首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   487篇
  免费   42篇
  国内免费   17篇
  2024年   1篇
  2023年   2篇
  2021年   14篇
  2020年   6篇
  2019年   29篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   51篇
  2013年   99篇
  2012年   8篇
  2011年   26篇
  2010年   35篇
  2009年   30篇
  2008年   35篇
  2007年   21篇
  2006年   18篇
  2005年   18篇
  2004年   11篇
  2003年   15篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   2篇
排序方式: 共有546条查询结果,搜索用时 15 毫秒
231.
面对智能化时代的巨大进步,人工智能安全逐渐成为备受关注的议题.以Web of Science数据库收录的核心论文为研究对象,运用科学计量学方法和可视化技术,对包括国家、机构在内的研究力量分布以及热点、前沿和所涉学科在内的主题内容进行分析和总结.针对潜在的人工智能安全议题,构建定性分析框架,对人工智能安全进行定性定量结合...  相似文献   
232.
介绍了指挥自动化系统安全性的内容,安全性的等级及实现安全性的技术。  相似文献   
233.
构造新的授权模型以满足面向对象、语义、文本数据模型等对授权的需求是当前数据库技术的重要研究课题之一。本文提出了一个基于复杂对象数据模型的、以权主群及权体簇作为授权单位的多级授权模型,即MAM模型,并讨论了面向文本数据库授权系统的基本功能及基本操作。  相似文献   
234.
城市环境安全评价初探   总被引:6,自引:1,他引:5  
环境安全研究目前主要停留在定性描述或定量评价自然生态安全阶段。考虑 到大中城市在经济建设和社会发展中的重要功能及城市生态系统的结构特殊性,首先定义 了城市环境安全范畴,并探讨了城市环境安全评价方法,提出了评价的程序和评价指标的选 择原则,最后提出了一个城市环境安全评价指标体系。  相似文献   
235.
在YHFT-DX处理器的研制中,研究并实现了多项支撑全定制设计的EDA技术。针对全定制设计的功能验证,研究并实现了层次式功能模型自动提取技术,能够将晶体管级网表转化为等效的RTL级网表。研究并实现了晶体管级混合时序分析方法,可自动分析全定制设计的延时,并采用多线程并行的方法获得了约10倍左右的速度提升。为提高模拟结果分析的效率,开发了一个延时提取的工具Aimeasure。开发了两个信号完整性分析工具PNVisual和NoiseSpy,分别用于全定制设计的IR-Drop分析和噪声分析。上述技术已在YHFT-DX处理器的设计中得到了广泛应用,有效提高了全定制设计的效率与质量。  相似文献   
236.
This article explores the livelihood pathways of serving Ugandan Army soldiers and traces their methods and motivations for enlistment. All were from areas of northern Uganda affected by nearly two decades of violent instability. With the Uganda People's Defence Forces (UPDF) increasing recruitment eligibility requirements and taking other measures to improve professionalism, some soldiers enlisted using false credentials and names, travelled to skirt unofficial ethnic quotas, and joined against their family's wishes. The Army's defence reform process was intended to preclude such problems. The article concludes with reflections on what strategic deception (by both recruits and the Army) may imply for warriors' honour.  相似文献   
237.
Why did the United States, a country notorious for supporting coups and military dictatorships in Latin America during the Cold War, seek to depoliticize security forces in the Caribbean basin during the early twentieth century? Drawing from primary sources, I argue that this emphasis on military non-partisanship abroad stemmed from Progressive Era reforms popular at home. These reforms, which stressed bureaucratic efficiency via nonpartisan expertise, had become institutionalized within the US military and State Department and then channelled into the imperial administration of Nicaragua and the Dominican Republic. The State Department and Marine Corps attempted to replace local partisan armies with the kind of professional, nonpartisan armed forces that the US's own military had come to exemplify. That these civil-military reform efforts ultimately backfired should serve as a reminder of the difficulties inherent in using military interventions to transform coercive apparatuses and their societies.  相似文献   
238.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   
239.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   
240.
Using hitherto largely unexplored governmental archives from London and Dublin, this article focuses on the security challenges arising from the existence of the land frontier between the Republic of Ireland and Northern Ireland and the significance of issues of cross-border security cooperation for Anglo-Irish relations from the beginning of the Troubles until the Anglo-Irish Agreement in 1985. It argues that the relatively safe haven of the Republic was essential to the longevity of the IRA's campaign and that successive Irish governments exploited British security concerns to expand their political influence on Northern Ireland.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号