首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   108篇
  免费   1篇
各国政治   7篇
工人农民   3篇
世界政治   60篇
外交国际关系   7篇
法律   14篇
政治理论   18篇
  2018年   5篇
  2017年   1篇
  2016年   1篇
  2015年   3篇
  2014年   3篇
  2013年   9篇
  2012年   2篇
  2009年   1篇
  2008年   6篇
  2007年   10篇
  2006年   13篇
  2005年   7篇
  2004年   8篇
  2003年   9篇
  2002年   11篇
  2000年   2篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
  1992年   2篇
  1989年   2篇
  1988年   1篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有109条查询结果,搜索用时 406 毫秒
101.
102.
This paper discusses important aspects of technology transfer between MCC (the first R&D consortium to register under the National Cooperative Research Act of 1984) and company-based personnel. An evaluation of established technology-transfer models leads to a discussion of a parallel-processing approach and three important dimensions of the transfer process: mode, initiative, and continuity. Differences between R&D consortia and their member companies are categorized in terms of values and imperatives, networking, time pressure, the universalistic/particularistic nature of research activities, and different evaluation criteria. Generalized managerial implications are presented for R&D consortia.  相似文献   
103.
104.
Comarow A 《U.S. news & world report》2002,133(20):54-6, 59-60, 61
  相似文献   
105.
106.
This article examines changes in China’s security perceptions since 1949 and sketches the evolution of China’s grand strategy. In tracing the evolution of China’s security perceptions and grand strategy since 1949, it identifies elements of change as well as continuity. The changes reflect dramatic developments in the PRC’s capabilities and the international circumstances it faces, both of which have shaped the grand strategic choices of China’s leaders. During most of the Cold War decades, a relatively weak China’s vulnerability to serious military threats from much more powerful adversaries led the CCP to adopt grand strategies focused on coping with a clearly defined external security challenge. After the Cold War and especially in the 21st century, an increasingly complex array of internal and external security concerns confronts China’s leaders with new challenges. The paper concludes with a discussion of the significance of the recently established National Security Commission and offers brief observations about its potential significance for the CCP’s leadership in their fight against the new domestic and international security challenges it faces. The novelty of China’s security challenges at home and abroad in the 21st century is a consequence of the end of the Cold War international order and perhaps more importantly, a consequence of China’s successful modernization since 1979.  相似文献   
107.
The current study sought to explore subtypes of adolescents within a sample of female juvenile offenders. Using the Millon Adolescent Clinical Inventory with 101 female juvenile offenders, a two-step cluster analysis was performed beginning with a Ward's method hierarchical cluster analysis followed by a K-Means iterative partitioning cluster analysis. The results suggest an optimal three-cluster solution, with cluster profiles leading to the following group labels: Externalizing Problems, Depressed/Interpersonally Ambivalent, and Anxious Prosocial. Analysis along the factors of age, race, offense typology and offense chronicity were conducted to further understand the nature of found clusters. Only the effect for race was significant with the Anxious Prosocial and Depressed Intepersonally Ambivalent clusters appearing disproportionately comprised of African American girls. To establish external validity, clusters were compared across scales of the Behavioral Assessment System for Children - Self Report of Personality, and corroborative distinctions between clusters were found here.  相似文献   
108.
109.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号