首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   423篇
  免费   17篇
各国政治   22篇
工人农民   14篇
世界政治   44篇
外交国际关系   27篇
法律   194篇
中国政治   3篇
政治理论   130篇
综合类   6篇
  2021年   3篇
  2019年   6篇
  2018年   12篇
  2017年   12篇
  2016年   17篇
  2015年   16篇
  2014年   12篇
  2013年   62篇
  2012年   7篇
  2011年   9篇
  2010年   10篇
  2009年   22篇
  2008年   18篇
  2007年   18篇
  2006年   9篇
  2005年   10篇
  2004年   6篇
  2003年   10篇
  2002年   15篇
  2001年   10篇
  2000年   5篇
  1999年   3篇
  1998年   5篇
  1997年   5篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   4篇
  1992年   5篇
  1991年   9篇
  1990年   5篇
  1989年   7篇
  1988年   7篇
  1987年   7篇
  1986年   4篇
  1985年   5篇
  1984年   8篇
  1983年   5篇
  1982年   7篇
  1979年   2篇
  1978年   2篇
  1976年   2篇
  1975年   3篇
  1974年   4篇
  1972年   6篇
  1971年   2篇
  1967年   2篇
  1966年   3篇
  1965年   3篇
  1964年   2篇
排序方式: 共有440条查询结果,搜索用时 31 毫秒
251.
252.
253.
254.
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users—and their businesses—to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research.  相似文献   
255.
The fate of coal combustion residuals (CCRs) in North Carolina and the rest of the United States is noteworthy, particularly in light of the recent spills in Eden, North Carolina, and Kingston, Tennessee. The safe storage of coal combustion residuals should be a priority of the state and the federal government, in order to protect the drinking water of citizens from contaminants, like arsenic, lead, cadmium, selenium, and mercury.11 “Coal Ash: The Toxic Threat to Our Health and Environment,” Physicians for Social Responsibility and EarthJustice, http://www.psr.org/assets/pdfs/coal-ash.pdf (accessed September 19, 2015).View all notes Recently, North Carolina has taken steps with the passage of Senate Bill 729, entitled Coal Ash Management Act, and other legislation in order to promote safe storage of CCRs through a capped landfill system, complete with synthetic liners and leachate collection system. This article highlights not only the legislative enactments surrounding the disposal of coal ash in North Carolina, but also the effectiveness of such practices, both in North Carolina and the greater United States as a whole.  相似文献   
256.
Workers’ compensation systems represent naturalistic settings that often are perceived as unjust by the injured workers for which such systems were developed. This study examined the role of dissatisfaction with medical care and employer treatment on disability outcomes among a cohort of workers who had sustained low back injuries. A race-stratified sample of 358 workers (171 African-Americans, 203 Caucasians) with first incident low back pain was evaluated 21 months and again at 72 months after claim settlement. Evaluation included data related to demographics, socioeconomic factors, injury severity, claim settlement, satisfaction with workers’ compensation (WC) processes, and disability status. Multinomial logistic regression analysis was used to predict disability status (no disability vs. early disability vs. late disability) at each of the two time points. Analyses revealed contributions of multiple variables to early disability, including unique variance related to dissatisfaction with medical care and treatment by the employer. At 72 months, only demographic factors (age, race) and the receipt of temporary total disability (TTD) after injury predicted late disability. Results are discussed relative to the contribution of injustice perceptions and systemic factors; directions for future research are proposed.  相似文献   
257.
Political Behavior - Policy feedbacks take place when public policies change mass participation and mobilize key constituencies. This can influence future rounds of policymaking and solidify...  相似文献   
258.
Geloso  Vincent  March  Raymond J. 《Public Choice》2021,187(3-4):375-401
Public Choice - Recent studies indicate that the ideological stances of government parties no are longer associated with differences in total government spending. At the same time, we observe that...  相似文献   
259.
Advances in information and communication technologies (ICT) have had, and will continue to have, wide-ranging influences on how the banking and finance industry operates. Making payments and transmitting money electronically or online are increasingly popular. An increased dependence on global electronic payment systems and the ability to move large amounts of money expeditiously across different jurisdiction, however, expose both payment processing companies and consumers to an evolving spectrum of threats such as fraud and money laundering. This article considers ways in which prepaid cards can be exploited by organised criminals and terrorists to launder their illicit proceeds of crime, and to transfer money anonymously and instantaneously over the globe for use by terrorist organisations. Risks identified in this article include recruiting card mules (e.g. international students) to purchase prepaid cards, and the mailing or shipping of prepaid cards out of the country without regulators being aware. To minimise risks of abuse by organised criminals and terrorists, legislation will need to adapt to deal with threats that organised criminals and terrorists seek to exploit. Future directions for research in relation to prepaid cards are also identified.
Kim-Kwang Raymond ChooEmail:
  相似文献   
260.
Abstract:  The inclusion of radio-frequency identification (RFID)-tags within dental prostheses has been suggested as means of effectively labeling such devices and permitting rapid and reliable identification of the wearer. Previous studies have suggested that patients will accept denture labeling and recognize the need for such systems. However, they demand systems that are aesthetic, durable, and secure. One concern over the use of RFID-tags is that they could be scanned by third parties without the patient's knowledge. This study categorizes the scanning patterns of RFID-tags both in vitro and in vivo to provide data for patients for the consent process and for forensic dentists to ensure that they are scanning prostheses optimally. The results demonstrate that the RFID chips can only be read when the interrogator is in close proximity to the denture and thus should alleviate any concerns over privacy issues. However, evidence obtained from both the literature and experiments suggests that authorities must agree upon a unified standard for chip and reader specifications and protocols in order to avoid cases in which RFID-tags may fail to be read by an incompatible reader.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号