首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   481篇
  免费   34篇
各国政治   31篇
工人农民   46篇
世界政治   29篇
外交国际关系   68篇
法律   200篇
中国政治   7篇
政治理论   131篇
综合类   3篇
  2023年   10篇
  2022年   2篇
  2021年   9篇
  2020年   18篇
  2019年   21篇
  2018年   32篇
  2017年   36篇
  2016年   35篇
  2015年   25篇
  2014年   22篇
  2013年   89篇
  2012年   20篇
  2011年   27篇
  2010年   11篇
  2009年   13篇
  2008年   13篇
  2007年   16篇
  2006年   10篇
  2005年   7篇
  2004年   15篇
  2003年   6篇
  2002年   4篇
  2001年   6篇
  2000年   8篇
  1999年   4篇
  1998年   6篇
  1997年   2篇
  1996年   6篇
  1995年   6篇
  1994年   2篇
  1993年   2篇
  1992年   4篇
  1991年   4篇
  1990年   3篇
  1989年   2篇
  1988年   3篇
  1987年   3篇
  1986年   2篇
  1983年   3篇
  1982年   2篇
  1980年   1篇
  1978年   3篇
  1970年   1篇
  1967年   1篇
排序方式: 共有515条查询结果,搜索用时 46 毫秒
41.
42.
Aldrich‐McKelvey scaling is a powerful method that corrects for differential‐item functioning (DIF) in estimating the positions of political stimuli (e.g., parties and candidates) and survey respondents along a latent policy dimension from issue scale data. DIF arises when respondents interpret issue scales (e.g., the standard liberal‐conservative scale) differently and distort their placements of the stimuli and themselves. We develop a Bayesian implementation of the classical maximum likelihood Aldrich‐McKelvey scaling method that overcomes some important shortcomings in the classical procedure. We then apply this method to study citizens' ideological preferences and perceptions using data from the 2004–2012 American National Election Studies and the 2010 Cooperative Congressional Election Study. Our findings indicate that DIF biases self‐placements on the liberal‐conservative scale in a way that understates the extent of polarization in the contemporary American electorate and that citizens have remarkably accurate perceptions of the ideological positions of senators and Senate candidates.  相似文献   
43.
44.
We examine congressional cue‐taking theory to determine its extent, conditionality, and various forms in the US Senate. Using a novel data‐collection technique (timed C‐SPAN footage), we focus on temporal dynamics via event history analysis. Examining the effects of senator characteristics across 16 votes from the 108th Congress, we find that committee leadership and seniority generally predict cue‐giving, while other types of characteristics predict cue‐giving on certain types of votes. Our results underscore the importance of considering the order and timing of voting when studying congressional behavior.  相似文献   
45.
Historical and recent challenges to the practice of comparative forensic examination have created a driving force for the formation of objective methods for toolmark identification. In this study , fifty sequentially manufactured chisels were used to create impression toolmarks in lead (500 toolmarks total). An algorithm previously used to statistically separate known matching and nonmatching striated screwdriver marks and quasi-striated plier marks was used to evaluate the chisel marks. Impression toolmarks, a more complex form of toolmark, pose a more difficult test for the algorithm that was originally designed for striated toolmarks. Results show in this instance that the algorithm can separate matching and nonmatching impression marks, providing further validation of the assumption that toolmarks are identifiably unique.  相似文献   
46.
Studies of involuntary outpatient commitment (OPC) among persons with severe mental illness have concluded that OPC is only effective in improving treatment outcomes when it is sustained for 6 months or longer and is combined with frequent outpatient services. This article explores factors that influence the delivery of outpatient services to subjects in a randomized trial of OPC and finds 2 general patterns. Outpatient visits were more frequent among all subjects with apparent clinical need, regardless of study assignment, and among subjects whose OPC was sustained beyond an initial court order. These results suggest that, in practice, sustained OPC represents a consensual agreement between clinicians and the court to more intensively address the complex needs of persons with severe and persistent mental illness.  相似文献   
47.
48.
Research in recent times has clearly demonstrated that violence is predictable and preventable; however, the primary prevention of abusive and violent behavior will not occur without personal, interpersonal, and social change. This article reviews the empirical research supporting hypotheses for primary prevention of many risks associated with children becoming abusive.  相似文献   
49.
Clothing damage analysis is an integral part of the examinations carried out in sexual assault type cases. This analysis can be used to corroborate different versions of events and is at its most powerful in elucidating false allegation cases and consent cases. The purpose of this study was to determine to what extent people with varying levels of forensic awareness, experience and training could correctly carry out damage analysis. Two participant groups were asked to take part in this study. Group A ('forensic group') comprised participants at a forensic science conference, and Group B ('student group') comprised students undertaking a degree course in Forensic Science. Each group was given a practical workshop consisting of a lecture outlining common fabric types and general features observed in different damage types. Each participant was subsequently shown 25 pieces of 'damage' and asked to identify both the type of fabric construction (knit or weave) and the type of damage (cut, tear, rip, wear and tear). The ability to identify fabric construction and damage types varied within the two groups studied and across the groups. The forensic group performed better both in fabric and damage assessment than the student group. This paper suggests a systematic approach to clothing damage analysis to maximise the benefits that can be obtained from this area of forensic science and to minimise the subjectivity within the field.  相似文献   
50.
The “cloud” is not new, and its roots go back to the original plans for computing from the 1950s. Now that computing is moving back to the original cloud-based models that were envisioned more than 60 years ago, with it, consumers are realizing the increases in security and safety that accompany the move to centralized servers. Yet the perception of “trust” in this context is often still formed by views that people have from their use of computers over the past two decades, which is localized in nature (“if I can see it, I can control it”). This view is based on perception more than fact. Our paper discusses different views of trust in other contexts (such as banking and travel) and concludes that users of cloud computing should recast their view of trust in a similar way that consumers of banking and travel have changed their perceptions of trust in the last 100 years.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号