首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   255篇
  免费   22篇
各国政治   13篇
工人农民   15篇
世界政治   19篇
外交国际关系   21篇
法律   104篇
中国政治   11篇
政治理论   91篇
综合类   3篇
  2023年   5篇
  2022年   2篇
  2021年   2篇
  2020年   9篇
  2019年   11篇
  2018年   17篇
  2017年   16篇
  2016年   20篇
  2015年   18篇
  2014年   9篇
  2013年   37篇
  2012年   4篇
  2011年   8篇
  2010年   13篇
  2009年   7篇
  2008年   10篇
  2007年   8篇
  2006年   11篇
  2005年   2篇
  2003年   3篇
  2002年   7篇
  2001年   3篇
  2000年   1篇
  1998年   2篇
  1997年   1篇
  1996年   3篇
  1995年   3篇
  1994年   3篇
  1993年   4篇
  1992年   2篇
  1991年   4篇
  1989年   3篇
  1988年   1篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   2篇
  1975年   2篇
  1973年   2篇
  1969年   2篇
  1968年   1篇
  1967年   1篇
  1966年   2篇
排序方式: 共有277条查询结果,搜索用时 78 毫秒
251.
252.
253.
254.
Existing typological frameworks do not adequately categorize terrorist groups by their operational characteristics. We propose a new framework which compares terrorist groups to business firms. In our framework, terrorist groups are mapped on two axes: centralization of resources and centralization of operations. We separate terrorist groups into four typologies echoing familiar business arrangements: Hierarchy, Venture Capital, Franchise, and Brand. Responses to each typology are briefly sketched out. We conclude by analyzing the changes in Al Qaeda over the last two decades in the context of our framework. We close by proposing appropriate policy responses to combat Al Qaeda in light of its current Brand typology.  相似文献   
255.
Can too much of anything good be dangerous to your health,like the legendary"Midas Touch"for example?Today people often debate whether or not too much gold or money hurt people physically.How about too much beer?Can one ever play too much badminton or tennis?Take your pick the facts of the matter are any one of the above mentioned can lead one into a strange realm of the outer limits of mental or physical pain.Then of course comes the question of remedies,what can one do?Most teachers become familiar with problems such as sore throats from  相似文献   
256.
在分析美国对中国知识产权盗版认知存在差距的基础上,阐述了美国对中国知识产权盗版不符合实际情况的指责。重点从电影盗版给MPA会员公司造成的收入损失及其人均值、电影盗版给MPA会员公司造成的消费者支出损失及其人均值、音乐盗版的零售额及其人均值等讨论各国盗版状况,旨在说明对中国盗版认知存在差距的理由。  相似文献   
257.
258.
Forensic entomologists use size and developmental stage to estimate blow fly age, and from those, a postmortem interval. Since such estimates are generally accurate but often lack precision, particularly in the older developmental stages, alternative aging methods would be advantageous. Presented here is a means of incorporating developmentally regulated gene expression levels into traditional stage and size data, with a goal of more precisely estimating developmental age of immature Lucilia sericata. Generalized additive models of development showed improved statistical support compared to models that did not include gene expression data, resulting in an increase in estimate precision, especially for postfeeding third instars and pupae. The models were then used to make blind estimates of development for 86 immature L. sericata raised on rat carcasses. Overall, inclusion of gene expression data resulted in increased precision in aging blow flies.  相似文献   
259.
In this study, self-report student surveys on early childhood maltreatment, attachment styles, alcohol expectancies, and narcissistic personality traits are examined to determine their influence on stalking behavior. Two subtypes of stalking were measured using Spitzberg and Cupach's (2008) Obsessive Relational Intrusion: cyber stalking (one scale) and overt stalking (comprised of all remaining scales). As t tests indicated that men and women differed significantly on several variables, OLS regression models were run separately for men (N = 807) and women (N = 934). Results indicated that childhood sexual maltreatment predicted both forms of stalking for men and women. For men, narcissistic vulnerability and its interaction with sexual abuse predicted stalking behavior (overt stalking R2 = 16% and cyber stalking R2 = 11%). For women, insecure attachment (for both types of stalking) and alcohol expectancies (for cyber stalking) predicted stalking behavior (overt stalking R2 = 4% and cyber stalking R2 = 9%). We discuss the methodological and policy implications of these findings.  相似文献   
260.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号