首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8847篇
  免费   511篇
各国政治   556篇
工人农民   251篇
世界政治   538篇
外交国际关系   315篇
法律   6097篇
中国共产党   7篇
中国政治   44篇
政治理论   1507篇
综合类   43篇
  2021年   53篇
  2020年   193篇
  2019年   206篇
  2018年   276篇
  2017年   291篇
  2016年   313篇
  2015年   280篇
  2014年   230篇
  2013年   882篇
  2012年   221篇
  2011年   227篇
  2010年   262篇
  2009年   297篇
  2008年   256篇
  2007年   283篇
  2006年   302篇
  2005年   217篇
  2004年   235篇
  2003年   204篇
  2002年   203篇
  2001年   351篇
  2000年   297篇
  1999年   250篇
  1998年   112篇
  1997年   73篇
  1996年   76篇
  1995年   82篇
  1994年   95篇
  1993年   87篇
  1992年   155篇
  1991年   166篇
  1990年   150篇
  1989年   163篇
  1988年   131篇
  1987年   146篇
  1986年   130篇
  1985年   143篇
  1984年   103篇
  1983年   122篇
  1982年   85篇
  1981年   88篇
  1980年   56篇
  1979年   114篇
  1978年   74篇
  1977年   60篇
  1976年   50篇
  1975年   48篇
  1974年   56篇
  1973年   57篇
  1972年   44篇
排序方式: 共有9358条查询结果,搜索用时 31 毫秒
51.
In the following paper, I analyze the influence of advisers and domestic political factors on President Clinton's decision to use force against Slobodan Milosevic and the Serbs in Kosovo in March 1999. I present an analysis and examination of President Clinton's decision-making process, using press reports, personal speeches, etc. In other words, I attempt to trace the process by which Clinton came to the decision to use force in Yugoslavia. Specifically, using the poliheuristic theory, I argue that President Clinton's decision was influenced by noncompensatory domestic political calculations and the strong influence of his Secretary of State, Madeleine K. Albright. Examining how advisers interact with one another, their status in the advisory group, and the manner in which presidents solicit information from advisers will further our understanding of how, when, and under what conditions national security-level decision makers make decisions.  相似文献   
52.
The social development model (SDM) is a theory of behavior that has proven useful in explaining the etiology of delinquency, violence, and substance use among adolescents as well as early antisocial behavior among pre-adolescents. A further test of the model is its generalizability across population groups. A section of the SDM representing prosocial influences in the etiology of problem behavior was compared for boys and girls and for children from low- and non low-income families using three waves of child, parent and teacher survey data on a sample of 851 elementary school students. Multiple group structural equation modeling was used to assess differences across groups in both measurement of model constructs and hypothesized structural paths between constructs. The results indicate overall similarity in the reliability of measurement models and validity of structural models.  相似文献   
53.
54.
55.
56.
The purpose of this investigation was to identify inmate personal and demographic data that may be used to further define or profile persons with a greater likelihood of being at risk for serving a jail sentence. This study was explorative. The survey administration was similar in format to that conducted by the U.S. Department of Justice. Chaplains were used as survey proctors. Pilot studies were conducted to determine the suitability of survey content. Surveys consisted of 172 items. Subjects included four hundred inmates: males comprised 88.75 percent of the sample, Caucasians 58.25 percent, Blacks 37 percent, Hispanics 3.25 percent and other 1.5 percent of the sample. Respondents ranged in age from 15 to 64 years with an average age of 30.3 years. Less than two percent of the contacted inmates refused participation in the survey. Results are presented for demographic data, select legal/criminal data, select drug and alcohol use data, employment data, health, parent/family data, education data, social data, and “other”.  相似文献   
57.
Conclusion The Regulations appear to have reinforced the protection available to software producers under United Kingdom law. The provisions of the Software Directive and the Regulations are complex and not without significant inconsistencies which are likely to prove to be a source of litigation. The drafters of the Regulations chose, unlike many of its European partners, not to adopt the wording of the Software Directive but to write their own interpretation, adding an element of uncertainty to the law in this area, which is perhaps inevitable bearing in mind the linguistic problems of translating and interpreting any directive coupled with the ambiguity and omission of definitions of several key terms. More important, however, than any academic argument will be the practical impact of the new law and its effectiveness in achieving its aim.  相似文献   
58.
59.
This paper describes a collaborative exercise intended to demonstrate whether uniformity of DNA profile results could be achieved between different European laboratories. It was shown that this goal can be obtained provided that a common protocol is followed (specifically the use of a common electrophoretic buffer as being the most important parameter). Generally, lower molecular weight loci (with lower molecular weight fragments) such as YNH24 perform better than higher molecular weight loci such as MS43a. The results of the exercise are discussed in relation to the objectives of the European DNA profiling group (EDNAP).  相似文献   
60.
The authors examine the characteristics of threatening and otherwise inappropriate communications sent to members of the U.S. Congress by a sample of 86 subjects, 20 of whom threatened assassination. We quote excerpts from these letters and provide quantitative data on such variables as the volume, duration, form, and appearance of such communications; the enclosures; the subjects' perceived relationships to the recipients; the thematic content of the communications; and the messages and threats communicated. Comparisons between 43 subjects who pursued encounters with members of Congress and 43 who did not revealed 17 factors associated with such pursuit. In this population, threateners were significantly less likely to pursue an encounter than inappropriate letter writers who did not threaten, regardless of the type of threat or the harm threatened. Inappropriate letters to members of Congress are compared with those directed to Hollywood celebrities. Mentally disordered persons writing to public figures often mention and sometimes threaten public figures other than those to whom the letters are addressed, which raises important issues regarding notification of endangered third parties and the sharing of information among protective agencies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号