首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   959篇
  免费   47篇
各国政治   37篇
工人农民   60篇
世界政治   70篇
外交国际关系   55篇
法律   487篇
中国政治   15篇
政治理论   272篇
综合类   10篇
  2023年   11篇
  2022年   6篇
  2021年   14篇
  2020年   33篇
  2019年   23篇
  2018年   37篇
  2017年   42篇
  2016年   50篇
  2015年   35篇
  2014年   43篇
  2013年   134篇
  2012年   35篇
  2011年   23篇
  2010年   30篇
  2009年   43篇
  2008年   37篇
  2007年   53篇
  2006年   36篇
  2005年   43篇
  2004年   24篇
  2003年   35篇
  2002年   23篇
  2001年   17篇
  2000年   17篇
  1999年   13篇
  1998年   15篇
  1997年   9篇
  1996年   7篇
  1995年   10篇
  1994年   8篇
  1993年   6篇
  1992年   10篇
  1991年   5篇
  1990年   4篇
  1989年   5篇
  1988年   9篇
  1986年   5篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1982年   7篇
  1981年   8篇
  1980年   2篇
  1979年   6篇
  1978年   2篇
  1977年   7篇
  1976年   2篇
  1975年   2篇
  1970年   3篇
  1968年   2篇
排序方式: 共有1006条查询结果,搜索用时 15 毫秒
251.
252.
In the years before and during the Second World War, the Roosevelt Administration played an important and often overlooked role in encouraging Britain's disengagement from the Indian subcontinent. Roosevelt's motivations in pressing for Indian independence were varied. They included a mix of principled opposition to colonialism, practical concern for the outcome of the war and pragmatic jockeying for influence with post-colonial nations when the war was won. Churchill's government was wary of being pushed by Washington to move more quickly to “quit India” than it thought prudent. U.S. policy and actions clearly influenced the direction of events toward independence, but U.S. caution as the war ground on led to disillusionment among nationalist leaders. This reaction would have consequences once swaraj was won and India came into its own, at a time when the Cold War was becoming the dominant factor in America's view of the world.  相似文献   
253.
Given the crucial role unauthorized disclosures can play in uncovering grave government wrongdoing, it makes sense to search for a defense of justified cases of what I call “classified public whistleblowing.” The question that concerns me is what form such a defense should take. The main claim will be a negative one, namely, that a defense of whistleblowing cannot be based on individual rights, be they legal or moral, though this is indeed the most commonly proposed defense. In closing, I will outline a more appealing alternative, namely, a justification defense.  相似文献   
254.
255.
The field of firearms and toolmark analysis has encountered deep scrutiny of late, stemming from a handful of voices, primarily in the law and statistical communities. While strong scrutiny is a healthy and necessary part of any scientific endeavor, much of the current criticism leveled at firearm and toolmark analysis is, at best, misinformed and, at worst, punditry. One of the most persistent criticisms stems from the view that as the field lacks quantified random match probability data (or at least a firm statistical model) with which to calculate the probability of a false match, all expert testimony concerning firearm and toolmark identification or source attribution is unreliable and should be ruled inadmissible. However, this critique does not stem from the hard work of actually obtaining data and performing the scientific research required to support or reject current findings in the literature. Although there are sound reasons (described herein) why there is currently no unifying probabilistic model for the comparison of striated and impressed toolmarks as there is in the field of forensic DNA profiling, much statistical research has been, and continues to be, done to aid the criminal justice system. This research has thus far shown that error rate estimates for the field are very low, especially when compared to other forms of judicial error. The first purpose of this paper is to point out the logical fallacies in the arguments of a small group of pundits, who advocate a particular viewpoint but cloak it as fact and research. The second purpose is to give a balanced review of the literature regarding random match probability models and statistical applications that have been carried out in forensic firearm and toolmark analysis.  相似文献   
256.
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis.  相似文献   
257.
258.
259.
The International Energy Agency has reported that, in 2007, fossil fuels were the source of 66% of global energy production, while the Intergovernmental Panel on Climate Change has found that 60% of all anthropogenic greenhouse gas emissions in 2004 were carbon dioxide emissions from the stationary energy sector. This article relies on recent case law in Australia to assess the extent to which the precautionary principle is a relevant consideration for development consent authorities determining applications for energy-generation facilities, including coal-fired power stations, coal mines, wind farms and uranium mines. What emerges is that there is really no certainty that the precautionary principle will be applied consistently by Australian courts to determine the legal responsibilities of decision makers assessing energy projects. In this sense, the precautionary principle has taken a thrill ride on the roller coaster of energy and climate law in Australia .  相似文献   
260.
In this study, we investigated developmental and cross-situational differences in strategies adolescents use to cope with family, school, and peer stressors. We also examined the relation between adolescents' use of coping strategies and two indices of adjustment (self perceptions of their adjustment as a result of coping with the specific stressor and state anxiety). The sample included 148 seventh graders, 124 ninth graders, and 103 twelfth graders (n = 375). Approach coping increased across the three grade levels, especially in relation to family and peer stressors. Adolescents used more avoidance than approach coping strategies for family stressors, and more approach than avoidance strategies for school and peer stressors. Across stressors, approach coping predicted more favorable outcomes and avoidance coping predicted less favorable outcomes. Coping strategies in response to a specific stressor were more strongly predictive of stressor-specific adjustment than state anxiety, suggesting the need to include both stressor-specific and global measures of adjustment in assessing the relation between coping and adjustment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号