首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   208篇
  免费   2篇
各国政治   2篇
工人农民   2篇
外交国际关系   3篇
法律   155篇
中国共产党   1篇
中国政治   7篇
政治理论   11篇
综合类   29篇
  2023年   5篇
  2022年   16篇
  2021年   12篇
  2020年   8篇
  2019年   11篇
  2018年   19篇
  2017年   8篇
  2016年   7篇
  2015年   11篇
  2014年   27篇
  2013年   13篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   8篇
  2008年   5篇
  2007年   9篇
  2006年   11篇
  2005年   3篇
  2004年   3篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有210条查询结果,搜索用时 15 毫秒
101.
Peer-to-peer (P2P) technologies are often seen as a threat by copyright owners because they encourage piracy by making digital copies easier to obtain. In response, major record companies have come up with new devices designed to protect original material, and lobbied to reinforce legal protection. We view traditional distribution as an information-push technology in which the firm pays to provide information to consumers and P2P as an information-pull technology where consumers spend resources to acquire information on products they have a potential interest in by searching, downloading and testing digital copies of original products before they make their purchase decision. We determine copyright owners’ protection strategies according to the level of legal protection, and we study their effects on profits and consumers’ surplus with the two different information transmission technologies.  相似文献   
102.
当前,数字图书馆建设浪潮正在世界展开,将现有图书馆馆藏资料数字化是其主要方式.国家检察官学院图书数字化建设的四个步骤(一)建立机读目录;(二)建立电子阅览室;(三)建立局域网;(四)实现馆际资源共享.  相似文献   
103.
关于数字环境下大学图书馆职能扩展与创新的初步分析   总被引:2,自引:0,他引:2  
本文通过对数字时代大学图书馆面临的挑战和机遇进行分析,结合当前图书馆建设的实践,指出与其他馆、出版业以及搜索服务商合作进行数字图书馆建设;参与学术出版,建设大学知识机构库;支持远程访问;实施信息素养教育;构建信息共享空间等职能扩展与创新是大学图书馆创新的主要方面。  相似文献   
104.
105.
The Grand Chamber has ruled that the data retention directive was invalid ex tunc since it seriously interfered with the fundamental rights to respect for private life and protection of personal data and exceeded the limits of the principle of proportionality which are provided for in the Charter. The scope and temporal effects of this ruling should be clarified, especially its legal impacts on national laws of Member States which enacted the directive. In addition, the findings of the Grand Chamber on geographical safeguards have far-reaching implications on the retention and storage of personal data in the EU.  相似文献   
106.
Over the last two decades, at least a dozen Asian jurisdictions have adopted significant data privacy (or ‘data protection’) laws. South Korea started to implement such laws in relation to its public sector in the 1990s, then its private sector from 2001, culminating in the comprehensive Personal Information Privacy Act of 2011. Internationally, there have been two stages in the development of data privacy principles (the common core of such laws), the first typified by the OECD's data protection Guidelines of 1981, and the second typified by the European Union data protection Directive of 1995, with a third stage currently under development.  相似文献   
107.
《Digital Investigation》2014,11(2):111-119
To discriminate natural images from computer generated graphics, a novel identification method based on the features of the impact of color filter array (CFA) interpolation on the local correlation of photo response non-uniformity noise (PRNU) is proposed. As CFA interpolation generally exists in the generation of natural images and it imposes influence on the local correlation of PRNU, the differences between the PRNU correlations of natural images and those of computer generated graphics are investigated. Nine dimensions of histogram features are extracted from the local variance histograms of PRNU to represent the identification features. The discrimination is accomplished by using a support vector machine (SVM) classifier. Experimental results and analysis show that it can achieve an average identification accuracy of 99.43%, and it is robust against scaling, JPEG compression, rotation and additive noise. Thus, it has great potential to be used in image source pipelines forensics.  相似文献   
108.
When digital forensics started in the mid-1980s most of the software used for analysis came from writing and debugging software. Amongst these tools was the UNIX utility ‘dd’ which was used to create an image of an entire storage device. In the next decade the practice of creating and using ‘an image’ became established as a fundamental base of what we call ‘sound forensic practice’. By virtue of its structure, every file within the media was an integrated part of the image and so we were assured that it was wholesome representation of the digital crime scene. In an age of terabyte media ‘the image’ is becoming increasingly cumbersome to process, simply because of its size. One solution to this lies in the use of distributed systems. However, the data assurance inherent in a single media image file is lost when data is stored in separate files distributed across a system. In this paper we assess current assurance practices and provide some solutions to the need to have assurance within a distributed system.  相似文献   
109.
Analysing large amounts of data goes to the heart of the challenges confronting intelligence and law enforcement professionals today. Increasingly, this involves Internet data that are ‘open source’ or ‘publicly available’. Projects such as the European FP7 VIRTUOSO are developing platforms for open-source intelligence by law enforcement and public security, which open up opportunities for large-scale, automated data gathering and analysis. However, the mere fact that data are publicly available does not imply an absence of restrictions to researching them. This paper investigates one area of legal constraints, namely criminal-procedure law in relation to open-source data gathering by the police. What is the legal basis for this activity? And under what conditions can domestic and foreign open sources be investigated?  相似文献   
110.
《Science & justice》2020,60(6):555-566
Despite many academic studies in the last 15 years acknowledging the investigative value of physical memory due to the potential sensitive nature of data it may contain, it arguably remains rarely collected at-scene in most criminal investigations. Whilst this may be due to factors such as first responders lacking the technical skills to do this task, or simply that it is overlooked as an evidence source, this work seeks to emphasise the worth of this task by demonstrating the ability to recover plain-text login credentials from it. Through an examination of logins made to 15 popular online services carried out via the Chrome, Edge and Mozilla Firefox browsers, testing shows that plain-text credentials are present in RAM in every case. Here, a transparent test methodology is defined and the results of test cases are presented along with ‘string markers’ which allow a practitioner to search their RAM captures for the presence of unknown credential information for these services in future cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号