, the aim is to resolve the tension through an optimization process that identifies the system which maximizes some appropriate criterion function (e.g. expected lifetime per unit cost). In this paper, we focus on coherent systems of n independent and identically distributed (iid) components and mixtures thereof, and characterize both a system's performance and cost as functions of the system's signature vector (Samaniego, IEEE Trans Reliabil (1985) 69–72). For a given family of criterion functions, a variety of optimality results are obtained for systems of arbitrary order n. Approximations are developed and justified when the underlying component distribution is unknown. Assuming the availability of an auxiliary sample of N component failure times, the asymptotic theory of L‐estimators is adapted for the purpose of establishing the consistency and asymptotic normality of the proposed estimators of the expected ordered failure times of the n components of the systems under study. These results lead to the identification of ε‐optimal systems relative to the chosen criterion function. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
772.
773.
GORDON JE 《Military review》1949,28(12):27; passim
774.
Ian J. Stewart 《The Nonproliferation Review》2019,26(5-6):519-536
ABSTRACTThe International Atomic Energy Agency (IAEA) faces challenges in fulfilling its safeguards mandate as a result of an expanding safeguards burden and a relatively static budget. This dilemma has been exacerbated by the additional burdens of implementing the Joint Comprehensive Plan of Action (JCPOA) in Iran, but would not go away if implementation of the JCPOA were to end. There are three main areas of opportunity for the Agency: (1) budgetary expansion tied to changes in staffing policies, (2) changes in safeguards approaches, and (3) technological innovation. Barriers and limitations are associated with each approach, and advancing any of them will face a difficult political environment in Vienna. 相似文献
775.
Ian F. W. Beckett 《Small Wars & Insurgencies》2019,30(4-5):994-1019
ABSTRACT What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions. 相似文献
776.
Charles W. Mahoney 《Defense & Security Analysis》2020,36(2):180-200
ABSTRACTThe United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare. 相似文献
777.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
778.
779.
James J. Wirtz 《Defense & Security Analysis》2020,36(1):88-100
ABSTRACTA call for innovation as a means to outpace the acceleration of technological change and to bolster capabilities quickly is a central theme of contemporary U.S. Naval Strategy. The need for innovation is accepted, but the integration of readily available technologies into the Fleet is slow. Innovation unfolds according to “Navy-Time,” a cycle lasting between a long-decade and thirty-years. To accelerate the innovation process in the U.S. Navy, the article offers a Concept of Operations for Innovation that outlines how a deliberate process of analysis, weaponisation and integration can move new ideas and weapons into the Fleet in a strategically relevant time-frame. 相似文献
780.