首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9097篇
  免费   597篇
各国政治   478篇
工人农民   295篇
世界政治   630篇
外交国际关系   369篇
法律   5926篇
中国共产党   1篇
中国政治   45篇
政治理论   1889篇
综合类   61篇
  2023年   54篇
  2021年   56篇
  2020年   225篇
  2019年   244篇
  2018年   255篇
  2017年   321篇
  2016年   309篇
  2015年   264篇
  2014年   248篇
  2013年   990篇
  2012年   239篇
  2011年   252篇
  2010年   274篇
  2009年   297篇
  2008年   248篇
  2007年   228篇
  2006年   237篇
  2005年   223篇
  2004年   244篇
  2003年   210篇
  2002年   197篇
  2001年   346篇
  2000年   286篇
  1999年   255篇
  1998年   128篇
  1997年   81篇
  1996年   92篇
  1995年   103篇
  1994年   104篇
  1993年   101篇
  1992年   164篇
  1991年   177篇
  1990年   163篇
  1989年   169篇
  1988年   133篇
  1987年   149篇
  1986年   140篇
  1985年   148篇
  1984年   114篇
  1983年   120篇
  1982年   94篇
  1981年   84篇
  1980年   69篇
  1979年   115篇
  1978年   73篇
  1977年   64篇
  1976年   52篇
  1975年   49篇
  1974年   57篇
  1973年   57篇
排序方式: 共有9694条查询结果,搜索用时 15 毫秒
71.
This article explores theoretical and empirical issues in the application of clinical neuropsychological evidence to forensic issues in the criminal law. The nature of forensic neuropsychological evaluations is discussed with reference to issues of competency to stand trial, criminal responsibility, and other competencies in the criminal process. Examples of specific disorders relevant to criminal law standards are presented, together with data estimating the prevalence of brain dysfunction in criminal and forensic populations. Research is also reviewed on the role of neuropsychological brain dysfunction in the etiology of violence and criminally relevant behavior. Finally, empirical and ethical issues concerning the applicability and admissibility of forensic neuropsychological data in the criminal context are discussed.  相似文献   
72.
Technology policies and their effect on technology transfer from defense to civilian industries in Israel from 1967 to 1995 are explored. Defense technology policy is found to drive the growth of the defense industry and to limit defense conversion to commercialization initiatives developed primarily through intra-organizational technology transfer. The case of the Israel Aircraft Industries (IAI) is presented. Also the development of national technology policy in Israel is traced and found wanting. Civilian and defense technology policies are found to be uncoordinated with each other and together are incapable of producing interorganizational technology transfer so as to significantly effect defense conversion on a wide number of economic actors particularly small firms. To achieve a socially effective defense conversion process (in which technologies are transferred from defense firms to many economic actors), the analysis suggests that a national technology policy should be designed and implemented under Prime Minister's leadership.  相似文献   
73.
74.
An important national initiative in juvenile justice is Juvenile Offender Reentry (JOR). The renewed emphasis on offender reintegration has generated significant attention to juvenile justice practices, with the notable exception of juvenile confinement facilities. Juvenile detention and, to a lesser degree, juvenile corrections practitioners are involved but not invested in reentry, having made very few programmatic changes to accommodate JOR initiatives largely because these initiatives have been external to the institution and its staff. Yet, reentry is a powerful concept for juvenile facility practitioners, and the application of reentry principles could have a profound impact on daily operations. This article addresses a range of issues about investing juvenile institutions in reentry practices. Several reentry models are discussed along with their implications for daily operations and programs.  相似文献   
75.
In the current study the objective was to find to what extent a reliable determination of age at death is made possible by establishing the degree of aspartic acid racemization in the dentin of teeth. The results of the investigation of 46 teeth are in agreement with the values found by other authors. The method presented makes a reproducible and accurate estimation of age possible. We intend to elaborate and improve this promising method for determination of age at death. The relevant points are presented here.  相似文献   
76.
Optimal Law Enforcement with a Rent-Seeking Government   总被引:1,自引:0,他引:1  
This article analyzes public and private law enforcement whenthe government is motivated by rent seeking. A rent-seekinggovernment seeks primarily to maximize revenue. The articleconcludes as follows: (1) if offenders have sufficient wealth,a rent-seeking government is more aggressive than a social-welfare-maximizinggovernment in enforcing laws against minor crimes (such as parkingviolations) but more lax in enforcing laws against major crimes;(2) competitive private enforcement is usually better and neverworse than monopolistic private enforcement; (3) The choicebetween competitive private enforcement and public enforcementdepends on which is cheaper and on the severity of the offense.  相似文献   
77.
Telecommunications regulation has experienced a fundamentalshift from rate regulation to increased reliance on compelledaccess, perhaps best exemplified by the Telecommunications Actof 1996's imposition of no fewer than four new access requirements.Unfortunately, each access requirement is governed by a separateset of rules for determining both the scope and the price ofaccess. The resulting ad hoc regime has created difficult definitionalproblems and opportunities for regulatory arbitrage. In thisarticle we propose a system inspired by the discipline of mathematicsknown as graph theory that integrates all of the different formsof access into a single analytical framework. This system separatesdifferent access regimes into five categories: (1) retail access,(2) wholesale access, (3) interconnection access, (4) platformaccess, and (5) unbundled access. It also provides insightsinto how each type of access complicates the already difficultproblems of network configuration and management and introducesinefficient biases into decisions about network capacity anddesign. The approach we propose also provides insights intothe transaction cost implications of the different types ofaccess. Drawing on the Coasean theory of the firm, our approachexamines the tradeoffs between internal governance costs andthe external transaction costs of providing access to offera theory of network boundaries. This framework shows how accessregulation distorts networks' natural boundaries and providesa basis for evaluating whether private ordering through marketswould lead to more efficient network design.  相似文献   
78.
We discuss Professor Jeffrey Church's report to the EuropeanCommission in 2004 on the effects of vertical restraints andmergers. Although thorough and accurate, the report could bemisinterpreted by practitioners, as it does not emphasize thatmarket power is only a necessary condition for harm to competition,and that most vertical mergers that present the possibilityof competitive harm also present economic efficiencies thatare intrinsic to the integration.  相似文献   
79.
公安工作的现代化,必须走科技强警之路。建立信息中心要以公安信息网建设为基础,以公安业务信息共享为目标,向科技要警力。加强信息中心建设,发挥科技强警作用。  相似文献   
80.
Two conditions must be met in order for a person to be rightly considered the victim of a crime. First, there must be the victim of some form of harm. Second, the harm in question was the direct result of an act in which the harmed individual did not knowingly consent to take part. What are the dynamics of consent and how important should consent be in defining and placing criminal responsibility in crimes where women are sexually victimized? Finally, how does the conceptualization of victimization change when viewed from liberal and radical feminist perspectives?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号