首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17073篇
  免费   292篇
各国政治   712篇
工人农民   1302篇
世界政治   780篇
外交国际关系   695篇
法律   9909篇
中国共产党   1篇
中国政治   30篇
政治理论   3818篇
综合类   118篇
  2020年   126篇
  2019年   150篇
  2018年   1435篇
  2017年   1402篇
  2016年   1223篇
  2015年   232篇
  2014年   206篇
  2013年   1023篇
  2012年   461篇
  2011年   1136篇
  2010年   1194篇
  2009年   787篇
  2008年   982篇
  2007年   915篇
  2006年   251篇
  2005年   258篇
  2004年   377篇
  2003年   340篇
  2002年   239篇
  2001年   340篇
  2000年   310篇
  1999年   249篇
  1998年   117篇
  1997年   128篇
  1996年   116篇
  1995年   135篇
  1994年   129篇
  1993年   94篇
  1992年   170篇
  1991年   196篇
  1990年   173篇
  1989年   184篇
  1988年   159篇
  1987年   155篇
  1986年   180篇
  1985年   143篇
  1984年   144篇
  1983年   142篇
  1982年   93篇
  1981年   80篇
  1980年   70篇
  1979年   124篇
  1978年   74篇
  1977年   76篇
  1976年   58篇
  1975年   68篇
  1974年   83篇
  1973年   79篇
  1972年   71篇
  1971年   63篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
Technology policies and their effect on technology transfer from defense to civilian industries in Israel from 1967 to 1995 are explored. Defense technology policy is found to drive the growth of the defense industry and to limit defense conversion to commercialization initiatives developed primarily through intra-organizational technology transfer. The case of the Israel Aircraft Industries (IAI) is presented. Also the development of national technology policy in Israel is traced and found wanting. Civilian and defense technology policies are found to be uncoordinated with each other and together are incapable of producing interorganizational technology transfer so as to significantly effect defense conversion on a wide number of economic actors particularly small firms. To achieve a socially effective defense conversion process (in which technologies are transferred from defense firms to many economic actors), the analysis suggests that a national technology policy should be designed and implemented under Prime Minister's leadership.  相似文献   
112.
Recent British work has focused attention on preventing repeat victimization as part of an overall crime prevention strategy. Because domestic violence victims are among those most likely to suffer multiple victimizations, they are logical candidates for programs targeted at reducing repeat victimization.
This article reports on a joint law enforcement-social services approach to reduce the incidence of repeat domestic violence. The research design randomly assigned households reporting domestic incidents within two public housing police service areas in New York to receive or not receive a follow-up to the initial patrol response. (The follow-up visit was conducted by a police officer and a social worker.) In addition, housing projects in the same area were randomly assigned to receive or not receive public education about domestic violence.
Neither treatment produced a reduction in violence. However, households in projects that had received public education and households that received the follow-up visits were both more likely to report new violence to the police than households that did not receive the treatments. Moreover, the effect of the follow-up visit was most pronounced among households with more serious histories of violence. The results suggest that the interventions increased citizens' confidence in the ability of the police to handle domestic situations.  相似文献   
113.
Optimal Law Enforcement with a Rent-Seeking Government   总被引:1,自引:0,他引:1  
This article analyzes public and private law enforcement whenthe government is motivated by rent seeking. A rent-seekinggovernment seeks primarily to maximize revenue. The articleconcludes as follows: (1) if offenders have sufficient wealth,a rent-seeking government is more aggressive than a social-welfare-maximizinggovernment in enforcing laws against minor crimes (such as parkingviolations) but more lax in enforcing laws against major crimes;(2) competitive private enforcement is usually better and neverworse than monopolistic private enforcement; (3) The choicebetween competitive private enforcement and public enforcementdepends on which is cheaper and on the severity of the offense.  相似文献   
114.
115.
Telecommunications regulation has experienced a fundamentalshift from rate regulation to increased reliance on compelledaccess, perhaps best exemplified by the Telecommunications Actof 1996's imposition of no fewer than four new access requirements.Unfortunately, each access requirement is governed by a separateset of rules for determining both the scope and the price ofaccess. The resulting ad hoc regime has created difficult definitionalproblems and opportunities for regulatory arbitrage. In thisarticle we propose a system inspired by the discipline of mathematicsknown as graph theory that integrates all of the different formsof access into a single analytical framework. This system separatesdifferent access regimes into five categories: (1) retail access,(2) wholesale access, (3) interconnection access, (4) platformaccess, and (5) unbundled access. It also provides insightsinto how each type of access complicates the already difficultproblems of network configuration and management and introducesinefficient biases into decisions about network capacity anddesign. The approach we propose also provides insights intothe transaction cost implications of the different types ofaccess. Drawing on the Coasean theory of the firm, our approachexamines the tradeoffs between internal governance costs andthe external transaction costs of providing access to offera theory of network boundaries. This framework shows how accessregulation distorts networks' natural boundaries and providesa basis for evaluating whether private ordering through marketswould lead to more efficient network design.  相似文献   
116.
We discuss Professor Jeffrey Church's report to the EuropeanCommission in 2004 on the effects of vertical restraints andmergers. Although thorough and accurate, the report could bemisinterpreted by practitioners, as it does not emphasize thatmarket power is only a necessary condition for harm to competition,and that most vertical mergers that present the possibilityof competitive harm also present economic efficiencies thatare intrinsic to the integration.  相似文献   
117.
118.
119.
The functional and nutritive circulation in the lungs is connected by anastomoses between the pulmonary and bronchial arteries. The anastomoses have the structure of blocked arteries from which arteriovenous anastomoses proceed to the peribronchial plexus. The pulmonary artery is provided with a flow impulse by the anastomoses, and oxygen-containing blood is admixed with the venous blood, thus forming an "aortalization" in the lungs. By diverting the bloodstream, venous blood can reach the bronchial artery. The peculiarities of the lung circulation are important for vital reactions in the form of macro- and microembolisms. Macroembolisms prove the functionality of the system if branches of the pulmonary artery are closed before the arteries are blocked. A hemorrhagic infarction either arises or does not arise, and the hemorrhagic infarction cannot exceed a certain limit. A microembolism is over and above the anastomoses. If the microembolism is greater, pressure in the arteria pulmonaris can cause blood from the pulmonary artery to overflow into the bronchial artery. Because arteriovenous anastomoses arise from the blocked arteries, microemboli can now reach the systemic circulation. Thus, the system described can explain the passage of microemboli into the systemic circulation, avoiding the capillaries of the lungs; on the other hand, larger microembolisms can prove the functionality of the system.  相似文献   
120.
Easterbrook G  Barry J  Thomas R  Clift E  Wingert  Hager M  Cohn B 《Newsweek》1992,120(22):30, 32-34, 36
Lobbyists, entrenched forces in congress and self-interested friends will try to stymie Clinton's efforts. A look at four key arenas of combat.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号