首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   3篇
各国政治   2篇
工人农民   5篇
世界政治   5篇
外交国际关系   3篇
法律   41篇
政治理论   18篇
综合类   6篇
  2023年   2篇
  2020年   1篇
  2019年   6篇
  2018年   3篇
  2017年   4篇
  2016年   3篇
  2015年   3篇
  2014年   4篇
  2013年   16篇
  2011年   1篇
  2010年   3篇
  2009年   1篇
  2008年   5篇
  2006年   1篇
  2005年   3篇
  2004年   2篇
  2003年   2篇
  2001年   3篇
  1999年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   3篇
  1984年   1篇
  1975年   1篇
  1974年   3篇
排序方式: 共有80条查询结果,搜索用时 15 毫秒
61.
62.
Overdispersion and Poisson Regression   总被引:2,自引:0,他引:2  
This article discusses the use of regression models for count data. A claim is often made in criminology applications that the negative binomial distribution is the conditional distribution of choice when for a count response variable there is evidence of overdispersion. Some go on to assert that the overdisperson problem can be “solved” when the negative binomial distribution is used instead of the more conventional Poisson distribution. In this paper, we review the assumptions required for both distributions and show that only under very special circumstances are these claims true.
John M. MacDonaldEmail:
  相似文献   
63.
64.
ABSTRACT

While the threat from terrorism has gained widespread acknowledgment over the last decade, the infiltration of organizations by “terrorist” insiders has not, and the potential dangers these individuals present has not been fully explored. There is a need to understand the wider aspects of insider threats, including motivations and attack methodologies, and to be able to demonstrate the potential devastation that could be caused. Organizations can attempt to mitigate the potential for insider infiltration by both terrorist and other hostile actors, and if such individuals were within an organization, there are procedures and strategies that can be employed to prevent exploitation of existing organizational vulnerabilities and detection of insiders. This article provides an informed and new approach to the connection between insider threat and terrorism.  相似文献   
65.
66.
‘Green grabs,’ or the expropriation of land or resources for environmental purposes, constitute an important component of the current global land grab explosion. We argue that international environmental institutions are increasingly cultivating the terrain for green grabbing. As sites that circulate and sanction forms of knowledge, establish regulatory devices and programmatic targets, and align and articulate actors with these mechanisms, they structure emergent green market opportunities and practices. Drawing on the idea of primitive accumulation as a continual process, we examine the 10th Conference of the Parties to the United Nations Convention on Biological Diversity as one such institution.  相似文献   
67.
Forensic science laboratories perform analyses on a variety of materials using gas chromatography/mass spectrometry (GC/MS). Instruments from different vendors may be used, requiring analysts to be proficient in the use of multiple proprietary software packages for collecting and processing data. There is no standardized GC/MS software available that can acquire data from different vendors' instruments. However, there are third‐party processing software products that can import data files in different formats. The Centre of Forensic Sciences compared the data processing performance of one such product, ACD/MS Manager Suite, with three instrument vendors' software used for casework analysis. This product was tested for its compatibility with the existing software, its capability to load and present data, and to initiate searches of commercial libraries. The study shows that the MS Manager module provides a means for the forensic analyst to view, process, and report on data from different sources in one software package.  相似文献   
68.
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号