全文获取类型
收费全文 | 270篇 |
免费 | 9篇 |
专业分类
各国政治 | 41篇 |
工人农民 | 4篇 |
世界政治 | 18篇 |
外交国际关系 | 10篇 |
法律 | 120篇 |
中国政治 | 1篇 |
政治理论 | 81篇 |
综合类 | 4篇 |
出版年
2020年 | 8篇 |
2019年 | 8篇 |
2018年 | 10篇 |
2017年 | 10篇 |
2016年 | 4篇 |
2014年 | 8篇 |
2013年 | 43篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 2篇 |
2009年 | 6篇 |
2008年 | 6篇 |
2007年 | 6篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 5篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1988年 | 5篇 |
1987年 | 6篇 |
1986年 | 10篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1974年 | 2篇 |
1973年 | 3篇 |
1972年 | 2篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1969年 | 5篇 |
1968年 | 4篇 |
1967年 | 4篇 |
1966年 | 5篇 |
1964年 | 2篇 |
排序方式: 共有279条查询结果,搜索用时 15 毫秒
191.
192.
193.
194.
195.
196.
197.
This paper examines how three sustainability factors (water supply, regulatory policy, local management) are affecting the sustainability of a community water supply project in Kenya. Findings show that after 10 years the project is at a threshold of sustainability – it may yet fail. Changing rainfall patterns and additional withdrawals from new projects are threatening available water supply. The community is resisting compliance with water sector reforms including those intended to benefit community-managed projects. Community management deficiencies and a lack of supportive external relationships are impeding project continuity and sustainable local water management. 相似文献
198.
199.
Harry Blagg 《Criminal Justice Matters》2013,92(1)
The British criminology community has been orphaned this year. The deaths of Stan Cohen, Mary McIntosh and now Geoff Pearson have left many of us feeling bereft. Barbara Hudson's reflection on Stan's career in the June 2013 issue of Criminal Justice Matters was adorned with memories of his kindness and unerring decency. For those of us fortunate to have known Geoff well and work alongside him there are clear parallels. Geoff Pearson left us a glittering legacy of scholarly works that have become embedded into the ‘common sense’ of criminological theory. Yet, Geoff himself was no lofty scholar, he was one of the most approachable and personable individuals one could wish to meet: generous with his time, interested in the views and experiences of others and a passionate advocate for the outsider. 相似文献
200.
Harry Wechsler 《政策研究评论》2012,29(1):63-89
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance. 相似文献