首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7333篇
  免费   235篇
各国政治   344篇
工人农民   283篇
世界政治   623篇
外交国际关系   351篇
法律   4318篇
中国共产党   1篇
中国政治   66篇
政治理论   1543篇
综合类   39篇
  2023年   44篇
  2021年   56篇
  2020年   116篇
  2019年   170篇
  2018年   202篇
  2017年   199篇
  2016年   193篇
  2015年   124篇
  2014年   194篇
  2013年   819篇
  2012年   204篇
  2011年   217篇
  2010年   175篇
  2009年   210篇
  2008年   231篇
  2007年   214篇
  2006年   200篇
  2005年   187篇
  2004年   212篇
  2003年   168篇
  2002年   144篇
  2001年   345篇
  2000年   308篇
  1999年   212篇
  1998年   98篇
  1997年   97篇
  1996年   66篇
  1995年   78篇
  1994年   54篇
  1993年   54篇
  1992年   132篇
  1991年   149篇
  1990年   145篇
  1989年   136篇
  1988年   121篇
  1987年   131篇
  1986年   113篇
  1985年   105篇
  1984年   102篇
  1983年   89篇
  1982年   63篇
  1981年   77篇
  1980年   37篇
  1979年   77篇
  1978年   45篇
  1975年   38篇
  1974年   51篇
  1973年   59篇
  1972年   39篇
  1971年   35篇
排序方式: 共有7568条查询结果,搜索用时 15 毫秒
71.
72.
Using merged administrative data from welfare reform evaluations in three states, we estimate the effects of child care subsidy use on the length of time it takes for a welfare applicant to move into substantial employment. Findings show that the use of a child care subsidy during an unemployed or marginally employed spell of welfare receipt is associated with between a 0.6 and 1.7 quarter (or 11% to 34%) reduction in the time to substantial employment in two of the three state samples. The positive influence of subsidy use on transitions to substantial employment is strongest for those welfare applicants with the lowest earnings who are mixing welfare and work prior to subsidy receipt.  相似文献   
73.
Telecommunications regulation has experienced a fundamentalshift from rate regulation to increased reliance on compelledaccess, perhaps best exemplified by the Telecommunications Actof 1996's imposition of no fewer than four new access requirements.Unfortunately, each access requirement is governed by a separateset of rules for determining both the scope and the price ofaccess. The resulting ad hoc regime has created difficult definitionalproblems and opportunities for regulatory arbitrage. In thisarticle we propose a system inspired by the discipline of mathematicsknown as graph theory that integrates all of the different formsof access into a single analytical framework. This system separatesdifferent access regimes into five categories: (1) retail access,(2) wholesale access, (3) interconnection access, (4) platformaccess, and (5) unbundled access. It also provides insightsinto how each type of access complicates the already difficultproblems of network configuration and management and introducesinefficient biases into decisions about network capacity anddesign. The approach we propose also provides insights intothe transaction cost implications of the different types ofaccess. Drawing on the Coasean theory of the firm, our approachexamines the tradeoffs between internal governance costs andthe external transaction costs of providing access to offera theory of network boundaries. This framework shows how accessregulation distorts networks' natural boundaries and providesa basis for evaluating whether private ordering through marketswould lead to more efficient network design.  相似文献   
74.
Assessment of competency for execution presents two compelling ethical questions for mental health professionals: whether clinicians can ethically provide such assessment, and if so, how it should be done in order to maximize quality and minimize ethical conflict. In this article we address the issue of whether to participate and, if so, how. The question of whether to participate is discussed by summarizing the arguments for and against participation and offering guidelines for making a decision. The question of how to proceed is discussed in two contexts: preadjudication (before a formal decision about competency) and postadjudication (following a determination of "incompetent" and transfer of the offender to another facility for treatment and further assessment). Finally, recommendations are made regarding research that would improve the quality of execution competency assessments.  相似文献   
75.
76.
77.
78.
A 1990 report prepared by the Office of Inspector General estimated that as much as $1 billion is lost to the Medicare program annually because (i) secondary payor situations are not detected and (ii) insurance companies often do not pay when they are required to be the primary payors. Office of Inspector General, No. A-09-98-00151, April 1990, Medicare and Medicaid Guide (CCH) [symbol: see text] 39,112, at 25,649. In order to better enforce the MSP provisions, suggestions have been made at the Congressional level to impose sanctions against providers who demonstrate a pattern of inappropriate billing practices such as double billing, repeated failures to screen beneficiaries for other insurance coverage, and the repeated submission to Medicare of bills that should be submitted to another payor. (See the Subcommittee Report on erroneous payments under the MSP program, supra.) Although authority for such sanctions has yet to be adopted, given the fiscal problems currently plaguing the federal government, providers can expect increased enforcement of the MSP provisions as a means of reducing Medicare costs, and should review their screening and billing practices accordingly.  相似文献   
79.
Recent theory views adolescent behavior as nested in an ongoing system of family relationships. In keeping with this focus, differences in family functioning of high vs. low identity achievement youth were examined and variables to account for differing identity levels were explored. However, the hypothesized relationship (Circumplex Model) between family type and communication was also examined. Subjects were 411 male students, 18–24 years of age, belonging to intact nuclear middle-class homes, who resided with parents in urban areas. Measures used were the Identity Achievement Scale, Family Adaptability and Cohesion Evaluation Scale, and the Parent-Adolescent Communication Scale. Results supported an association between balanced family type and effective communication (p.001). Significant differences in the family types were found (p.001), with high identity subjects belonging to balanced families, experiencing more openness (p.01) and less problems (p.01) in communicating with parents. Openness with father, mother, and problems with father emerged as significant discriminants. There are important implications for counselling and therapy with youth, placing family at the center of the psychosocial milieu influencing their development.Received Ph.D. from H.P. University. Research interests: adolescent psychosocial development, youth, identity, and family influences.Received M.A.; Ph.D. from Boston University; Panjab University. Research interests: family interiors, women studies, life stress, self image (DAP), sexuality, myths, holistic healing, and tribal women.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号