首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   494篇
  免费   30篇
各国政治   16篇
工人农民   79篇
世界政治   45篇
外交国际关系   29篇
法律   231篇
中国政治   1篇
政治理论   122篇
综合类   1篇
  2022年   2篇
  2021年   4篇
  2020年   9篇
  2019年   22篇
  2018年   17篇
  2017年   25篇
  2016年   25篇
  2015年   13篇
  2014年   20篇
  2013年   93篇
  2012年   18篇
  2011年   20篇
  2010年   19篇
  2009年   10篇
  2008年   13篇
  2007年   9篇
  2006年   16篇
  2005年   23篇
  2004年   15篇
  2003年   22篇
  2002年   17篇
  2001年   6篇
  2000年   5篇
  1999年   12篇
  1997年   7篇
  1996年   8篇
  1995年   4篇
  1993年   5篇
  1992年   2篇
  1990年   2篇
  1988年   2篇
  1987年   6篇
  1986年   4篇
  1985年   4篇
  1983年   3篇
  1982年   4篇
  1981年   4篇
  1980年   2篇
  1979年   4篇
  1978年   3篇
  1977年   3篇
  1976年   3篇
  1975年   2篇
  1974年   2篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
  1969年   2篇
  1968年   3篇
  1967年   2篇
排序方式: 共有524条查询结果,搜索用时 15 毫秒
471.
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. Additional commentary is also provided in relation to a few select areas of particular interest. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
472.
Digital devices now play an important role in the lives of many in society. Whilst they are used predominantly for legitimate purposes, instances of digital crime are witnessed, where determining their usage is important to any criminal investigation. Typically, when determining who has used a digital device, digital forensic analysis is utilised, however, biological trace evidence or fingerprints residing on its surfaces may also be of value. This work provides a preliminary study which examines the potential for fingerprint recovery from computer peripherals, namely keyboards and mice. Our implementation methodology is outlined, and results discussed which indicate that print recovery is possible. Findings are intended to support those operating at-scene in an evidence collection capacity.  相似文献   
473.
474.
North American scholarship has charted resonances between 1990s legislative and feminist discourse concerning violence against women. Feminist critique of official discourse surrounding the Protection from Harassment Act 1997 suggests that 1990s resonances did not reach the UK: however, an examination of the Hansard debates suggests this under-estimates the influence of feminist discourse. Halley’s discussion of “bad faith” helps to explain both the tendency of feminists to under-estimate their influence and why this matters. A commitment to an understanding of themselves as powerless may encourage feminists to underplay similarities between feminist and official discourse, leading feminists to find only what they expect. Such an understanding gives feminism the capacity to change social life without acknowledging, let alone agonising over, the full range of its distributive effects. This is most troubling in relation to “carceral” feminism, since under-assessment of feminist impact encourages amplification and intensification of the carceral message.  相似文献   
475.
For all governments, the principle of how and whether policies are implemented as intended is fundamental. The aim of this paper is to examine the difficulties for governments in delivering policy goals when they do not directly control the processes of implementation. This paper examines two case studies – anti-social behaviour and street crime – and demonstrates the difficulties faced by policy-makers in translating policy into practice when the policy problems are complex and implementation involves many actors.  相似文献   
476.
477.
478.
The shipping industry is among the most globalized of all industries and is characterized by complex modular supply chains, including a largely outsourced labor force of “just‐in‐time” casualized workers from developing countries and the transitional East European states. Despite long‐standing efforts by international bodies to standardize and regulate the education and training of seafarers, variations in practices and standards persist. Employers exercise contradictory influences on education and training providers, on the one hand demanding the urgent provision of more recruits (encouraging corner‐cutting), and on the other complaining about the poor quality of recruits received (urging crackdowns on poor quality providers and more rigorous examinations) – the training double bind. This paper reflects on these issues through the study of the problematic use of computerized assessments in seafarer examinations, drawing upon findings from a study involving research in six different case study countries providing maritime labor and interviews with stakeholders.  相似文献   
479.
480.
Both the federal and state governments have strong constitutional daims and political resources with which to influence the allocation of water resources. Until the 1970s. federal agencies were able to dominate kr setting goals and objectives. However, when the federal government attempted to implement a national water policy in the 1970s, effective opposition was mounted by the states. Both the states and the federal government now exert decisive influence in water policy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号