首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   556篇
  免费   53篇
各国政治   49篇
工人农民   16篇
世界政治   36篇
外交国际关系   47篇
法律   285篇
中国政治   4篇
政治理论   167篇
综合类   5篇
  2023年   7篇
  2022年   2篇
  2021年   8篇
  2020年   15篇
  2019年   21篇
  2018年   27篇
  2017年   38篇
  2016年   26篇
  2015年   28篇
  2014年   21篇
  2013年   99篇
  2012年   25篇
  2011年   24篇
  2010年   27篇
  2009年   18篇
  2008年   19篇
  2007年   12篇
  2006年   20篇
  2005年   9篇
  2004年   21篇
  2003年   10篇
  2002年   13篇
  2001年   7篇
  2000年   11篇
  1999年   5篇
  1998年   9篇
  1997年   8篇
  1996年   9篇
  1995年   4篇
  1994年   2篇
  1993年   6篇
  1992年   4篇
  1991年   8篇
  1990年   5篇
  1989年   5篇
  1988年   3篇
  1987年   4篇
  1986年   2篇
  1985年   4篇
  1984年   3篇
  1981年   3篇
  1980年   3篇
  1978年   3篇
  1977年   3篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有609条查询结果,搜索用时 15 毫秒
541.
This article takes up the current promise of computer‐aided social networks as mechanisms for sharing in experiences. The author examines social networks phenomenologically, not merely as a tool for providing information and shaping what we think but as a social construct for what can be shared, how we think, and what can be known. The analysis identifies a connection between social networks and artificial intelligence systems, while also suggesting that significant experiential gaps built into the systems can lead to distortions in the ontology of shared experiences. The author argues, by applying concepts from Kant, Arendt, Schutz, and Heidegger, that computerized social networks offer an unparalleled opportunity for public administrators to discover and learn about social conditions, but these networks are not without significant limitations. An appreciation for the limits to sharing implicit in computerized social networks and artificial intelligence systems can be made explicit by applying concepts from phenomenology. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   
542.
Voters who believe that the nation's economy has been worsening are more inclined to vote against the incumbent president than are those who believe it has not been getting worse. This relationship could be present because voters condition their support for the incumbents upon their perceptions of the economy, or, alternatively, because they condition their perceptions of the economy upon their underlying, partisan-based support of the incumbents.  相似文献   
543.
Abstract

The 2009 Authorized History of MI5 carried a new defence of its August 1914 operation, in which Vernon Kell, its first Director, supposedly scored a coup by capturing all 21 German agents working in Britain. The Authorized History went against the version of events given in my article ‘Entering the Lists’, published by this journal in 2006, and backed up its case with a new arrest list. This article considers that new list, and its supposed origins in an MI5 document from 1931. Once again it demonstrates the impossibility of turning MI5's foundation myth into history, by showing that not only is the account in the Authorized History internally inconsistent, but the arrest list consists of 22 names arbitrarily selected from later case summaries, then wrongly footnoted to an MI5 document which contains a different list of 21 names. Indeed, by claiming authority from the only arrest list known to have been challenged within MI5 itself, the Authorized History merely reinforces the conclusion that Kell fabricated his most famous victory.  相似文献   
544.
Following widespread criticism of financial market (self-)regulation, there is a shift in regulatory mood, explored here with reference to evolving conceptions of conflict of interest. The pre-crisis distinction between conflict of interest (normal, manageable) and its exploitation (unacceptable, legally actionable) has become somewhat eroded, as exemplified by the SEC’s 2010 civil fraud action against investment bank Goldman Sachs. However the settlement of that case on the basis of ‘mistake’ left many questions unanswered: about the meaning(s) of conflict of interest, about managerial mistake versus exploitative intent in administrative/civil cases and equally about the potential for action under criminal law. Looking forward, a judgement of the European Court of Justice on insider trading – concerning a rebuttable assumption of intent – could be taken as a template for ‘drawing the line’ on conflict of interest. Acting on the basis of informational asymmetry could be taken as an indicator of intent and serious wrongdoing unless financial market actors can demonstrate otherwise.  相似文献   
545.
