首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   602篇
  免费   37篇
各国政治   50篇
工人农民   32篇
世界政治   65篇
外交国际关系   57篇
法律   268篇
中国政治   3篇
政治理论   154篇
综合类   10篇
  2023年   3篇
  2022年   3篇
  2021年   6篇
  2020年   7篇
  2019年   16篇
  2018年   21篇
  2017年   32篇
  2016年   27篇
  2015年   33篇
  2014年   19篇
  2013年   111篇
  2012年   16篇
  2011年   31篇
  2010年   15篇
  2009年   33篇
  2008年   37篇
  2007年   28篇
  2006年   30篇
  2005年   24篇
  2004年   17篇
  2003年   17篇
  2002年   20篇
  2001年   8篇
  2000年   8篇
  1999年   4篇
  1998年   5篇
  1997年   8篇
  1996年   3篇
  1995年   4篇
  1994年   2篇
  1993年   2篇
  1992年   7篇
  1991年   3篇
  1990年   5篇
  1989年   4篇
  1988年   3篇
  1986年   2篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1979年   2篇
  1978年   1篇
  1977年   4篇
  1975年   1篇
  1973年   1篇
  1971年   1篇
  1968年   1篇
  1966年   1篇
排序方式: 共有639条查询结果,搜索用时 31 毫秒
201.
202.
The European Commission's Directorate General Taxation and CustomsUnion (DG TAXUD), in charge of the monitoring of border measuresunder Regulation 1383/2003, invited right-holders and otherinterested parties to an informal meeting in Brussels on 24February 2006.  相似文献   
203.
204.
205.
Marc A. Fried 《Society》1966,3(6):42-47
  相似文献   
206.
207.
ABSTRACT

This article draws from the concept of assemblages in order to examine the component parts of contemporary international interventions. It argues that in contrast mainstream analyses of statebuilding and peacebuilding, as well as more critical treatments that tie interventions to the concept of 'international order', the concept of assemblages offers a more compelling vantage point from which to examine the disparate lines of forces that make up modern-day interventions. The article proposes an exploration of some of the component parts that sustain the current assemblage of governance, security, and international intervention and draws our attention to their self-sustaining rationalities.  相似文献   
208.
As scientists are motivated by readership rather than by royalties, one might doubt that academic copyright is required for stimulating research. Consequently, establishing an open access regime is currently intensively being discussed. We contribute to the literature by using a contest-model in which differently talented researchers compete for limited journals space. The contest perspective adds a rent-seeking motive into the publishing game which questions that private incentives for research are always too low due to the positive externalities of scientific progress. In our model, open access always leads to higher social welfare when incentives are too high. When incentives are too low, then open access is only superior if the benefits from larger readership is sufficiently high.  相似文献   
209.
Levamisole, which is used as an adulterated compound of cocaine, is currently being seen year after year in cocaine intoxication. For a few cases in the last decade, necrotic purpura and neutropenia after levamisole/cocaine intoxication have been described in the medical community. Herein, we present an original case of levamisole intoxication of a 40‐year‐old woman who smoked heroin and cocaine few during a month. She rapidly presented an extensive necrotic purpura of the nose, cheeks and extremities (lower and upper), and immunologic reactions (positive anti‐MPO and anti‐HNE). Levamisole was detected on hairs with ultra‐high performance liquid chromatography and tandem mass spectrometry. The case reports also a probable cocaine supplier deceit, which bring pure drug for hospital investigation after the intoxication of his client. The intoxicated woman had survived with several skin and chronic pain complications. That case recalls the knowledge about levamisole with a short review of the forensic literature.  相似文献   
210.
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号