首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8966篇
  免费   331篇
各国政治   361篇
工人农民   327篇
世界政治   628篇
外交国际关系   347篇
法律   5671篇
中国政治   59篇
政治理论   1842篇
综合类   62篇
  2021年   54篇
  2020年   154篇
  2019年   177篇
  2018年   204篇
  2017年   262篇
  2016年   251篇
  2015年   171篇
  2014年   216篇
  2013年   876篇
  2012年   249篇
  2011年   257篇
  2010年   225篇
  2009年   224篇
  2008年   266篇
  2007年   285篇
  2006年   284篇
  2005年   239篇
  2004年   243篇
  2003年   246篇
  2002年   214篇
  2001年   349篇
  2000年   319篇
  1999年   248篇
  1998年   114篇
  1997年   86篇
  1996年   96篇
  1995年   94篇
  1994年   93篇
  1993年   75篇
  1992年   156篇
  1991年   175篇
  1990年   153篇
  1989年   166篇
  1988年   146篇
  1987年   160篇
  1986年   151篇
  1985年   169篇
  1984年   130篇
  1983年   144篇
  1982年   106篇
  1981年   99篇
  1980年   82篇
  1979年   107篇
  1978年   78篇
  1977年   72篇
  1976年   59篇
  1974年   59篇
  1973年   62篇
  1971年   53篇
  1970年   48篇
排序方式: 共有9297条查询结果,搜索用时 15 毫秒
91.
Technology policies and their effect on technology transfer from defense to civilian industries in Israel from 1967 to 1995 are explored. Defense technology policy is found to drive the growth of the defense industry and to limit defense conversion to commercialization initiatives developed primarily through intra-organizational technology transfer. The case of the Israel Aircraft Industries (IAI) is presented. Also the development of national technology policy in Israel is traced and found wanting. Civilian and defense technology policies are found to be uncoordinated with each other and together are incapable of producing interorganizational technology transfer so as to significantly effect defense conversion on a wide number of economic actors particularly small firms. To achieve a socially effective defense conversion process (in which technologies are transferred from defense firms to many economic actors), the analysis suggests that a national technology policy should be designed and implemented under Prime Minister's leadership.  相似文献   
92.
The analysis of naphthenic acid revealed that they may be used for tin detection in the cadaveric material due to their high complex-forming ability. Method of extraction-atomic absorption tin determination in human organs was developed on the basis of naphthenic acid use. Modified method which differs from the common one by higher sensitivity and selectivity is presented.  相似文献   
93.
94.
Optimal Law Enforcement with a Rent-Seeking Government   总被引:1,自引:0,他引:1  
This article analyzes public and private law enforcement whenthe government is motivated by rent seeking. A rent-seekinggovernment seeks primarily to maximize revenue. The articleconcludes as follows: (1) if offenders have sufficient wealth,a rent-seeking government is more aggressive than a social-welfare-maximizinggovernment in enforcing laws against minor crimes (such as parkingviolations) but more lax in enforcing laws against major crimes;(2) competitive private enforcement is usually better and neverworse than monopolistic private enforcement; (3) The choicebetween competitive private enforcement and public enforcementdepends on which is cheaper and on the severity of the offense.  相似文献   
95.
96.
97.
Telecommunications regulation has experienced a fundamentalshift from rate regulation to increased reliance on compelledaccess, perhaps best exemplified by the Telecommunications Actof 1996's imposition of no fewer than four new access requirements.Unfortunately, each access requirement is governed by a separateset of rules for determining both the scope and the price ofaccess. The resulting ad hoc regime has created difficult definitionalproblems and opportunities for regulatory arbitrage. In thisarticle we propose a system inspired by the discipline of mathematicsknown as graph theory that integrates all of the different formsof access into a single analytical framework. This system separatesdifferent access regimes into five categories: (1) retail access,(2) wholesale access, (3) interconnection access, (4) platformaccess, and (5) unbundled access. It also provides insightsinto how each type of access complicates the already difficultproblems of network configuration and management and introducesinefficient biases into decisions about network capacity anddesign. The approach we propose also provides insights intothe transaction cost implications of the different types ofaccess. Drawing on the Coasean theory of the firm, our approachexamines the tradeoffs between internal governance costs andthe external transaction costs of providing access to offera theory of network boundaries. This framework shows how accessregulation distorts networks' natural boundaries and providesa basis for evaluating whether private ordering through marketswould lead to more efficient network design.  相似文献   
98.
We discuss Professor Jeffrey Church's report to the EuropeanCommission in 2004 on the effects of vertical restraints andmergers. Although thorough and accurate, the report could bemisinterpreted by practitioners, as it does not emphasize thatmarket power is only a necessary condition for harm to competition,and that most vertical mergers that present the possibilityof competitive harm also present economic efficiencies thatare intrinsic to the integration.  相似文献   
99.
This study investigated the influence of an authority figure on eyewitness identification. Participants watched a staged crime and then were administered a photo lineup by either an authority (policeman) or non-authority figure (civilian). Participants in the authority condition were more likely to choose a lineup member than those in the non-authority condition. There was no effect of authority, however, on the accuracy of the identification decisions. The lack of a deleterious effect suggests that the presence of a police officer during identification procedures does not create an unduly suggestive situation or have undesirable effects on eyewitness identification decisions. Although witnesses' choosing behaviors did not increase the rate of identification errors, the effect of the administrator's authority on choosing was reduced when unbiased instructions (vs. biased instructions) were presented to the witnesses. Thus, support was found for the use of neutral instructions during eyewitness identification procedures.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号