全文获取类型
收费全文 | 104篇 |
免费 | 12篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 7篇 |
世界政治 | 3篇 |
外交国际关系 | 16篇 |
法律 | 62篇 |
中国政治 | 2篇 |
政治理论 | 22篇 |
综合类 | 1篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 4篇 |
2018年 | 3篇 |
2017年 | 5篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 1篇 |
2013年 | 12篇 |
2012年 | 3篇 |
2011年 | 5篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 1篇 |
2007年 | 3篇 |
2006年 | 6篇 |
2005年 | 1篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有116条查询结果,搜索用时 15 毫秒
1.
J B Kempton A Sirignano D H DeGaetano P J Yates W F Rowe 《Journal of forensic sciences》1992,37(6):1534-1540
The fingernail ridge patterns of a pair of identical twins were compared to each other, their parents, and an unrelated subject. The patterns of the twins' nails showed regions of strong similarity but were distinguishable from one another. Fewer similarities were found when comparing the nails to those of the parents and the unrelated control. The twins were shown to be monozygotic by means of DNA profiling. This therefore represents the first demonstration of unique fingernail ridge patterns in subjects shown conclusively to be identical twins. When the fingernail ridge patterns were examined with a scanning electron microscope, the backscattered electron (BEI) images were found to have superior contrast when compared to the secondary electron (SEI) images. 相似文献
2.
3.
Nicholas Clark Gretchen Van Dyke Peter Loedel John Scherpereel Andreas Sobisch 《Journal of Political Science Education》2017,13(2):152-170
While the effects of simulation-based courses on the knowledge of participating students may be marginal in relation to standard lecture and discussion-based courses, this article argues that the greatest leverage is gained by increasing participating students’ level of interest in the subject of study and in politics more broadly. Participants tend to become increasingly absorbed in their roles and in the politics of the institutions at the center of the simulation. To better consider this possibility, we conducted a survey of students participating in the 2015 Mid-Atlantic European Union Simulation and of appropriate control populations. The survey results indeed suggest that, much more than simply acquiring knowledge about the EU, the simulation experience serves to generate more robust interest in the subject of study. 相似文献
4.
Mary Rowe 《Negotiation Journal》2018,34(2):137-163
Peers and bystanders play important roles in organizational and community conflict management. Bystanders often learn relevant information and have opportunities to act in ways that can affect three of the basic functions of a conflict management system (CMS.) They can help (or not help) to identify, assess, and manage behaviors that the organization or community deems to be “unacceptable.” Examples in which bystanders play important roles include sexual and racial harassment, safety violations, unethical research, national security violations and insider threats, cyber‐bullying and cyber‐sabotage, violence, fraud, theft, intimidation and retaliation, and gross negligence. Bystanders often are a missing link in conflict systems. For the purposes of this article, I define peers and bystanders as people who observe or learn about unacceptable behavior by others, but who are not the relevant supervisors, or who knowingly engage in planning or executing that behavior. I define CMS managers as all those people, including line managers, who have responsibility for managing conflicts. Conflict managers face many challenges in fostering constructive behavior from bystanders. The interests of bystanders may or may not coincide with the interests of conflict systems managers in an organization or community. Bystanders often have multiple, idiosyncratic, and conflicting interests, and experience painful dilemmas. In addition, peers and bystanders, and their contexts – often differ greatly from each other. Blanket rules about how all bystanders should behave, such as requirements for mandatory reporting, are often ineffective or lead to perverse results. Bystanders are regularly equated with “do‐nothings,” in the popular press. In real life, however, helpful bystander actions are common. Many bystanders report a wide variety of constructive initiatives, including private, informal interventions. In this article, I report on forty‐five years of observations on bystanders in many milieus. I present what bystanders have said are the reasons that they did not – or did – take action, and what can be learned to help organizations and communities to support bystanders to be more effective when faced with unacceptable behavior. 相似文献
5.
6.
7.
8.
Industry stakeholders and Internet experts generally agree that networks using Internet Protocol version 6 (IPv6), an Internet
communications standard which is being promoted strongly by many parties, would be technically superior to today’s networks,
which are largely based on IPv4. The improvements designed for IPv6 could provide numerous benefits to Internet users, network
administrators, and applications developers; among these potential benefits are cost reductions due to improved security and
increased efficiency, improvements to existing products and services, and innovations leading to new products and services.
However, there is wide disagreement about the characteristics and timing of benefits associated with IPv6, and the costs associated
with the transition could be substantial. In this paper, we will discuss the likely costs of a transition to IPv6 for the
major stakeholders and the potential benefits. Subsequently, we will introduce the cost impact of an accelerated adoption
case and discuss potential ways in which the government could become involved in the process.
This paper is based on a broader study funded by the National Telecommunications and Information Administration (NTIA) and
National Institute of Standards and Technology (NIST). We wish to thank Greg Tassey, Fred Lee, Tim Sloan, B. Keith Fulton,
John Streck, and Baran Erkel for comments and suggestions on earlier versions of this paper. 相似文献
9.
10.