全文获取类型
收费全文 | 264篇 |
免费 | 16篇 |
专业分类
280篇 |
出版年
2021年 | 6篇 |
2020年 | 2篇 |
2019年 | 6篇 |
2018年 | 7篇 |
2017年 | 5篇 |
2016年 | 5篇 |
2015年 | 4篇 |
2014年 | 7篇 |
2013年 | 32篇 |
2011年 | 3篇 |
2010年 | 3篇 |
2009年 | 8篇 |
2008年 | 5篇 |
2006年 | 4篇 |
2005年 | 4篇 |
2004年 | 7篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 3篇 |
1998年 | 3篇 |
1997年 | 9篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 11篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 3篇 |
1974年 | 6篇 |
1972年 | 2篇 |
1971年 | 8篇 |
1970年 | 4篇 |
1969年 | 5篇 |
1967年 | 2篇 |
排序方式: 共有280条查询结果,搜索用时 15 毫秒
221.
Thomas P. Cavanna 《战略研究杂志》2018,41(4):576-603
How much does the United States care about nonproliferation? Recent scholarship suggests that the fear of spreading nuclear weapons was central to the US grand strategy in the Cold War. In one important case, however, this argument does not hold. This article draws on theoretical debates and newly declassified archives to demonstrate the primacy of geopolitics over nonproliferation in Washington’s policy toward India and Pakistan. Despite their rhetoric, Democratic and Republican leaders consistently relegated nonproliferation to the backburner whenever it conflicted with other strategic goals. Moreover, they inadvertently encouraged proliferation in South Asia at three inter-connected levels: technology, security, and identity. 相似文献
222.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t. 相似文献
223.
In this article we present an approach to determine the initially unspecified weights in an additive measurable multiattribute value function. We formulate and solve a series of nonlinear programming problems which (1) incorporate whatever partial information concerning the attribute weights or overall relative value of alternatives the decision maker chooses to provide, yet (2) yield a specific set of weights as a result. Although each formulation is rather easily solved using the nonlinear programming software GINO (general interactive optimizer), solutions in closed form dependent on a single parameter are also provided for a number of these problems. 相似文献
224.
This article deals with optimization problems that have some uncertain parameters with unknown probabilities. The article proposes a strategy of transferring the system's uncertainty associated with these optimization problems into a norm or a set of norms that is added to the original objective function(s) within a multiobjective framework. The uncertainty sensitivity index method (USIM) proposed by Haimes and Hall [1977] is extended to several general cases. A robust algorithm is developed to guarantee an ideal solution for cases where the nominal value of the uncertain parameter is itself an uncertain variable. A design problem is also addressed to identify the best-compromise values of the system's parameters by integrating the USIM with the envelope approach. 相似文献
225.
226.
This paper reviews some of the theoretical and econometric issues involved in estimating growth models that include military spending. While the mainstream growth literature has not found military expenditure to be a significant determinant of growth, much of the defence economics literature has found significant effects. The paper argues that this is largely the product of the particular specification, the Feder–Ram model, that has been used in the defence economics literature but not in the mainstream literature. The paper critically evaluates this model, detailing its problems and limitations and suggests that it should be avoided. It also critically evaluates two alternative theoretical approaches, the Augmented Solow and the Barro models, suggesting that they provide a more promising avenue for future research. It concludes with some general comments about modelling the links between military expenditure and growth. 相似文献
227.
Future conflict between armed forces will occur both in the physical domain as well as the information domain. The linkage of these domains is not yet fully understood. We study the dynamics of a force subject to kinetic effects as well as a specific network effect–spreading malware. In the course of our study, we unify two well‐studied models: the Lanchester model of armed conflict and deterministic models of epidemiology. We develop basic results, including a rule for determining when explicit modeling of network propagation is required. We then generalize the model to a force subdivided by both physical and network topology, and demonstrate the specific case where the force is divided between front‐ and rear‐echelons. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
228.
John P. Sullivan 《Small Wars & Insurgencies》2013,24(1):82-96
The nature of conflict and crime is changing. Technology allows groups to spread their influence without regard to geographic limitations. A shift from hierarchies to network organizational forms is also occurring. As a consequence non‐state actors can extend their influence to gain social, political or economic power and challenge state institutions. This article examines the potential for gangs, transnational criminals and terrorists to embrace network forms and utilize technology to wage netwar. Factors which influence ‘third generation’ gang organization (politicization, internationalization and sophistication) are described to illustrate how a net‐based threat can mature. A move toward network organization within transnational criminal organizations and terrorist groups demonstrating the potential for these classic criminal entities to emerge as netwar actors is also reviewed. Finally, the need for state institutions such as the police and military to develop networked responses to combat networked threats is stated. 相似文献
229.
230.