全文获取类型
收费全文 | 791篇 |
免费 | 185篇 |
国内免费 | 14篇 |
出版年
2022年 | 6篇 |
2021年 | 7篇 |
2020年 | 13篇 |
2019年 | 29篇 |
2018年 | 28篇 |
2017年 | 53篇 |
2016年 | 50篇 |
2015年 | 32篇 |
2014年 | 47篇 |
2013年 | 157篇 |
2012年 | 64篇 |
2011年 | 63篇 |
2010年 | 36篇 |
2009年 | 32篇 |
2008年 | 38篇 |
2007年 | 55篇 |
2006年 | 50篇 |
2005年 | 44篇 |
2004年 | 42篇 |
2003年 | 30篇 |
2002年 | 19篇 |
2001年 | 28篇 |
2000年 | 23篇 |
1999年 | 14篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 2篇 |
排序方式: 共有990条查询结果,搜索用时 15 毫秒
181.
基于分布式哈希表(DHT)的P2P查找经常受到在底层网络中路由时无必要的路径长度增加的影响.另外,DHT在处理复制方面也有一定的缺陷.文中探讨了解决这些问题的方法.对使用Bloom filters作为资源路由的方法做了简要回顾,并较为详细地阐述了在资源分散的覆盖网络中使用距离加权Bloom filter的网络路由算法.对该算法进行了仿真测试,证明了其有效性. 相似文献
182.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。 相似文献
183.
Gil S. Epstein 《Defence and Peace Economics》2013,24(6):469-484
We examine who benefits when there is a strong leader in place, and who benefits when a situation lacks a proper leader. There are fractious terrorist groups who seek to serve the same people in common cause against a common enemy. The groups compete for rents obtained from the public by engaging in actions against the common enemy. We determine the leadership structure under which each group is better off, as well as the circumstance that the common enemy prefers. We are able to state simple and general conditions for each group and the common enemy to benefit. 相似文献
184.
Charles R. Boehmer 《Defence and Peace Economics》2013,24(3):249-268
This paper extends the joint product model of military alliances to apply to the new strategic doctrine adopted by NATO in the 1990s. In particular, a choice must be made between protecting one's own territory and pooling forces for an alliancewide rapid reaction force. This new model accounts for a host of externalities and their implications for burden sharing, full financing, and allocative efficiency. The Pigouvian taxes that adjust for force thinning and attack deflection are shown to finance optimal border‐protecting forces under a variety of circumstances. Second‐best considerations arise owing to the pure publicness of rapid reaction forces. The ideal toll arrangement does not currently characterize NATO financing, nor is it likely to do so. 相似文献
185.
The F‐35 Joint Strike Fighter (JSF) programme is important for innovation in the Dutch economy and also contributes to other programmes in the aerospace industry (spin‐off) and other industries (spillover). On top of the expected value of US$9.2 billion in development and production, based on interviews with 10 companies and research institutes, an expected spin‐off of US$1.1 billion and an expected spillover of US$120 million will result. In addition, over 23,000 man‐years are associated with the activities in the development and production of the JSF. This study excludes the large and labour‐intensive Maintenance, Repair and Overhaul (MRO) activities. Further validation of data and an update of current results is planned for 2006. 相似文献
186.
Philip G. Pugh 《Defence and Peace Economics》2013,24(1):25-37
This paper, intended to stimulate debate, suggests that we are at a turning point in the history of the UK military aerospace industry. It argues that there is urgent need for a fresh vision as to how the UK military aerospace industry can both prosper and make its maximum contribution to the defence of Britain. Further, the resulting plans and policies must emphasise the robustness of defence capabilities in a future in which the only thing we can be certain is that it will be very different from the present – especially whenever defence most matters. 相似文献
187.
Bryan R. Early 《The Nonproliferation Review》2013,20(2):259-280
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region. 相似文献
188.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented. 相似文献
189.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
190.
Mariana Budjeryn 《The Nonproliferation Review》2013,20(2):203-237
ABSTRACTThere is a lingering disagreement among scholars on how the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) affects nonproliferation and disarmament outcomes. Drawing on constructivist scholarship on international norms, this article examines the extent of the NPT's effect in the case of Ukraine's nuclear disarmament. In the wake of the Soviet Union's collapse, Ukraine found itself host to the world's third largest nuclear arsenal. Despite Ukraine's initial commitment to become a non-nuclear state, it proceeded along a difficult path toward NPT accession. Most controversial and directly at odds with the NPT was Ukraine's claim to ownership of its nuclear inheritance as a successor state of the Soviet Union. This article argues that, while much domestic discourse about the fate of these nuclear weapons was embedded in the negotiation of Ukraine's new identity as a sovereign state vis-à-vis Russia and the West, the NPT played an important, structural role by outlining a separate normative space for nuclear weapons and providing the grammar of denuclearization with which Ukraine's decision makers had to grapple. 相似文献