首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   581篇
  免费   54篇
各国政治   34篇
工人农民   25篇
世界政治   95篇
外交国际关系   58篇
法律   215篇
中国政治   7篇
政治理论   198篇
综合类   3篇
  2023年   10篇
  2022年   7篇
  2021年   5篇
  2020年   23篇
  2019年   29篇
  2018年   47篇
  2017年   54篇
  2016年   34篇
  2015年   27篇
  2014年   26篇
  2013年   80篇
  2012年   32篇
  2011年   20篇
  2010年   11篇
  2009年   16篇
  2008年   28篇
  2007年   22篇
  2006年   8篇
  2005年   15篇
  2004年   12篇
  2003年   15篇
  2002年   15篇
  2001年   14篇
  2000年   8篇
  1999年   9篇
  1998年   6篇
  1997年   5篇
  1996年   3篇
  1995年   7篇
  1994年   4篇
  1993年   8篇
  1992年   4篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   2篇
  1984年   4篇
  1983年   2篇
  1980年   1篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1975年   1篇
  1974年   2篇
  1973年   1篇
  1971年   3篇
排序方式: 共有635条查询结果,搜索用时 15 毫秒
261.
The aim of the article is to present the results of road tests of original and retreaded tyres, analysed in the aspect of vehicle active safety. The tests covered emergency braking, steady-state circular tests and severe lane-change manoeuvre. The tests were performed in summer and winter conditions. Original Michelin tyres and Michelin tyres retreaded with summer and winter rubber compounds were used. The results of the tests proved that vehicle active safety is affected by retreaded tyres. The differences between braking deceleration of a car with original tyres and braking deceleration of a car with retreaded tyres confirmed the necessity of performing braking tests on the place of accident with the set of tyres with which the vehicle participating in the accident was equipped.  相似文献   
262.
In light of the differences between traditional forms of victimization and cybercrime victimization, this study examined whether the expansion of self-control theory to the field of victimization could help explain cybercrime victimization as well. This study found that self-control had a weak relationship with multiple forms of cybercrime victimization, but it did not have a direct effect on victimization after controlling for offending measures. Considering that this was incongruent with previous victimization research, these findings raise theoretical and empirical questions for the entire field of victimization regarding the importance of self-control when controlling for relevant peer offending.  相似文献   
263.
As the role of US congressional parties in the legislative process has increased, so has the importance of understanding the institutions within these organizations. In this article, we examine the weekly caucus meetings held by Republican House leaders with their rank‐and‐file. We consider how members’ characteristics relate to their decision to attend based on the collective and private benefits that caucus participation affords. Using interviews of members and staffers as well as members’ attendance records at these meetings from 2007 to 2013, we find, among other things, that members who vote less with their party or who have more seniority are less likely to attend while those in leadership positions or who are electorally vulnerable are more likely to do so. Together, these findings provide additional insights on the relationship between party leaders and their members and which members benefit from this central party‐building activity.  相似文献   
264.
Islamic law, or shari‘a, has been incorporated into the legal systems of many states. In much of the existing literature, this process is understood as part of the colonial and postcolonial state's attempt to render law legible—that is, codified, standardized, and abstract. In this article, I show how some state actors chose to move in the opposite direction, actively discouraging the transformation of shari‘a into a formal and codified system of law. Using the case of colonial and postcolonial Sudan, I argue that these actors viewed legal legibility as a threat to state power, recognizing the jurisgenerative potential of an informal and uncodified law.  相似文献   
265.
