首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   635篇
  免费   1篇
各国政治   3篇
工人农民   17篇
外交国际关系   446篇
法律   168篇
政治理论   2篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2014年   38篇
  2013年   54篇
  2012年   59篇
  2011年   90篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   36篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
  2001年   1篇
排序方式: 共有636条查询结果,搜索用时 0 毫秒
631.
In Bilski v. Doll, the U.S. Supreme Court is called to define one of the categories of patent-eligible subject matter, “process” patents. In 2008, the Court of Appeals for the Federal Circuit held that the category has a narrow meaning, and that to be eligible for a process patent under 35 U.S.C. § 101, the invention must involve a machine or apparatus or involve a transformation to a different state or thing, ultimately rejecting the patent application as unpatentable subject matter. The patent applicants have asked the U.S. Supreme Court to determine two issues: first, the meaning of “process” in 35 U.S.C. § 101 and whether the lower court properly relied on a “machine-or-transformation” test, and second, the test's potential conflict with 35 U.S.C. § 273, which provides protection for “method[s] of doing or conducting business.” The Court's decision could change the way that research and business are done, and patent protection for such investments. Parts 1 and 2 of this article address Bilski directly and what is and is not in dispute. Part 3 addresses the “machine-or-transformation” test, while Parts 4 and 5 address reasons not to adopt such a test.  相似文献   
632.
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists.  相似文献   
633.
This study examines whether having delinquent friends interacts with other peer-related variables in the explanation of adolescent offending. We hypothesise that the relationship between delinquent friends and offending might be conditioned by the effect of (1) how much time they spend with their friends, (2) how much time they spend in unstructured routine activities and (3) their emotional relationship with their friends. To test these three hypotheses we use data from two independent samples of young adolescents in Halmstad, Sweden (N = 1,003) and in Cologne and Freiburg, Germany (N = 955). The results found strong support that the effect of delinquent friends on adolescent offending is conditional on the level of time they spend in unstructured routine activities. This indicates that delinquent friends have a stronger effect on offending for adolescents who often spend their free time in unstructured routine activities.  相似文献   
634.
This paper aims to provide an analysis of the current regulatory environment, at the federal level, of privacy protection concerning biometrics in Australia. The study only focuses on the federal Privacy Act 1988 (Cth) and the Biometrics Institute Privacy Code. The discussion is based on the legal concerns of the use of biometrics, and an analysis is made concerning the implications of privacy protection sources.  相似文献   
635.
636.
Dependent minor parents placed in foster care with their children often face significant hurdles. These parents are responsible to make caregiving decisions for their children, while they themselves fall under the caregiving responsibility of the state child welfare system. As such, dependent minor parents live in a “twilight zone” – they hold full parental rights, but limited rights as teenagers. For a number of reasons, the children of minor parents in foster care often come into state custody. When two generations are in foster care at the same time, states must balance the safety and best interests of the children with the rights of minor parents to care for their own children. Currently, the state child welfare system is only required to provide “reasonable efforts” to reunify parents with children when they have been removed from their care for abuse, neglect, or dependency. However, dependent minor parents in state custody often require more supportive services in order to successfully reunify with their children than in a typical child welfare case. This article places the circumstance just described in the context of dependent minor parents’ constitutionally protected rights, and advocates for a higher standard which would require states to provide “active efforts” to protect and preserve these young families.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号