首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   655篇
  免费   31篇
各国政治   28篇
工人农民   14篇
世界政治   42篇
外交国际关系   26篇
法律   342篇
中国政治   4篇
政治理论   226篇
综合类   4篇
  2021年   6篇
  2020年   13篇
  2019年   11篇
  2018年   18篇
  2017年   21篇
  2016年   20篇
  2015年   12篇
  2014年   18篇
  2013年   88篇
  2012年   29篇
  2011年   19篇
  2010年   10篇
  2009年   23篇
  2008年   21篇
  2007年   32篇
  2006年   20篇
  2005年   10篇
  2004年   23篇
  2003年   24篇
  2002年   16篇
  2001年   9篇
  2000年   22篇
  1999年   10篇
  1998年   9篇
  1997年   7篇
  1996年   8篇
  1995年   8篇
  1994年   9篇
  1993年   12篇
  1992年   11篇
  1991年   12篇
  1990年   17篇
  1989年   8篇
  1988年   13篇
  1987年   10篇
  1986年   7篇
  1985年   11篇
  1984年   8篇
  1983年   6篇
  1982年   4篇
  1981年   4篇
  1980年   6篇
  1979年   6篇
  1978年   9篇
  1977年   3篇
  1976年   4篇
  1975年   6篇
  1974年   2篇
  1973年   2篇
  1965年   3篇
排序方式: 共有686条查询结果,搜索用时 15 毫秒
81.
Transnational Models for Regulation of Nanotechnology   总被引:4,自引:0,他引:4  
Like all technologies, nanotechnology will inevitably present risks, whether they result from unintentional effects of otherwise beneficial applications, or from the malevolent misuse of technology. Increasingly, risks from new and emerging technologies are being regulated at the international level, although governments and private experts are only beginning to consider the appropriate international responses to nanotechnology. In this paper, we explore both the potential risks posed by nanotechnology and potential regulatory frameworks that law may impose. In so doing, we also explore the various rationales for international regulation including the potential for cross-boundary harms, sharing of regulatory expertise and resources, controlling protectionism and trade conflicts, avoiding a "race to the bottom" in which governments seek economic advantage through lax regulation, and limiting the "nano divide" between North and South. Finally, we examine some models for international regulation and offer tentative thoughts on the prospects for each.  相似文献   
82.
The Scent Transfer Unit (STU-100) is a portable vacuum that uses airflow through a sterile gauze pad to capture a volatiles profile over evidentiary items for subsequent canine presentation to assist law enforcement personnel. This device was evaluated to determine its ability to trap and release organic compounds at ambient temperature under controlled laboratory conditions. Gas chromatography-mass spectrometry (GC-MS) analyses using a five-component volatiles mixture in methanol injected directly into a capture pad indicated that compound release could be detected initially and 3 days after the time of collection. Additionally, 15 compounds of a 39-component toxic organic gaseous mixture (10-1000 parts per billion by volume [p.p.b.(v)]) were trapped, released, and detected in the headspace of a volatiles capture pad after being exposed to this mixture using the STU-100 with analysis via GC-MS. Component release efficiencies at ambient temperature varied with the analyte; however, typical values of c. 10% were obtained. Desorption at elevated temperatures of reported human odor/scent chemicals and colognes trapped by the STU-100 pads was measured and indicated that the STU-100 has a significant trapping efficiency at ambient temperature. Multivariate statistical analysis of subsequent mass spectral patterns was also performed.  相似文献   
83.
