全文获取类型
收费全文 | 255篇 |
免费 | 22篇 |
专业分类
各国政治 | 13篇 |
工人农民 | 15篇 |
世界政治 | 19篇 |
外交国际关系 | 21篇 |
法律 | 104篇 |
中国政治 | 11篇 |
政治理论 | 91篇 |
综合类 | 3篇 |
出版年
2023年 | 5篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 9篇 |
2019年 | 11篇 |
2018年 | 17篇 |
2017年 | 16篇 |
2016年 | 20篇 |
2015年 | 18篇 |
2014年 | 9篇 |
2013年 | 37篇 |
2012年 | 4篇 |
2011年 | 8篇 |
2010年 | 13篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 8篇 |
2006年 | 11篇 |
2005年 | 2篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1969年 | 2篇 |
1968年 | 1篇 |
1967年 | 1篇 |
1966年 | 2篇 |
排序方式: 共有277条查询结果,搜索用时 78 毫秒
251.
252.
253.
254.
Aaron Zelinsky 《Terrorism and Political Violence》2013,25(2):327-336
Existing typological frameworks do not adequately categorize terrorist groups by their operational characteristics. We propose a new framework which compares terrorist groups to business firms. In our framework, terrorist groups are mapped on two axes: centralization of resources and centralization of operations. We separate terrorist groups into four typologies echoing familiar business arrangements: Hierarchy, Venture Capital, Franchise, and Brand. Responses to each typology are briefly sketched out. We conclude by analyzing the changes in Al Qaeda over the last two decades in the context of our framework. We close by proposing appropriate policy responses to combat Al Qaeda in light of its current Brand typology. 相似文献
255.
Aaron A.Vessup 《北京周报(英文版)》2013,56(36):48
Can too much of anything good be dangerous to your health,like the legendary"Midas Touch"for example?Today people often debate whether or not too much gold or money hurt people physically.How about too much beer?Can one ever play too much badminton or tennis?Take your pick the facts of the matter are any one of the above mentioned can lead one into a strange realm of the outer limits of mental or physical pain.Then of course comes the question of remedies,what can one do?Most teachers become familiar with problems such as sore throats from 相似文献
256.
257.
258.
Forensic entomologists use size and developmental stage to estimate blow fly age, and from those, a postmortem interval. Since such estimates are generally accurate but often lack precision, particularly in the older developmental stages, alternative aging methods would be advantageous. Presented here is a means of incorporating developmentally regulated gene expression levels into traditional stage and size data, with a goal of more precisely estimating developmental age of immature Lucilia sericata. Generalized additive models of development showed improved statistical support compared to models that did not include gene expression data, resulting in an increase in estimate precision, especially for postfeeding third instars and pupae. The models were then used to make blind estimates of development for 86 immature L. sericata raised on rat carcasses. Overall, inclusion of gene expression data resulted in increased precision in aging blow flies. 相似文献
259.
In this study, self-report student surveys on early childhood maltreatment, attachment styles, alcohol expectancies, and narcissistic personality traits are examined to determine their influence on stalking behavior. Two subtypes of stalking were measured using Spitzberg and Cupach's (2008) Obsessive Relational Intrusion: cyber stalking (one scale) and overt stalking (comprised of all remaining scales). As t tests indicated that men and women differed significantly on several variables, OLS regression models were run separately for men (N = 807) and women (N = 934). Results indicated that childhood sexual maltreatment predicted both forms of stalking for men and women. For men, narcissistic vulnerability and its interaction with sexual abuse predicted stalking behavior (overt stalking R2 = 16% and cyber stalking R2 = 11%). For women, insecure attachment (for both types of stalking) and alcohol expectancies (for cyber stalking) predicted stalking behavior (overt stalking R2 = 4% and cyber stalking R2 = 9%). We discuss the methodological and policy implications of these findings. 相似文献
260.