全文获取类型
收费全文 | 462篇 |
免费 | 15篇 |
出版年
2021年 | 4篇 |
2020年 | 4篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 9篇 |
2016年 | 9篇 |
2015年 | 8篇 |
2014年 | 8篇 |
2013年 | 94篇 |
2011年 | 5篇 |
2009年 | 4篇 |
2007年 | 7篇 |
2005年 | 6篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 8篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 10篇 |
1997年 | 11篇 |
1996年 | 8篇 |
1995年 | 12篇 |
1994年 | 13篇 |
1993年 | 12篇 |
1992年 | 12篇 |
1991年 | 14篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 8篇 |
1987年 | 9篇 |
1986年 | 4篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 6篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 5篇 |
1976年 | 7篇 |
1975年 | 8篇 |
1974年 | 7篇 |
1973年 | 8篇 |
1972年 | 8篇 |
1971年 | 6篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 4篇 |
排序方式: 共有477条查询结果,搜索用时 15 毫秒
421.
422.
423.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
424.
William Wei 《Small Wars & Insurgencies》2013,24(2):201-217
Theorizing about Taliban operations in Afghanistan has its limits and it is possible that Kabul-centric strategies do not adequately address the unique circumstances of each region in the country. How exactly has the Taliban gone about attaining its objectives in Kandahar province and how have those approaches evolved since 2002? And how have the Taliban adapted to coalition forces' attempts to compete with the insurgency and stamp it out? The answers to these questions are critical in the formulation of any counterinsurgency approach to Afghanistan. 相似文献
425.
426.
Edward C. O'Dowd 《Small Wars & Insurgencies》2013,24(3):561-587
In a very important sense, the Vietnamese military history of the communist era began in 1941, when Ho Chi Minh prepared ‘Guerrilla Tactics’ (Cach Danh Du Kich).1 The publication of this essay, which was a manual on the tactics, techniques, and procedures of guerrilla warfare, preceded the founding of the first armed propaganda unit (Tuyen Truyen Doi Vo Trang) on 22 December 1944, which later became the People's Army of Vietnam (PAVN, Quan Doi Nhan Dan); as well as the revolutionary writings of Truong Chinh (1946–1947) and Vo Nguyen Giap (1959). The fact that ‘Tactics’ was published by the Viet Minh reinforces the claim made by the PAVN that it was the first authoritative Vietnamese writing on this important subject. 相似文献
427.
William Rosenau 《Small Wars & Insurgencies》2013,24(3):65-99
US foreign internal security assistance, that is, support to ‘Free World’ governments threatened by subversion, terrorism, and insurgency, formed a central part of the Kennedy administration's strategy for defeating ‘wars of national liberation’. As part of the administration's counterinsurgency policy, support to police and paramilitary forces abroad was intended to improve the ability of friendly governments to identify and root our perceived threats to the states. Under the tenets of modernization theory embraced by administration officials, strong internal security forces were expected to contribute to nation-building by protecting the fragile development process underway in the developing world. However, in attempting to export the American police model, policymakers failed to consider whether US notions about internal security were appropriate for fractious and unstable regions of the world. 相似文献
428.
429.
Mustapha Bouhtou Alexander Grigoriev Stan van Hoesel Anton F. van der Kraaij Frits C.R. Spieksma Marc Uetz 《海军后勤学研究》2007,54(4):411-420
We consider a pricing problem in directed, uncapacitated networks. Tariffs must be defined by an operator, the leader, for a subset of m arcs, the tariff arcs. Costs of all other arcs in the network are assumed to be given. There are n clients, the followers, and after the tariffs have been determined, the clients route their demands independent of each other on paths with minimal total cost. The problem is to find tariffs that maximize the operator's revenue. Motivated by applications in telecommunication networks, we consider a restricted version of this problem, assuming that each client utilizes at most one of the operator's tariff arcs. The problem is equivalent to pricing bridges that clients can use in order to cross a river. We prove that this problem is APX‐hard. Moreover, we analyze the effect of uniform pricing, proving that it yields both an m approximation and a (1 + lnD)‐approximation. Here, D is upper bounded by the total demand of all clients. In addition, we consider the problem under the additional restriction that the operator must not reject any of the clients. We prove that this problem does not admit approximation algorithms with any reasonable performance guarantee, unless P = NP, and we prove the existence of an n‐approximation algorithm. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
430.
Freedom C. Onuoha 《African Security Review》2014,23(4):405-411
Trafficking in persons in Nigeria has largely targeted adults and children, particularly women and girls. Of growing concern, however, is the recent emergence and growth of sophisticated and syndicated groups involved in baby ‘factories’ and trafficking in Nigeria. This article examines the nature, actors, modus operandi and motives behind this emergent dimension of human trafficking in Nigeria. It concludes that if concerted efforts are not made to deal with the actors and dismantle the market, its profitability will embolden current actors and even encourage new entrants into the booming trade – now and in the future. 相似文献