首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   270篇
  免费   9篇
各国政治   41篇
工人农民   4篇
世界政治   18篇
外交国际关系   10篇
法律   120篇
中国政治   1篇
政治理论   81篇
综合类   4篇
  2020年   8篇
  2019年   8篇
  2018年   10篇
  2017年   10篇
  2016年   4篇
  2014年   8篇
  2013年   43篇
  2012年   4篇
  2011年   5篇
  2010年   2篇
  2009年   6篇
  2008年   6篇
  2007年   6篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   5篇
  2001年   8篇
  2000年   5篇
  1999年   5篇
  1998年   2篇
  1997年   3篇
  1995年   3篇
  1994年   4篇
  1992年   4篇
  1991年   2篇
  1990年   2篇
  1988年   5篇
  1987年   6篇
  1986年   10篇
  1985年   5篇
  1984年   5篇
  1983年   6篇
  1982年   4篇
  1981年   3篇
  1980年   3篇
  1978年   3篇
  1977年   3篇
  1976年   3篇
  1975年   4篇
  1974年   2篇
  1973年   3篇
  1972年   2篇
  1971年   3篇
  1970年   3篇
  1969年   5篇
  1968年   4篇
  1967年   4篇
  1966年   5篇
  1964年   2篇
排序方式: 共有279条查询结果,搜索用时 15 毫秒
191.
192.
193.
194.
195.
196.
197.
This paper examines how three sustainability factors (water supply, regulatory policy, local management) are affecting the sustainability of a community water supply project in Kenya. Findings show that after 10 years the project is at a threshold of sustainability – it may yet fail. Changing rainfall patterns and additional withdrawals from new projects are threatening available water supply. The community is resisting compliance with water sector reforms including those intended to benefit community-managed projects. Community management deficiencies and a lack of supportive external relationships are impeding project continuity and sustainable local water management.  相似文献   
198.
199.
The British criminology community has been orphaned this year. The deaths of Stan Cohen, Mary McIntosh and now Geoff Pearson have left many of us feeling bereft. Barbara Hudson's reflection on Stan's career in the June 2013 issue of Criminal Justice Matters was adorned with memories of his kindness and unerring decency. For those of us fortunate to have known Geoff well and work alongside him there are clear parallels. Geoff Pearson left us a glittering legacy of scholarly works that have become embedded into the ‘common sense’ of criminological theory. Yet, Geoff himself was no lofty scholar, he was one of the most approachable and personable individuals one could wish to meet: generous with his time, interested in the views and experiences of others and a passionate advocate for the outsider.  相似文献   
200.
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号