首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74篇
  免费   18篇
  国内免费   3篇
  2019年   1篇
  2018年   3篇
  2017年   3篇
  2016年   6篇
  2015年   5篇
  2014年   8篇
  2013年   15篇
  2012年   3篇
  2011年   10篇
  2010年   4篇
  2009年   3篇
  2008年   4篇
  2007年   3篇
  2006年   6篇
  2005年   6篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   2篇
  1998年   3篇
  1993年   2篇
排序方式: 共有95条查询结果,搜索用时 171 毫秒
61.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   
62.
In conflict studies, identity has been posited as an explanatory factor of the resilience of insurgencies. This article focuses on the identity formation of the National Liberation Army (ELN), a leftist insurgency group in Colombia. As a Marxist–Leninist organisation, the ELN aims to overcome capitalism. In their perception, this is possible via the transformation of the individual into a ‘collective personality’. Along the dimensions of ‘content’ and ‘contestation’, we will demonstrate the mechanisms they impose for such identity formation. Identity, as we will argue, is a main factor in explaining why people participate in this insurgency and thereby enhance its resilience.  相似文献   
63.
接入认证是网络安全防护中的第一道屏障,是实施访问控制的基础.通信安全几乎总是开始于身份认证的握手过程,因此,认证机制对于保证整个网络系统的安全性具有十分重要的意义.在深入研究现有的网络接入认证架构基础之上,提出了一种新的通用的网络接入认证模型并详细说明了认证流程,其中,不仅要求用户使用数字证书进行入网认证,更重要的是在其使用网络资源期间,将对其进行持续的刷新认证及网络行为的信任评价,以此确保用户身份的持久可信性并预防潜在的网络攻击.  相似文献   
64.
This paper explores the impact of moving to accrual budgeting on resources allocation in defence. Standard defence budgeting and investment models are used to assess the theoretical implications of accrual budgeting. In addition, a number of simulations are conducted to assess the long-term implications of moving to accrual accounting and budgeting. The result of the simulations shows that changes to deployed operations and other operational shocks will have manageable impacts on readiness but systematic shocks associated with defence unit prices, procurement policies and defence specific inflation will put considerable strain on the defence department's flexibility.  相似文献   
65.
Policy makers and scholars have drawn improper lessons from the Ukrainian case of disarmament. Employing a content analysis of Ukrainian and Russian news sources, as well as a series of interviews with Ukrainian officials conducted by the author, this paper argues that Ukraine did not surrender its nuclear arsenal because it received compensation or faced financial and technical hurdles in securing effective command and control over the weapons. Instead, Ukraine surrendered its nuclear weapons due to a lack of demand for them. The historical interactions between Ukrainians and Russians led the majority of Ukrainian leaders to reject a conception of the Ukrainian national identity that cognitively perceived Russia as a security threat. Only with a proper understanding of this case study can the international community understand how the nonproliferation norm succeeded.  相似文献   
66.
It is rare to find a well-formulated study that describes the behavioral aspects of leadership in the political realm. Even more infrequent is a combined study of individual behaviors as it applies to a large techno-political issue such as nuclear proliferation. India, Argentina, Australia, and France are used as cases for application of a national identity conception model. The model is based on two dimensions, solidarity and status, that when combined, result in a leader's identification with other nations’ abilities to be a player in the nuclear arms community. While the work is behavioral in context, there is no effort to avoid the technological side of proliferation, so as to provide a balanced review of a complex issue.  相似文献   
67.
采用基于COM技术的软件设计方法 ,对数控系统软件进行模块化开发 ,模块间的通信问题是关键。应用COM技术中的“事件”和“事件槽”方式实现了客户组件模块与服务器之间、客户组件模块之间的通信。这为开放式数控系统软件设计中通信问题的解决提供了一种新的软件方法  相似文献   
68.
We study the problem of minimizing the makespan in no‐wait two‐machine open shops producing multiple products using lot streaming. In no‐wait open shop scheduling, sublot sizes are necessarily consistent; i.e., they remain the same over all machines. This intractable problem requires finding sublot sizes, a product sequence for each machine, and a machine sequence for each product. We develop a dynamic programming algorithm to generate all the dominant schedule profiles for each product that are required to formulate the open shop problem as a generalized traveling salesman problem. This problem is equivalent to a classical traveling salesman problem with a pseudopolynomial number of cities. We develop and test a computationally efficient heuristic for the open shop problem. Our results indicate that solutions can quickly be found for two machine open shops with up to 50 products. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
69.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   
70.
梁晓波  武啸剑  曾广 《国防科技》2018,39(3):017-026
话语体系是当今人文社会科学研究的热词,也已成为影响国家安全的一个重要因子。论文首先介绍话语体系的概念及其特点,报告了话语体系研究的缘起和发展脉络、主要学科与核心关键词以及主要相关文献,并对当前研究现状进行总结。分析了话语体系与国家的关系,并从国家的主体思想、发展道路、身份特质、文化自信、文明追求、话语权等方面阐述了话语体系对国家安全的重要性。论文指出,话语体系是影响国家安全的重要领域,也是国家之间博弈的重要阵地。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号