首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1547篇
  免费   14篇
各国政治   27篇
工人农民   150篇
世界政治   17篇
外交国际关系   32篇
法律   1189篇
中国政治   8篇
政治理论   134篇
综合类   4篇
  2021年   5篇
  2020年   6篇
  2018年   81篇
  2017年   26篇
  2016年   96篇
  2015年   34篇
  2014年   10篇
  2013年   26篇
  2012年   130篇
  2011年   87篇
  2010年   9篇
  2009年   25篇
  2008年   12篇
  2007年   13篇
  2006年   18篇
  2005年   391篇
  2004年   104篇
  2003年   24篇
  2002年   11篇
  2001年   17篇
  1999年   14篇
  1997年   2篇
  1996年   3篇
  1992年   21篇
  1991年   22篇
  1990年   29篇
  1989年   39篇
  1988年   28篇
  1987年   27篇
  1986年   30篇
  1985年   20篇
  1984年   14篇
  1983年   14篇
  1982年   2篇
  1980年   3篇
  1979年   10篇
  1978年   10篇
  1977年   5篇
  1976年   1篇
  1975年   14篇
  1974年   24篇
  1973年   14篇
  1972年   16篇
  1971年   19篇
  1970年   13篇
  1969年   7篇
  1968年   11篇
  1967年   9篇
  1966年   5篇
  1965年   5篇
排序方式: 共有1561条查询结果,搜索用时 31 毫秒
131.
132.
A 35 years old student with prior suicidal tendencies was found dead laying enclosed in a plastic-bag together with four plastic-bags of minor capacity. Three bags were opened by cuts and empty, one bag contained 73 1 of 83.2 Vol.% carbon monoxide. Postmortem carboxyhemoglobin concentrations in blood of five different regions of the corpse ranged from 80.3% to 93.4%. From the circumstances--chemicals and apparatus--it could be reconstructed that carbon monoxide was produced by the reactions of formic acid and sulfuric acid.  相似文献   
133.
Determination of ABO-blood group on human hair segments of 79 individuals was performed by means of modified Yada absorption-elutions technique. The studies were carried out with 4 micron thin cross sections of hair. In 79% of the cases it was possible to establish the correct blood group. Individual hair segments of 0.5 cm length yielded reliable results. Antigen identification was best with blood group B and most difficult of the AB type.  相似文献   
134.
In a typical laboratory “Investment Game” experiment, participants’ endowments are provided by the experimenter; thus, the worst case for the investor is that she loses all of her “found” money. By contrast, in naturally occurring environments, investment decisions can often lead to a loss of one’s own money. This paper investigates whether “trust” found in one-shot anonymous laboratory interaction is robust to “own money” environments. Our results show that, consistent with previous investment game results, most investors send a positive amount, and most trustees return at least the transfer amount, regardless of whether the investors purchase or are gifted their endowment. However, investments are on average lower when participants use their own money, and the fraction of maximum investments (the most “risky” investment decision) is only half as large under “own money” as it is under gifted endowments. Our results explain why one should exercise caution in placing trust in any government’s ability to spend other people’s money prudently.  相似文献   
135.
136.
The growth of European Union (EU) competences in the field of external security in the last decade has produced a substantial increase in the number of EU institutions and bureaucratic actors engaged in the planning and management of these policies. Moreover, the expansion of competences in such a sovereign sensitive area comes up against the persistent intergovernmental nature of the security sector. This has resulted, on the one hand, in a complex institutional architecture with heavy demands in terms of coordination, and on the other hand, in a stark differentiation and stratification of the legal regimes with a potential to impact on policy outcomes. This state of uncertainty is particularly relevant when looking at relations with countries bordering the Union, as the long-standing web of interactions there has developed a more complex institutional environment. While most of the scholarly literature focuses on single institutional sectors or policies (Common Security and Defence Policy, European Neighbourhood Policy, or the external side of the Area of Freedom, Security and Justice), this study seeks to address the issue with a comprehensive analysis of the institutional framework that has emerged in the last decade, more notably, since the entry into force of the Treaty of Lisbon. The article provides, first, an overview of the EU’s institutional actors responsible for security policies in the regions bordering the EU, and second, an examination of the different mechanisms established to address the coordination issue. Finally, this study will argue that the traditional military dimension is but one, and certainly not the most developed, of the security instruments employed by the EU. At another level, it will be argued that the shift of focus from the military to other security tools has altered the institutional balance in the security sector, substantially adding to the relative influential weight of the Commission.  相似文献   
137.
Forced labour has been regulated since 1930 on the basis of the ILO Convention on Forced Labour, and since 1957 on the basis of the ILO Abolition of Forced Labour Convention. In 2000 forced labour was included as one form of exploitation covered by the UN Trafficking Protocol, which situated trafficking into a context of transnational organised crime. In 2014 the ILO adopted a Protocol on Forced Labour, making a link between trafficking and forced labour. The aim of this article is to explore how forced labour came to be regulated and defined in these four treaties. The 1930 ILO Convention came about in a specific historical and political context, yet the 1930 definition remains in use even though the interpretation of forced labour, particularly as it relates to trafficking, has changed. This article focuses on the issue of trafficking for the purpose of forced labour within the context of migration and labour exploitation, and discusses the relevance of historical definitions of forced labour in the current discourse that sees human trafficking mainly as a security threat. It argues that a rigid interpretation of forced labour is not always useful in understanding forms of labour exploitation, at least in a contemporary European migratory perspective. The article calls for a broad interpretation of forced labour, which takes into account also subtle forms of control and coercion.  相似文献   
138.
139.
Keine Zusammenfassung  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号