首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   857篇
  免费   1篇
各国政治   38篇
工人农民   22篇
世界政治   30篇
外交国际关系   41篇
法律   198篇
中国共产党   14篇
中国政治   139篇
政治理论   105篇
综合类   271篇
  2024年   2篇
  2023年   4篇
  2022年   4篇
  2021年   5篇
  2020年   19篇
  2019年   5篇
  2018年   20篇
  2017年   17篇
  2016年   18篇
  2015年   16篇
  2014年   28篇
  2013年   87篇
  2012年   65篇
  2011年   56篇
  2010年   58篇
  2009年   69篇
  2008年   50篇
  2007年   61篇
  2006年   63篇
  2005年   42篇
  2004年   57篇
  2003年   38篇
  2002年   33篇
  2001年   23篇
  2000年   15篇
  1998年   1篇
  1996年   1篇
  1994年   1篇
排序方式: 共有858条查询结果,搜索用时 15 毫秒
661.
论交际策略在高职高专英语教学中的应用   总被引:1,自引:0,他引:1  
交际策略是语言交际能力的一个重要组成部分,在外语习得中具有重要的作用。由于东西方语言和文化的差异,往往导致高职高专学生在用英语交流时常出现交流受阻或中断的情况。因而,利用真实或模拟的语境让学生了解文化差异,培养学生的交际策略意识和能力,使其在实际交流过程中有意识地扬长避短,才能切实提高学生的英语交际水平。  相似文献   
662.
高志宏 《时代法学》2012,10(4):14-26
公共利益在实现过程中面临诸多困境。尤其是在我国城市化进程中,公共利益的异化、虚化和泛化现象严重,个人利益和政府利益也经常假借、冒用公共利益。程序规范是突破公共利益困境的重要途径,也是公共利益实现的应有之义。我国目前的制度安排和法律实践中忽视了程序规则。公共利益的程序规则包括公开透明的公共利益调查程序、民主科学的公共利益决定程序、公正公平的公共利益审查程序。程序规则并非绝对完美无瑕,不能将公共利益的程序正义绝对化。  相似文献   
663.
Memory analysis has gained popularity in recent years proving to be an effective technique for uncovering malware in compromised computer systems. The process of memory acquisition presents unique evidentiary challenges since many acquisition techniques require code to be run on a potential compromised system, presenting an avenue for anti-forensic subversion. In this paper, we examine a number of simple anti-forensic techniques and test a representative sample of current commercial and free memory acquisition tools. We find that current tools are not resilient to very simple anti-forensic measures. We present a novel memory acquisition technique, based on direct page table manipulation and PCI hardware introspection, without relying on operating system facilities - making it more difficult to subvert. We then evaluate this technique's further vulnerability to subversion by considering more advanced anti-forensic attacks.  相似文献   
664.
In this paper, we exploit the specificity of going-private transactions that are initiated by the historic controlling shareholders (i.e. voluntary delistings). In Continental Europe, the majority of firms that become private do so following a buyout offer with squeeze-out (BOSO); using this mechanism, the controlling shareholder can cash out minorities and take the firm private. We argue that the decision to go private results from a cost–benefit analysis. Moreover, we pay particular attention to the consequences and the related costs of compliance resulting from the passage of the French Financial Security Law (FSL) in 2003. A quantitative study was performed using a unique dataset spanning 1997–2006. This data set consists of 140 French firms, of which 70 were voluntarily delisted via BOSO and 70 were industry-matched control firms. Univariate analysis and logistic regressions support the cost–benefit analysis: when listing benefits decrease because of weak liquidity and/or weak analyst coverage, it seems better for the firm to go private. Furthermore, the inherent characteristics of delisted firms (i.e. performance, leverage, and risk as measured by the beta factor) appear to be important driving factors of delisting. The passage of the FSL has strengthened the impact of these characteristics on the decision to go private. Mature firms that have weak performance and low specific risk and that are not financially constrained by debt will decide to go private because they cannot afford the listing status anymore. Finally, we show that the driving factors of delisting differ according to the identity of the controlling shareholder; specifically, the level of risk appears to be the strongest determinant for family firms, while non-family firms also consider their own financial structure.  相似文献   
665.
666.
《Digital Investigation》2014,11(1):30-42
The pervasive availability of cheap cloud computing services for data storage, either as persistence layer to applications or as mere object store dedicated to final users, is remarkably increasing the chance that cloud platforms potentially host evidence of criminal activity. Once presented a proper court order, cloud providers would be in the best position for extracting relevant data from their platforms in the most reliable and complete way. However, this kind of services are not so widespread to date and, therefore, the need to adopt a structured and forensically sound approach calls for innovative weaponry which leverage the data harvesting capabilities offered by the low level program interfaces exposed by providers. This paper describes the concepts and internals of the Cloud Data Imager Library, a mediation layer that offers a read only access to files and metadata of selected remote folders and currently supports access to Dropbox, Google Drive and Microsoft Skydrive storage facilities. A demo application has been build on top of the library which allows directory browsing, file content view and imaging of folder trees with export to widespread forensic formats.  相似文献   
667.
    
Abstract

Euromaidan and the subsequent Russian military intervention brought about a perceptible change in ethnonational identifications of Ukrainian citizens. Based on three nationwide surveys from various years, the present article seeks to measure this shift and explore its underlying factors and mechanisms. My analysis reveals considerable changes in ethnolinguistic identifications, practices of language use, and preferences regarding language policies of the state, which can be seen as a kind of bottom-up de-Russification, a popular drift away from Russianness. At the same time, I demonstrate that changes in identifications by nationality and native language are related to changes in the perceptions of these categories; that is, that they should be conceptualized as measuring people’s perceived belonging to both ethnic groups and civic nations. In other words, as people are shedding their Russianness in favor of Ukrainianness, they are also changing the meaning of being Ukrainian.  相似文献   
668.
    
There is an established body of literature surveying the role of language policy in identity construction. This paper exposes an angle that has been understudied. It suggests that national song festivals may be seen as a tool of ‘implicit’ language policy in Estonia. Informed by expert interviews and ethnographic, this study explores the tensions arising from the dual function of the festival. On the one hand, it sustains the language as the central ethnic-national attribute of Estonians. On the other hand, the ‘affective solidarity’ stemming from joint singing could support a stronger civic attachment to the language and state (by Russian-speaking minorities).  相似文献   
669.
企业社会责任与品牌资产关系尚未明确,究其缘由,以往研究忽略了对信息传递方式的分析。本文在系统梳理国内外相关研究文献基础上,将信息传递方式引入模型,将Howard的消费者决策模型作为理论依据,分析了企业社会责任不同维度(环境责任、社区责任和消费者责任)和品牌信任及品牌资产与其维度(品牌联想、感知质量和品牌忠诚)的作用关系,并分析了不同信息传递方式在企业社会责任和品牌信任作用过程中的调节效应。研究表明,企业环境责任对品牌忠诚和品牌资产作用关系显著;社区责任仅与品牌联想的作用关系显著;消费者责任通过品牌信任间接影响品牌资产及各维度。信息传递方式在企业社会责任和品牌信任作用过程中存在调节效应。  相似文献   
670.
本文基于对体验学习在哲学和心理学等方面理论基础的分析,进而从语言的起源、外语学习的社会体验性、外语学习的交际体验性、以及外语教学目标等四个方面,来探讨外语学习的体验属性,即外语学习体验观。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号