全文获取类型
收费全文 | 572篇 |
免费 | 27篇 |
专业分类
各国政治 | 71篇 |
工人农民 | 53篇 |
世界政治 | 47篇 |
外交国际关系 | 31篇 |
法律 | 197篇 |
中国政治 | 6篇 |
政治理论 | 173篇 |
综合类 | 21篇 |
出版年
2022年 | 4篇 |
2021年 | 4篇 |
2020年 | 9篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 13篇 |
2016年 | 17篇 |
2015年 | 16篇 |
2014年 | 10篇 |
2013年 | 122篇 |
2012年 | 15篇 |
2011年 | 15篇 |
2010年 | 14篇 |
2009年 | 15篇 |
2008年 | 27篇 |
2007年 | 14篇 |
2006年 | 11篇 |
2005年 | 17篇 |
2004年 | 12篇 |
2003年 | 23篇 |
2002年 | 16篇 |
2001年 | 17篇 |
2000年 | 6篇 |
1999年 | 14篇 |
1998年 | 10篇 |
1997年 | 10篇 |
1996年 | 8篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 13篇 |
1988年 | 9篇 |
1987年 | 7篇 |
1986年 | 9篇 |
1985年 | 4篇 |
1984年 | 10篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1974年 | 3篇 |
1972年 | 4篇 |
1971年 | 3篇 |
1970年 | 3篇 |
排序方式: 共有599条查询结果,搜索用时 31 毫秒
521.
Modeling the Deviant Y in Criminology: An Examination of the Assumptions of Censored Normal Regression and Potential Alternatives 总被引:1,自引:1,他引:0
Christopher J. Sullivan Jean Marie McGloin Alex R. Piquero 《Journal of Quantitative Criminology》2008,24(4):399-421
Many dependent variables of criminological interest have censored distributions. Investigations that use such variables increasingly
have turned to the Tobit model, a censored regression technique that is specified based on a latent dependent variable. When
used under suitable circumstances, this model provides appropriate estimates. This paper discusses key assumptions of the
Tobit model. It then highlights the risk of violating these assumptions and reviews alternative flexible parametric and semiparametric
modeling techniques, currently used sparingly in criminology, which researchers may find helpful when assumptions regarding
the error terms are untenable. By using an empirical example focused on sentencing outcomes and comparing estimates across
analytic methods, this study illustrates the potential utility of simultaneously estimating the Tobit model along with some
alternatives.
相似文献
Christopher J. SullivanEmail: |
522.
523.
Jean Yves Haine 《Cambridge Review of International Affairs》2003,16(3):483-509
This article will first review the essential characteristics of the old exceptionalism in US foreign policy, then compare it with the specific features of the new strategy of the Bush administration and finally address the challenges and risks that this enterprise entails. The article provides an analysis of realist and liberal critiques of the Bush administration's foreign policy in terms of both objectives and results. It concludes that the war in Iraq constituted a truly imperial moment in US history. Preventive war is a flawed strategy, which runs against US principles in world affairs and against its security interests in the current international environment. For this reason, Bush's imperial policy will not last. The author writes here in a personal capacity, and not in the name of the European Union Institute for Security Studies. 相似文献
524.
525.
526.
527.
Jean‐Marc Dinant 《International Review of Law, Computers & Technology》2004,18(2):173-183
Generally, traces of Internet communications established by a citizen's computer are routinely recorded on and dated by Internet servers in so‐called ‘log files’. As far as the correct dating of the electronic offence is crucial for the potential identification of the author, convincing traces need to be date‐ and time‐stamped by a Trusted Third Party (TTP). Such a time stamp does not give any assurance about the correctness of the data and dates collected, but only proves that the traffic data were in a given state at a given date and time. If the Internet Provider (IP) address appears to be one used by the company, it is foreseeable that the system administrator within the company will be able to identify the computer owning a particular IP address. In others cases, only law enforcement agencies, in the circumstances and the conditions required by the law, are entitled to identify, with the help of Internet Access Providers (IAPs), the communication line suspected to have been used beside a given IP address. Putting together the traces left at the IAP side and in the log files of the attacked server site may lead, in the best cases, to an identified communication terminal. Nevertheless, in many cases, this will not be a formal authentication of a wrongdoer. 相似文献
528.
Access to quality health care for victims of abuse is often limited by the attitudes of health care professionals. Data collected from female nursing students (n = 155) revealed that those students with more egalitarian sex-role beliefs and a greater sense of control over life events were more sympathetic to battered women than those students with more traditional sex-role attitudes and less perceived control. Sex-role egalitarianism was found to be the best predictor of attitudes toward victims of domestic violence. Implications for health care practitioners and policy makers are presented. 相似文献
529.
530.
VICTORIAN STATUTORY CORPORATIONS IN THE 1980s 总被引:1,自引:0,他引:1
Jean Holmes 《Australian Journal of Public Administration》1984,43(2):103-111