首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   462篇
  免费   15篇
  2021年   4篇
  2020年   4篇
  2019年   8篇
  2018年   5篇
  2017年   9篇
  2016年   9篇
  2015年   8篇
  2014年   8篇
  2013年   94篇
  2011年   5篇
  2009年   4篇
  2007年   7篇
  2005年   6篇
  2004年   8篇
  2003年   6篇
  2002年   8篇
  2001年   7篇
  2000年   4篇
  1999年   7篇
  1998年   10篇
  1997年   11篇
  1996年   8篇
  1995年   12篇
  1994年   13篇
  1993年   12篇
  1992年   12篇
  1991年   14篇
  1990年   6篇
  1989年   4篇
  1988年   8篇
  1987年   9篇
  1986年   4篇
  1985年   9篇
  1984年   9篇
  1983年   6篇
  1982年   6篇
  1981年   9篇
  1980年   9篇
  1979年   11篇
  1978年   7篇
  1977年   5篇
  1976年   7篇
  1975年   8篇
  1974年   7篇
  1973年   8篇
  1972年   8篇
  1971年   6篇
  1969年   6篇
  1968年   5篇
  1967年   4篇
排序方式: 共有477条查询结果,搜索用时 15 毫秒
421.
422.
423.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
424.
Theorizing about Taliban operations in Afghanistan has its limits and it is possible that Kabul-centric strategies do not adequately address the unique circumstances of each region in the country. How exactly has the Taliban gone about attaining its objectives in Kandahar province and how have those approaches evolved since 2002? And how have the Taliban adapted to coalition forces' attempts to compete with the insurgency and stamp it out? The answers to these questions are critical in the formulation of any counterinsurgency approach to Afghanistan.  相似文献   
425.
426.
In a very important sense, the Vietnamese military history of the communist era began in 1941, when Ho Chi Minh prepared ‘Guerrilla Tactics’ (Cach Danh Du Kich).1 ?1. Ministry of Defense Center for the Military Encyclopedia Ministry of Defense Center for the Military Encyclopedia. 1996. Tu Dien Bach Hoa Quan Su Vietnam, Hanoi: People's Army Publishing Company.  [Google Scholar], Tu Dien Bach Hoa Quan Su Vietnam, 69. The publication of this essay, which was a manual on the tactics, techniques, and procedures of guerrilla warfare, preceded the founding of the first armed propaganda unit (Tuyen Truyen Doi Vo Trang) on 22 December 1944, which later became the People's Army of Vietnam (PAVN, Quan Doi Nhan Dan); as well as the revolutionary writings of Truong Chinh (1946–1947) and Vo Nguyen Giap (1959). The fact that ‘Tactics’ was published by the Viet Minh reinforces the claim made by the PAVN that it was the first authoritative Vietnamese writing on this important subject.  相似文献   
427.
US foreign internal security assistance, that is, support to ‘Free World’ governments threatened by subversion, terrorism, and insurgency, formed a central part of the Kennedy administration's strategy for defeating ‘wars of national liberation’. As part of the administration's counterinsurgency policy, support to police and paramilitary forces abroad was intended to improve the ability of friendly governments to identify and root our perceived threats to the states. Under the tenets of modernization theory embraced by administration officials, strong internal security forces were expected to contribute to nation-building by protecting the fragile development process underway in the developing world. However, in attempting to export the American police model, policymakers failed to consider whether US notions about internal security were appropriate for fractious and unstable regions of the world.  相似文献   
428.
429.
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
430.
Trafficking in persons in Nigeria has largely targeted adults and children, particularly women and girls. Of growing concern, however, is the recent emergence and growth of sophisticated and syndicated groups involved in baby ‘factories’ and trafficking in Nigeria. This article examines the nature, actors, modus operandi and motives behind this emergent dimension of human trafficking in Nigeria. It concludes that if concerted efforts are not made to deal with the actors and dismantle the market, its profitability will embolden current actors and even encourage new entrants into the booming trade – now and in the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号