In forensics and archaeology, it is important to distinguish human from animal remains and to identify animal species from fragmentary bones and bloodstains. We report blind tests in which a protein radioimmunoassay (pRIA) was used to identify the species of six bone fragments lacking morphological specificity and 43 bloodstained lithic tools, knapped experimentally and soaked in blood of known animal and human origin. The submitters of the bone fragments and the bloodstained tools each listed a number of possible species, from which the testers selected the best match with the pRIA results. All six bone fragments were correctly identified: three humans, a deer, a dog, and a cow. Forty-three tools were stained with blood from a wide variety of species including ungulates, carnivores, a fish, and a bird. On 40 of these 43, at least one species (or blood-free control) was identified correctly. Some of the tools were stained with blood of two different species. A mixture of sheep and musk ox blood was correctly identified; in several other mixtures, only a single species was detected. Two tools with human blood and one with human sweat were correctly reported as human. There was a single false positive (one of three controls reported as weakly bovine) and no false negatives. We conclude that the pRIA technique shows a high degree of accuracy in discriminating human from animal bone fragments and bloodstains and in identifying animal species.  相似文献   
84.
85.
86.
Some observers of American politics have argued that Republicans have redrawn the social class basis of the parties by displacing the Democrats as the party of the common person. While others have addressed the argument by implication, we address the phenomenon itself. That is, we examine whether the populist rhetoric used by conservatives has reshaped the American public??s perceptions about the social class basis of American political parties. To this end, we used NES data and created novel survey questions for examining the class-based images of the parties. We examine whether the public holds populist images of the Republican Party and whether the working class and evangelical Christians are especially likely to hold this belief. Contrary to this argument, most Americans view the Democrats as the party of the people. Furthermore, working class and evangelical Christians are no less likely to hold this belief.  相似文献   
87.
Solis  Gary 《荷兰国际法评论》2012,59(2):312-316
Netherlands International Law Review -  相似文献   
88.
Many anarchists believe that a stateless society could and should feature laws. It might appear that, in so believing, they are caught in a contradiction. The anarchist objects to the state because its authority does not rest on actual consent, and using force to secure compliance with law in a stateless society seems objectionable for the same reason. Some people in a stateless society will have consented to some laws or law-generating mechanisms and some to others – while some will have consented to none. Someone’s obedience to a legal requirement could be justly enforceable absent the state, nonetheless, given either her actual consent to the requirement or to a mechanism responsible for generating it or the coextensiveness of the legal requirement with a moral requirement. And it could thus be just on the anarchist’s own terms to enforce a narrow range of positive legal requirements even against outlaws who had declined to consent to them.  相似文献   
89.
90.
Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007   总被引:3,自引:0,他引:3  
Rational choice perspectives maintain that seemingly irrational behavior on the part of terrorist organizations may nevertheless reflect strategic planning. In this paper we examine spatial and temporal patterns of terrorist attacks by the Spanish group ETA between 1970 and 2007. Our analysis is guided by a public announcement by ETA in 1978 that the group would shift from emphasizing attacks in the Basque territory to instead launch attacks more widely in the hopes of exhausting the Spanish government and forcing it to abandon the Basque territory. This announcement suggests that prior to the end of 1978 ETA attacks were based mostly on controlling territory in the Basque region that they hoped to rule; and after 1978 the organization decided to instead undertake a prolonged war of attrition. Accordingly, we argue that before the end of 1978 ETA was mostly perpetrating control attacks (attacking only within the Basque territories) and that the diffusion of attacks between provinces was mostly contagious (spreading contiguously). After the 1978 proclamation, we argue that the attack strategy shifted toward attrition (attacking in areas outside of the Basque territories) and that the attacks were more likely to diffuse hierarchically (spreading to more distant locations). As predicted, we find that after ETA moved toward a more attrition based attack strategy, subsequent attacks were significantly more likely to occur outside the Basque region and to target non-adjacent regions (consistent with hierarchical diffusion). We also find that hierarchical diffusion was more common when a longer time elapsed between attacks (a likely consequence of the fact that more distant attacks require more resources and planning) and that attacks against Madrid were unlikely to be followed immediately by more attacks on Madrid or surrounding provinces. After ETA announced a shift in policy, they maintained a highly dispersed attack strategy even during their period of decline. Using information about where and when prior attacks occurred could provide useful information for policy makers countering groups like ETA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号