全文获取类型
收费全文 | 855篇 |
免费 | 9篇 |
专业分类
各国政治 | 12篇 |
工人农民 | 17篇 |
世界政治 | 10篇 |
外交国际关系 | 505篇 |
法律 | 228篇 |
中国政治 | 9篇 |
政治理论 | 77篇 |
综合类 | 6篇 |
出版年
2023年 | 1篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 2篇 |
2018年 | 9篇 |
2017年 | 6篇 |
2016年 | 9篇 |
2015年 | 5篇 |
2014年 | 43篇 |
2013年 | 77篇 |
2012年 | 62篇 |
2011年 | 98篇 |
2010年 | 61篇 |
2009年 | 75篇 |
2008年 | 69篇 |
2007年 | 53篇 |
2006年 | 40篇 |
2005年 | 43篇 |
2004年 | 56篇 |
2003年 | 51篇 |
2002年 | 43篇 |
2001年 | 1篇 |
2000年 | 6篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1972年 | 2篇 |
1969年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有864条查询结果,搜索用时 15 毫秒
801.
Andrew R. Wilson Author Vitae 《Orbis》2008,52(2):358-371
This article proposes three lesson plans for teaching Asian military history to High School students. Each case study—Sun Tzu's Art of War, the Mongols, and the Rise and Fall of Imperial Japan—is structured around a primary source in translation and is designed to highlight the depth and diversity of the Asian experience with war. They allow us to see the East as more than a venue for the West's wars and also to appreciate the array of indigenous military and strategic cultures that have arisen and competed in Asia over the last three millennia. 相似文献
802.
803.
This paper aims to provide an analysis of the current regulatory environment, at the federal level, of privacy protection concerning biometrics in Australia. The study only focuses on the federal Privacy Act 1988 (Cth) and the Biometrics Institute Privacy Code. The discussion is based on the legal concerns of the use of biometrics, and an analysis is made concerning the implications of privacy protection sources. 相似文献
804.
Robert Svensson Author Vitae Dietrich Oberwittler Author Vitae 《Journal of criminal justice》2010,38(5):1006
This study examines whether having delinquent friends interacts with other peer-related variables in the explanation of adolescent offending. We hypothesise that the relationship between delinquent friends and offending might be conditioned by the effect of (1) how much time they spend with their friends, (2) how much time they spend in unstructured routine activities and (3) their emotional relationship with their friends. To test these three hypotheses we use data from two independent samples of young adolescents in Halmstad, Sweden (N = 1,003) and in Cologne and Freiburg, Germany (N = 955). The results found strong support that the effect of delinquent friends on adolescent offending is conditional on the level of time they spend in unstructured routine activities. This indicates that delinquent friends have a stronger effect on offending for adolescents who often spend their free time in unstructured routine activities. 相似文献
805.
Sarah L. Lathrop D.V.M. Ph.D. Wayland L. Davis B.I.S. Kurt B. Nolte M.D. 《Journal of forensic sciences》2009,54(1):207-211
Abstract: Medical examiner and coroner reports are a rich source of data for epidemiologic research. To maximize the utility of this information, medicolegal death investigation data need to be electronically coded. In order to determine the best option for coding, we evaluated four different options (Current Procedural Terminology [CPT], International Classification of Disease [ICD] coding, Systematized Nomenclature of Medicine Clinical Terms [SNOMED CT], and an in‐house system), then conducted internal and external needs assessments to determine which system best met the needs of a centralized, statewide medical examiner’s office. Although all four systems offer distinct advantages and disadvantages, SNOMED CT is the most accurate for coding pathologic diagnoses, with ICD‐10 the best option for classifying the cause of death. For New Mexico’s Office of the Medical Investigator, the most feasible coding option is an upgrade of an in‐house coding system, followed by linkage to ICD codes for cause of death from the New Mexico Bureau of Vital Records and Health Statistics, and ideally, SNOMED classification of pathologic diagnoses. 相似文献
806.
Michael DizonAuthor VitaeHelen KemmittAuthor Vitae Joanne PairmanAuthor VitaeNick WlochAuthor Vitae 《Computer Law & Security Report》2009,25(3):288-291
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links 相似文献
807.
In Bilski v. Doll, the U.S. Supreme Court is called to define one of the categories of patent-eligible subject matter, “process” patents. In 2008, the Court of Appeals for the Federal Circuit held that the category has a narrow meaning, and that to be eligible for a process patent under 35 U.S.C. § 101, the invention must involve a machine or apparatus or involve a transformation to a different state or thing, ultimately rejecting the patent application as unpatentable subject matter. The patent applicants have asked the U.S. Supreme Court to determine two issues: first, the meaning of “process” in 35 U.S.C. § 101 and whether the lower court properly relied on a “machine-or-transformation” test, and second, the test's potential conflict with 35 U.S.C. § 273, which provides protection for “method[s] of doing or conducting business.” The Court's decision could change the way that research and business are done, and patent protection for such investments. Parts 1 and 2 of this article address Bilski directly and what is and is not in dispute. Part 3 addresses the “machine-or-transformation” test, while Parts 4 and 5 address reasons not to adopt such a test. 相似文献
808.
Daniel Le MétayerAuthor VitaeShara MonteleoneAuthor Vitae 《Computer Law & Security Report》2009,25(2):136-144
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists. 相似文献
809.
解决海事纠纷常见方式是提交法院或通过仲裁途径 ,但实际上还存在另一种解决方式—— ADR方式。本文首先介绍了 ADR的概念并阐述了 ADR在海事案件中的优点 ,然后通过介绍具体案例解释 ADR在海事案件中的应用过程 ,最后展望了 ADR在以后国际商事中的发展趋势 相似文献
810.
Although the framework for protection of computer programs has been established in the European Union more than two decades ago, it has not undergone any major changes. Opinions of Advocate General Yves Bot have convinced the Court to advance the concept of the plurality of copyright regimes applicable to software: source code, object code and documentation would be protected under the Software Directive, whereas interfaces, programming languages, data formats and software manuals are dealt with as literary works under the InfoSoc Directive. In SAS Institute v WPL, the Court also ruled that copyright in a computer program cannot be infringed where the lawful acquirer of the license neither decompiled the object code nor copied the source code of the computer program, but merely studied, observed and tested that program in order to reproduce its functionality in a second program. This ruling paves the way and acknowledges the reverse engineering efforts on the Old Continent. 相似文献