The advent of cloud computing has brought the computing power of corporate data processing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices along with the power and capability of a service. Using logical as opposed to physical partitions across cloud servers, providers supply flexible and scalable resources. Furthermore, the possibility for multitenant accounts promises considerable freedom when establishing access controls for cloud content. For forensic analysts conducting data acquisition, cloud resources present unique challenges. Inherent properties such as dynamic content, multiple sources, and nonlocal content make it difficult for a standard to be developed for evidence gathering in satisfaction of United States federal evidentiary standards in criminal litigation. Development of such standards, while essential for reliable production of evidence at trial, may not be entirely possible given the guarantees to privacy granted by the Fourth Amendment and the Electronic Communications Privacy Act. Privacy of information on a cloud is complicated because the data is stored on resources owned by a third-party provider, accessible by users of an account group, and monitored according to a service level agreement. This research constructs a balancing test for competing considerations of a forensic investigator acquiring information from a cloud.  相似文献   
266.
Fingermarks are a key form of physical evidence for identifying persons of interest and linking them to the scene of a crime. Visualising latent (hidden) fingermarks can be difficult and the correct choice of techniques is essential to develop and preserve any fingermarks or other (e.g. DNA) evidence that might be present. Metal surfaces (stainless steel in particular) have proven to be challenging substrates from which to reliably obtain fingermarks. This is a great cause for concern among police forces around the globe as many of the firearms, knives and other metal weapons used in violent crime are potentially valuable sources of fingermark evidence. In this study, a highly sensitive and non-destructive surface science technique called time of flight secondary ion mass spectroscopy (ToF-SIMS) was used to image fingermarks on metal surfaces. This technique was compared to a conventional superglue based fuming technique that was accompanied by a series of contrast enhancing dyes (basic yellow 40 (BY40), crystal violet (CV) and sudan black (SB)) on three different metal surfaces. The conventional techniques showed little to no evidence of fingermarks being present on the metal surfaces after a few days. However, ToF-SIMS revealed fingermarks on the same and similar substrates with an exceptional level of detail. The ToF-SIMS images demonstrated clear ridge definition as well as detail about sweat pore position and shape. All structures were found to persist for over 26?days after deposition when the samples were stored under ambient conditions.  相似文献   
267.
Although eyewitness memory and identification have captured substantial research interest in the past decades, an understanding of the types and prevalence of errors typically made by eyewitnesses is lacking. The purpose of the present research was to begin the development of a taxonomy of eyewitness error, employing standardized stimuli and established techniques. Respondents were exposed to a crime scene modeled on SWAT-training scenarios for systematically varied exposure times, and were then asked to describe what they had seen. The stimuli and questions employed were prepared with the aid of senior police field training officers. As anticipated, eyewitness performance in general was subject to a variety of inaccuracies. Physical errors, such as mistakes in the clothing or physical characteristics of the perpetrator, or in details of the environmental context, predominated. However, other less-expected errors were also observed: in relatively low numbers of cases, witnesses inferred emotional states or intent on the part of the perpetrator or victim. Some contributed wholly artificial backstories, reported the future actions of the perpetrator or victim as memories, or even inserted themselves into the scene. The pattern of results was shown to interact with exposure time, gender of the perpetrator, and the presence or absence of weapons in the scene. The results of this study are consistent with reconfigurative theory dating to Bartlett (1932), with subsequent research, and with more recent work under the aegis of Gestalt/Feature-Intensive Processing theory. These findings provide information on types and prevalence of eyewitness error which should prove useful in investigative and courtroom settings.  相似文献   
268.
269.
Rising inequality and pro-affluent housing policy have led affluent Americans to become increasingly isolated into neighborhoods that only they are able to afford. I use an under-utilized and unusually large dataset to measure the effects of this isolation on affluent Americans’ perception of social conditions, including crime, healthcare accessibility, joblessness, and public school quality. I find that the affluent form perceptions of such social conditions by extrapolating from the conditions that exist in their own neighborhoods. When these neighborhoods are predominately affluent, offering little hint of the problems faced by the lower classes, the affluent take on perceptions of social conditions that are significantly more positive than the perceptions of everyone else in society. By leading politically and economically powerful affluent Americans to develop the false sense that others’ lives are as problem-free as their own, class isolation may imperil the prospects for improving social conditions in the United States.  相似文献   
270.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号