首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2599篇
  免费   376篇
  国内免费   174篇
  2024年   3篇
  2023年   11篇
  2022年   22篇
  2021年   43篇
  2020年   29篇
  2019年   65篇
  2018年   51篇
  2017年   97篇
  2016年   97篇
  2015年   62篇
  2014年   221篇
  2013年   273篇
  2012年   162篇
  2011年   221篇
  2010年   182篇
  2009年   206篇
  2008年   163篇
  2007年   179篇
  2006年   162篇
  2005年   161篇
  2004年   142篇
  2003年   113篇
  2002年   75篇
  2001年   80篇
  2000年   45篇
  1999年   41篇
  1998年   26篇
  1997年   29篇
  1996年   30篇
  1995年   25篇
  1994年   29篇
  1993年   18篇
  1992年   21篇
  1991年   16篇
  1990年   24篇
  1989年   12篇
  1988年   10篇
  1987年   2篇
  1975年   1篇
排序方式: 共有3149条查询结果,搜索用时 15 毫秒
231.
ABSTRACT

In the decades following independence from Spain, ‘civil wars’ ravaged the newly established polities in South America. Former vice-regal capitals inherited a larger portion of the colonial administration and had larger economic resources and a hegemonic project they were able to have permanent and professional armed forces, capable of leading the offensive and giving battle following the European rules of military art. The central hypothesis of this work is that there is a necessary relationship between the shape of these asymmetrical conflicts, their outcome and the political territorial configuration of each country in post-revolutionary Spanish America. When permanent armies took over from local militias, the capital kept the integrity of its territories and there was a tendency towards political centralization. When this did not happen and the militias managed to find a way to defeat their centralizing enemies, the local powers had an opportunity to renegotiate their participation in the political body, and sought to maintain their independence, which was manifest in federal agreements, otherwise a process of territorial fragmentation began. More than a difference between regular and irregular forces there was one between intermittent, and permanent mobilization.  相似文献   
232.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances.  相似文献   
233.
This paper explores the notion that US efforts to evade the political costs of war paradoxically contribute to the subsequent exacerbation of costs over time. Leaders seek to purchase political capital in the short term by limiting the costs and requirements of military operations, but in doing so cause strategic and political liabilities to mount in the long run. While identification of such behaviour is not new, insufficient attention has been devoted to explaining its causes, dynamics, and manifestations in relation to key decisions on and in war. Evidence derived from studies of recent American discretionary campaigns is analysed to advance an argument with respect to this pattern of self-defeating strategic behaviour.  相似文献   
234.
The aim of this paper is to investigate the determinants of international arms transfers in a gravity model framework. By distinguishing between the decision to export arms (extensive margin) and the value of the arms exported (intensive margin), while also considering its interdependence, is what differentiates this paper from previous research. A theoretically justified gravity model of trade augmented with political and security motives is estimated using a two-stage panel data approach for 104 exporting countries over the period from 1950 to 2007. In addition to the usual gravity variables related to the economic mass of the trading countries and the trade cost factors, the model is extended with political and security factors. The level of democracy in both trading partners, political differences between trading partners and voting similarity with the United States in the UN General Assembly of the countries engaged in trade are the main political factors, whereas the existence of conflicts, military pacts, and embargoes are taken as security motives. The key result indicates that both political and security motives are an important determinant of an arms trade, but their effects on the extensive margin of exports (the decision to order a transfer) differs from their effect on the intensive margin (average value of exports). Moreover, the relative importance of the factors under study has changed since 1989. In the post-cold war period, countries that are less democratic are more likely to export arms, military pacts are less relevant and embargoes play a role.  相似文献   
235.
The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War.  相似文献   
236.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
237.
Instead of measuring a Wiener degradation or performance process at predetermined time points to track degradation or performance of a product for estimating its lifetime, we propose to obtain the first‐passage times of the process over certain nonfailure thresholds. Based on only these intermediate data, we obtain the uniformly minimum variance unbiased estimator and uniformly most accurate confidence interval for the mean lifetime. For estimating the lifetime distribution function, we propose a modified maximum likelihood estimator and a new estimator and prove that, by increasing the sample size of the intermediate data, these estimators and the above‐mentioned estimator of the mean lifetime can achieve the same levels of accuracy as the estimators assuming one has failure times. Thus, our method of using only intermediate data is useful for highly reliable products when their failure times are difficult to obtain. Furthermore, we show that the proposed new estimator of the lifetime distribution function is more accurate than the standard and modified maximum likelihood estimators. We also obtain approximate confidence intervals for the lifetime distribution function and its percentiles. Finally, we use light‐emitting diodes as an example to illustrate our method and demonstrate how to validate the Wiener assumption during the testing. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
238.
布尔函数的Walsh谱绝对值分布及其性质研究   总被引:2,自引:0,他引:2       下载免费PDF全文
提出并研究了布尔函数的Walsh谱绝对值分布.指出布尔函数Walsh谱绝对值分布在仿射变换下的不变性,计算了n(n≤5)元布尔函数的Walsh谱绝对值分布,研究了Walsh谱绝对值分布与Walsh谱支撑和Walsh谱中非零取值个数以及其他一些密码学难题的联系,最后研究了布尔函数的Walsh谱绝对值分布的大小.  相似文献   
239.
首先利用半鞅Girsanov定理与闭图像定理证明了:若{Xn}是带滤基的完备概率空间(Ω,F,F,P)中的一列半鞅,其中滤基F=(Ft)t≥0满足通常条件,且{Xn}在关于P的Emery拓扑空间中收敛于X,则当概率测度Q相似文献   
240.
采用数值方法研究了双三角翼上涡流运动随攻角的变化规律.计算取层流假设,研究了攻角在5°~30°,76°/40°后掠双三角翼绕流的流场结构随攻角的变化,并对双三角翼上涡破裂现象对流场结构及气动力性能的影响进行了分析.结果表明,双三角翼上的多涡结构存在强烈的相互影响,较大的攻角会导致涡破裂在翼面上发生,严重影响了双三角翼的气动力性能.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号