首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6639篇
  免费   288篇
各国政治   358篇
工人农民   265篇
世界政治   498篇
外交国际关系   259篇
法律   3829篇
中国共产党   1篇
中国政治   38篇
政治理论   1623篇
综合类   56篇
  2020年   126篇
  2019年   137篇
  2018年   160篇
  2017年   216篇
  2016年   198篇
  2015年   161篇
  2014年   155篇
  2013年   731篇
  2012年   214篇
  2011年   194篇
  2010年   179篇
  2009年   173篇
  2008年   214篇
  2007年   200篇
  2006年   193篇
  2005年   179篇
  2004年   185篇
  2003年   165篇
  2002年   163篇
  2001年   217篇
  2000年   198篇
  1999年   157篇
  1998年   95篇
  1997年   68篇
  1996年   64篇
  1995年   82篇
  1994年   68篇
  1993年   61篇
  1992年   104篇
  1991年   110篇
  1990年   122篇
  1989年   101篇
  1988年   95篇
  1987年   95篇
  1986年   120篇
  1985年   126篇
  1984年   87篇
  1983年   83篇
  1982年   64篇
  1981年   53篇
  1980年   58篇
  1979年   56篇
  1978年   59篇
  1977年   38篇
  1976年   37篇
  1975年   48篇
  1974年   63篇
  1973年   57篇
  1972年   46篇
  1969年   42篇
排序方式: 共有6927条查询结果,搜索用时 15 毫秒
41.
Technology policies and their effect on technology transfer from defense to civilian industries in Israel from 1967 to 1995 are explored. Defense technology policy is found to drive the growth of the defense industry and to limit defense conversion to commercialization initiatives developed primarily through intra-organizational technology transfer. The case of the Israel Aircraft Industries (IAI) is presented. Also the development of national technology policy in Israel is traced and found wanting. Civilian and defense technology policies are found to be uncoordinated with each other and together are incapable of producing interorganizational technology transfer so as to significantly effect defense conversion on a wide number of economic actors particularly small firms. To achieve a socially effective defense conversion process (in which technologies are transferred from defense firms to many economic actors), the analysis suggests that a national technology policy should be designed and implemented under Prime Minister's leadership.  相似文献   
42.
43.
Quadratic pieces of fleece measuring 16 mm2 were soaked with 10 different blood-samples in the dilution steps of 1:1, 1:10, 1:100, 1:1000, respectively, and were tested in blood group typing and identification tests of forensic serology. The above spezified dilutions correspond with 5 microliters, 0.5 microliter, 0.05 microliter and 0.005 microliter of blood, respectively. The detection limit of the microspectrometric test for blood was the dilution 1:10, of the porphyrine test a dilution above 1:100, whereas the preliminary test for blood (peroxidase) succeeded always up to a dilution of 1:1000 and the species determination by the radial immunodiffusion test in agar gels succeeded in most cases op to a dilution of 1:1000. The detection limit of the anti-human globulin inhibition test was between the dilution steps 1:10 and 1:100 when non-titrated and undiluted anti-human globulin serum was used. Gc- and ABO-grouping were possible up to a dilution of 1:100 and were thus the most sensitive grouping systems. Phenotyping of the enzyme-systems and the Gm/Km-system usually required stains with considerably higher blood concentrations i.e. stains of undiluted blood.  相似文献   
44.
Optimal Law Enforcement with a Rent-Seeking Government   总被引:1,自引:0,他引:1  
This article analyzes public and private law enforcement whenthe government is motivated by rent seeking. A rent-seekinggovernment seeks primarily to maximize revenue. The articleconcludes as follows: (1) if offenders have sufficient wealth,a rent-seeking government is more aggressive than a social-welfare-maximizinggovernment in enforcing laws against minor crimes (such as parkingviolations) but more lax in enforcing laws against major crimes;(2) competitive private enforcement is usually better and neverworse than monopolistic private enforcement; (3) The choicebetween competitive private enforcement and public enforcementdepends on which is cheaper and on the severity of the offense.  相似文献   
45.
Telecommunications regulation has experienced a fundamentalshift from rate regulation to increased reliance on compelledaccess, perhaps best exemplified by the Telecommunications Actof 1996's imposition of no fewer than four new access requirements.Unfortunately, each access requirement is governed by a separateset of rules for determining both the scope and the price ofaccess. The resulting ad hoc regime has created difficult definitionalproblems and opportunities for regulatory arbitrage. In thisarticle we propose a system inspired by the discipline of mathematicsknown as graph theory that integrates all of the different formsof access into a single analytical framework. This system separatesdifferent access regimes into five categories: (1) retail access,(2) wholesale access, (3) interconnection access, (4) platformaccess, and (5) unbundled access. It also provides insightsinto how each type of access complicates the already difficultproblems of network configuration and management and introducesinefficient biases into decisions about network capacity anddesign. The approach we propose also provides insights intothe transaction cost implications of the different types ofaccess. Drawing on the Coasean theory of the firm, our approachexamines the tradeoffs between internal governance costs andthe external transaction costs of providing access to offera theory of network boundaries. This framework shows how accessregulation distorts networks' natural boundaries and providesa basis for evaluating whether private ordering through marketswould lead to more efficient network design.  相似文献   
46.
We discuss Professor Jeffrey Church's report to the EuropeanCommission in 2004 on the effects of vertical restraints andmergers. Although thorough and accurate, the report could bemisinterpreted by practitioners, as it does not emphasize thatmarket power is only a necessary condition for harm to competition,and that most vertical mergers that present the possibilityof competitive harm also present economic efficiencies thatare intrinsic to the integration.  相似文献   
47.
Eighteen external quality assessment (proficiency testing) samples were prepared from client specimens collected with the Intercept® oral fluid collection device and by spiking drug-free oral fluid. Samples were circulated in pairs at quarterly intervals to 13 UK and USA based laboratories for analysis by a panel of OraSure micro-plate Intercept® enzyme immunoassay kits and hyphenated mass spectrophotometric techniques. During the survey, there was a single case of non-specificity in a false report for methadone. The major errors were of lack of sensitivity relative to the concentration thresholds specified for the immunoassays. The sensitivity for overall ‘present’/‘not found’ reports calculated as true positives/(true positives + false negatives) were for the amfetamine specific assay 50%, methyl-amfetamines 93%, barbiturates 64%, cannabinoids 73%, cocaine and metabolites 100%, benzodiazepines 69%, methadone 95%, opiates 79% (opiates excluding oxycodone 93%), phencyclidine 93% and human gamma-globulin 97%. A small number of the sensitivity errors were attributable to errors in chromatographic confirmation techniques.  相似文献   
48.
49.
Book Review     
Radical myths and superpower relations in the 1980s

A review of Mark Kaldor, Gerard Holden, and Richard Falk (eds), The New Detente: Rethinking East‐West Relations, Verso, London, 1989.

Paul Taylor and A.J.R. Groom, Global Issues in the United Nations Framework, Basingstoke, Hampshire, The MacMillan Press Ltd., 1989.

Roger A. Coate, Unilateralism, Ideology, and US Foreign Policy: The United States in and out of UNESCO, Lynne Reinner Publishers, London, 1988.

Bary Buzan, Morten Kelstnip, Pierre Lemaitre, Elzbieta Tromer, and Ole Weaver, The European Security Order Recast: Scenarios for the Post‐Cold War Era, Pinter Publishers, London & New York, 1990, pp.x. 282, £8.95 pbk, £30 hbk.  相似文献   

50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号