首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   852篇
  免费   14篇
各国政治   32篇
工人农民   38篇
世界政治   21篇
外交国际关系   462篇
法律   259篇
中国政治   2篇
政治理论   47篇
综合类   5篇
  2023年   3篇
  2022年   1篇
  2021年   2篇
  2020年   7篇
  2019年   6篇
  2018年   5篇
  2017年   9篇
  2016年   11篇
  2015年   6篇
  2014年   51篇
  2013年   96篇
  2012年   66篇
  2011年   96篇
  2010年   62篇
  2009年   79篇
  2008年   44篇
  2007年   39篇
  2006年   44篇
  2005年   41篇
  2004年   45篇
  2003年   45篇
  2002年   40篇
  2001年   9篇
  2000年   2篇
  1999年   5篇
  1998年   5篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   3篇
  1993年   1篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1988年   3篇
  1987年   2篇
  1986年   6篇
  1985年   1篇
  1982年   3篇
  1981年   3篇
  1980年   2篇
  1977年   1篇
  1972年   2篇
  1967年   1篇
  1966年   1篇
排序方式: 共有866条查询结果,搜索用时 15 毫秒
31.
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout.  相似文献   
32.
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support.  相似文献   
33.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
34.
35.
The adage that “it is always easier to fight the last war” is one that readily can be applied to the United States and its armed forces for not predicting the scale and type of operations encountered in the occupations of Iraq and Afghanistan. This article argues that the lack of preparation in the post-invasion phases arose from an institutional attachment to a preferred paradigm of warfare, as exemplified by the Persian Gulf War of 1991. This paradigm, though, has been substantially resurrected and re-configured to suit the fighting preferences of the American armed forces in its protracted encounters in Iraq and Afghanistan. Far from re-orienting its organization and mindset to meet the challenges of so-called counterinsurgency campaigns, as much current advocacy maintains, the military has reverted to the form of warfare it knows best.  相似文献   
36.
This article explores the experiences of a small number of older women who work in university departments of education. The article starts with a brief review of some of the research that documents the experiences of women who work in departments of education. The article then considers the ways in which the older woman's body has become a focus for action, suppression and, above all, a site for constant work. Women are exhorted by the mass media to be vigilant in order to combat the embodied signs of passing time and to work on the project of the (ageing) body. The article then explores some of the ways that older women in education departments may be positioned/position themselves in relation to these pressures and some of the ways in which they disrupt these discourses.  相似文献   
37.
This article builds upon Michel Foucault's fleeting observation that ‘the state consists in the codification of a whole number of power relations’ and that ‘a revolution is a different type of codification of these same relations’ (Held et al., 1983, pp. 312–3). Specifically, the article uses the case of Canada to argue that distinct state forms rest on particular meso‐discourses which inform a logic of governance, historical configurations of the public and private and gendered citizenships. The meso‐discourses of separate spheres, liberal progressivism and performativity (the logics of governance for the laissez‐faire state, the Keynesian welfare state and the neo‐liberal state, respectively) have coded and recoded gendered citizenships, thereby providing women and men with differential access to the public sphere and to citizenship claims. The neo‐liberal state's meso‐discourse of performativity is especially challenging for women and all equity‐seeking groups because it prescribes the ascendency of market relations over political negotiation or ethical considerations, as well as the attrition of social and political citizenship rights. Social citizenship is being eclipsed by market citizenship.  相似文献   
38.
39.
40.
This article outlines Chinese strategic nuclear forces and the Chinese philosophical approach to nuclear security. It then focuses on the domestic conditions in China which could precipitate vulnerabilities to its nuclear forces. From information about internal security conditions in China, specific internal threats to Chinese nuclear security will be derived. Based on these threats, several outsider and insider scenarios will be outlined involving a variety of terrorist or terrorist related behaviors. These notional scenarios will include everything from overrun or attack, to diversion, to cyber terrorism, to sabotage. The article will then cover what these scenarios and the possible Chinese reaction to them may mean for the security, military and diplomatic strategies of the United States.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号