首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   429篇
  免费   38篇
  国内免费   6篇
  2022年   3篇
  2021年   1篇
  2020年   4篇
  2019年   6篇
  2018年   1篇
  2017年   6篇
  2016年   6篇
  2015年   6篇
  2014年   24篇
  2013年   27篇
  2012年   23篇
  2011年   26篇
  2010年   55篇
  2009年   45篇
  2008年   36篇
  2007年   19篇
  2006年   18篇
  2005年   15篇
  2004年   35篇
  2003年   17篇
  2002年   5篇
  2001年   10篇
  2000年   10篇
  1999年   9篇
  1998年   18篇
  1997年   9篇
  1996年   13篇
  1995年   8篇
  1994年   8篇
  1992年   2篇
  1991年   3篇
  1990年   3篇
  1989年   2篇
排序方式: 共有473条查询结果,搜索用时 15 毫秒
141.
大陆地区和台湾地区的刑事法律制度存在较大差异,必将影响海峡两岸共同合作打击跨境犯罪工作的开展。海峡两岸应在《海峡两岸共同打击犯罪及司法互助协议》框架下,在协商互信的基础上,本着对两岸刑事法律制度差异的清晰认识,采取合理、有效的刑事对策弱化其对两岸合作打击跨境犯罪的影响。  相似文献   
142.
青少年亲社会行为培养关涉一个民族、国家的未来和兴衰.青少年亲社会行为的深层次价值体现,乃是青少年对民族、国家的认同意识、忧患意识和担当意识的自觉与觉醒.对于青少年的亲社会行为培养,主要以坚持社会主义核心价值观为思想前提;以因循传统“知行合一”理论为培养的基本原则;以面向现实人生为培养的关键和落脚点,共同构建青少年的亲社会行为培养模式。  相似文献   
143.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014  相似文献   
144.
In this article, we address a stochastic generalized assignment machine scheduling problem in which the processing times of jobs are assumed to be random variables. We develop a branch‐and‐price (B&P) approach for solving this problem wherein the pricing problem is separable with respect to each machine, and has the structure of a multidimensional knapsack problem. In addition, we explore two other extensions of this method—one that utilizes a dual‐stabilization technique and another that incorporates an advanced‐start procedure to obtain an initial feasible solution. We compare the performance of these methods with that of the branch‐and‐cut (B&C) method within CPLEX. Our results show that all B&P‐based approaches perform better than the B&C method, with the best performance obtained for the B&P procedure that includes both the extensions aforementioned. We also utilize a Monte Carlo method within the B&P scheme, which affords the use of a small subset of scenarios at a time to estimate the “true” optimal objective function value. Our experimental investigation reveals that this approach readily yields solutions lying within 5% of optimality, while providing more than a 10‐fold savings in CPU times in comparison with the best of the other proposed B&P procedures. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 131–143, 2014  相似文献   
145.
Unlike most of the literature, this paper includes domestic political considerations in which two countries must decide defensive countermeasures against a common terrorist threat. A delegation problem arises as voters strategically choose a policymaker whose preferences differ from their own. As a consequence, countries limit the presumed oversupply of defensive countermeasures. Thus, the inclusion of domestic politics gives a new perspective on counterterrorism. The timing of elections is also shown to make a difference.  相似文献   
146.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   
147.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented.  相似文献   
148.
对装备保障抽组力量的物资装载问题进行了数学描述,建立了以实现全部物资尽量分散装载为目标,以同类物资集中装载、车辆承载物资总体积不超过车辆有效容积、车辆承载物资总重量不超过车辆标记载重量、物资必须装载且不被重复装载等为主要约束的数学模型,并进行了求解.最后通过实例解算验证了模型的有效性.  相似文献   
149.
近年来我国高层建筑剧增,承载的人口越来越密集,火灾荷载越来越大,如果安全疏散设计不合理,一旦发生火灾,容易造成严重后果.在分析高层建筑的火灾特点和影响人员安全疏散的因素的基础上,从合理设置安全出口、疏散走道、疏散楼梯、疏散宽度和距离、疏散门、避难层及其他辅助疏散设施、疏散照明灯具等方面探析了高层建筑的安全疏散设计,为避免和减少人员伤亡和财产损失创造条件.  相似文献   
150.
长期以来,学生的情感发展被教育者所忽视。目前教育技术学学科定位仍处于争论阶段,而其自身较明显的技术外观又往往使专业学生对该学科的理解和认识产生不同程度的偏误。但需要明确的是,学生接受专业教育,既要学习认知层面的专业知识,更要明确以价值观为代表的专业情感目标。可以认为,忽视了专业情感目标的教学是畸形的教学。本文从罗杰斯人本主义理论的视角出发,分析了构建基于QQ群的情感目标教学环境的设计方案,旨在促进教育技术专业的健康发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号