546.
Hailey N 《Duke law journal》2011,61(2):393-432
Professional cycling has suffered from a number of doping scandals. The sport's governing bodies have responded by implementing an aggressive new antidoping program known as the biological passport. Cycling's biological passport marks a departure from traditional antidoping efforts, which have focused on directly detecting prohibited substances in a cyclist's system. Instead, the biological passport tracks biological variables in a cyclist's blood and urine over time, monitoring for fluctuations that are thought to indirectly reveal the effects of doping. Although this method of indirect detection is promising, it also raises serious legal and scientific concerns. Since its introduction, the cycling community has debated the reliability of indirect biological-passport evidence and the clarity, consistency, and transparency of its use in proving doping violations. Such uncertainty undermines the legitimacy of finding cyclists guilty of doping based on this indirect evidence alone. Antidoping authorities should address these important concerns before continuing to pursue doping sanctions against cyclists solely on the basis of their biological passports.  相似文献   
547.
Is the nuclear domino theory historically valid? Despite its longstanding centrality to thinking on nuclear proliferation amongst scholars and policymakers, in recent years a revisionist consensus has emerged in opposition to this traditional view. Based on an analysis of historical evidence from the aftermath of the 1964 Chinese nuclear test, this article argues that scholars have gone too far in rejecting the nuclear domino theory. Reactive proliferation has been more prevalent than commonly believed, and while it is true that only India acquired a nuclear arsenal in response to the Chinese test, to a significant extent this is precisely because the United States was aware of the danger of reactive proliferation and worked to stop it. Finally, the historical evidence suggests that the nuclear domino theory is compatible with both domestic and prestige motivations for proliferation in addition to the security motives normally associated with the theory.  相似文献   
548.
When determining an age estimate from adult skeletal remains, forensic anthropologists face a series of methodological choices. These decisions, such as which skeletal region to evaluate, which methods to apply, what statistical information to use, and how to combine information from multiple methods, ultimately impacts the final reported age estimate. In this study, a questionnaire was administered to 145 forensic anthropologists, documenting current trends in adult age at death estimation procedures used throughout the field. Results indicate that the Suchey-Brooks pubic symphysis method (1990) remains the most highly favored aging technique, with cranial sutures and dental wear being the least preferred, regardless of experience. The majority of respondents stated that they vary their skeletal age estimate process case-by-case and ultimately present to officials both a narrow and broad possible age range. Overall, respondents displayed a very high degree of variation in how they generate their age estimates, and indicated that experience and expertise play a large role in skeletal age estimates.  相似文献   
549.
In February 2009, the National Academy of Sciences published a report entitled "Strengthening Forensic Science in the United States: A Path Forward." The report notes research studies must be performed to "…understand the reliability and repeatability…" of comparison methods commonly used in forensic science. Numerical classification methods have the ability to assign objective quantitative measures to these words. In this study, reproducible sets of ideal striation patterns were made with nine slotted screwdrivers, encoded into high-dimensional feature vectors, and subjected to multiple statistical pattern recognition methods. The specific methods employed were chosen because of their long peer-reviewed track records, widespread successful use for both industry and academic applications, rely on few assumptions on the data's underlying distribution, can be accompanied by standard confidence levels, and are falsifiable. For PLS-DA, correct classification rates of 97% or higher were achieved by retaining only eight dimensions (8D) of data. PCA-SVM required even fewer dimensions, 4D, for the same level of performance. Finally, for the first time in forensic science, it is shown how to use conformal prediction theory to compute identifications of striation patterns at a given level of confidence.  相似文献   
550.
Despite i t s internal differences, the European Economic Community seems to be moving toward an established and permanent position as agricultural exporter. European nations have moved irreversibly from being an import market to bejng a self-sufficient and large-scale producer. An established and politically entrenched agriculture in the European Economic Community has widespread support and their general economic needs elevate agriculture to promirience in attacking trade deficits.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号