首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   647篇
  免费   12篇
各国政治   34篇
工人农民   24篇
世界政治   53篇
外交国际关系   65篇
法律   283篇
中国政治   6篇
政治理论   192篇
综合类   2篇
  2023年   4篇
  2021年   4篇
  2020年   14篇
  2019年   9篇
  2018年   17篇
  2017年   16篇
  2016年   20篇
  2015年   11篇
  2014年   14篇
  2013年   76篇
  2012年   16篇
  2011年   17篇
  2010年   24篇
  2009年   14篇
  2008年   23篇
  2007年   24篇
  2006年   18篇
  2005年   19篇
  2004年   24篇
  2003年   25篇
  2002年   19篇
  2001年   16篇
  2000年   15篇
  1999年   12篇
  1998年   11篇
  1997年   9篇
  1996年   12篇
  1995年   14篇
  1994年   10篇
  1993年   10篇
  1992年   14篇
  1991年   10篇
  1990年   9篇
  1989年   9篇
  1988年   8篇
  1987年   8篇
  1986年   7篇
  1985年   13篇
  1984年   8篇
  1983年   5篇
  1982年   4篇
  1981年   8篇
  1980年   7篇
  1979年   5篇
  1978年   4篇
  1976年   3篇
  1975年   4篇
  1974年   4篇
  1971年   2篇
  1968年   2篇
排序方式: 共有659条查询结果,搜索用时 0 毫秒
601.
602.
603.
Sections of the cerebrum, cerebellum, and brain stem of a rugby player who died 15 hours after being tackled were stained using an immunoperoxidase technique to detect beta-amyloid protein. The sections of the pons showed axonal spheroids in the base, and those of the cerebellum showed axonal spheroids in deep white matter. The findings demonstrated axonal injury following a fall from the victim's height in a team sporting event.  相似文献   
604.
Abstract:  Within the framework of the ENFSI Expert Working Group "Firearms" a proficiency test on the detection and identification of GSR by energy-dispersive scanning electron microanalysis (SEM/EDX) is carried out in a 2 years term. The latest test was performed in 2005/2006 and was denoted as GSR2005 . Seventy-five laboratories from 28 countries participated in this proficiency test and submitted in total 83 independent data-sets. The participating laboratories were requested to determine the total number of PbSbBa containing particles on a synthetic test sample following their own laboratory specific methods of automated GSR particle search and detection by SEM/EDX. Furthermore size and position of the detected particles had to be reported by the laboratories and were evaluated statistically. The results were compiled by means of z -scores according to the IUPAC and EURACHEM guidelines—assessing individual laboratory achievements (inter-laboratory) as well as intra-laboratory performance—and were compared to the results of the previous proficiency test run GSR2003 ( 1 ). The comparison shows that there is a noticeable improvement in the method's detection capability.  相似文献   
605.
606.
607.

Objectives

Conventional statistical modeling in criminology assumes proper model specification. Very strong and unrebutted criticisms have existed for decades. Some respond that although the criticisms are correct, there is for observational data no alternative. In this paper, we provide an alternative.

Methods

We draw on work in econometrics and statistics from several decades ago, updated with the most recent thinking to provide a way to properly work with misspecified models.

Results

We show how asymptotically, unbiased regression estimates can be obtained along with valid standard errors. Conventional statistical inference can follow.

Conclusions

If one is prepared to work with explicit approximations of a “true” model, defensible analyses can be obtained. The alternative is working with models about which all of the usual criticisms hold.
  相似文献   
608.
609.
610.
Motivated by the links between terror and crime and the difficulty in directly detecting terror activity, this article formulates and solves a resource allocation problem on overlapping networks to determine if interdiction efforts may be able to take advantage of these connections. The government, knowing only the general structure and overlap of the networks, allocates its scarce resources to investigate each terror and criminal network. There are two stages to the investigation: an initial investigation of all nodes (i.e., terrorists or criminals) and a secondary investigation of criminals identified during the initial investigation to determine if they are terrorists. Applying the model to data derived from a population of terrorists in the United States between 1971–2003 suggests that the government may be able to exploit the terror connections of crimes that are relatively uncommon, somewhat easy to detect, and are attractive to terrorists.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号