首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   219篇
  免费   1篇
工人农民   5篇
世界政治   3篇
外交国际关系   16篇
法律   105篇
中国政治   21篇
政治理论   25篇
综合类   45篇
  2024年   4篇
  2023年   5篇
  2022年   2篇
  2021年   3篇
  2020年   5篇
  2019年   8篇
  2018年   6篇
  2017年   7篇
  2016年   11篇
  2015年   8篇
  2014年   28篇
  2013年   33篇
  2012年   24篇
  2011年   12篇
  2010年   13篇
  2009年   8篇
  2008年   8篇
  2007年   12篇
  2006年   8篇
  2005年   2篇
  2004年   4篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1997年   1篇
排序方式: 共有220条查询结果,搜索用时 0 毫秒
131.
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance.  相似文献   
132.
视频监控技术在安防方面正发挥着越来越重要的作用,这一技术已经得到公安部门的广泛重视,但随着视频监控技术的发展,一些负面作用也将会出现。其中主要包括监控视频的伪造和篡改,这将会严重影响视频监控的发展和应用。因此,开展监控视频鉴定技术研究迫在眉睫。本文从视频监控的数字化导致监控视频容易被修改,视频监控网络化导致视频监控系统容易被入侵的特点分析了监控视频鉴定的必要性;简要介绍了监控视频鉴定的基本方法;总结了监控视频鉴定的难点并对监控视频鉴定的发展方向进行了展望。  相似文献   
133.
随着侦查理论研究和实践的广泛运用,利用视频监控侦查破案势必成为一条全新、简捷、高效的侦查途径。但当前视频监控在建设、运用和法律规范方面仍存在一些尚需解决的问题。随着"科技强警"理念的不断深入,我们要积极转变传统思维,使视频监控在侦查实践中的作用最大化发挥,从而更好地保障社会稳定和公民基本权利。  相似文献   
134.
建国以来,党的制度建设道路是曲折的,期间有停滞,但更有突破,最终走向全面推进和深入发展。党不断改革完善自身领导制度,坚持科学执政民主执政依法执政,健全完善组织制度,建立健全党内民主制度和监督制度。党的制度建设的经验表明,党必须坚持把制度建设放在更加重要的位置,加强党内规章制度建设,实现党内民主的制度化、程序化,坚持党内规章制度与国家法律法规的协调配合,努力增强制度的科学性、系统性。  相似文献   
135.
以委托—代理理论和信息经济学中的监督模型为基础,通过对政府和公务员二者在完全信息静态博弈下的混合战略分析可见,租金的高低、政府监督的成本和对寻租的公务员惩罚的力度是影响公务员寻租的三个主要因素。我们应通过健全社会舆论与群众监督机制,提高公务员的道德水平,加大对公务员寻租行为的法制惩罚力度,加大对寻租者的物质惩罚力度,健全社会主义市场经济体制,消除租源等措施来防止公务员寻租。  相似文献   
136.
从理性选择角度分析作案人,可以推测其在实施犯罪后大多会逃离犯罪现场,销毁犯罪证据,隐匿身份,这些活动过程必然会在一定的时间、空间得以体现。而以案件现场为基准点,根据视频监控系统中记录犯罪嫌疑人案发前的活动情况、案发后活动行踪,以还原行为轨迹,从而分析其下一步将会出现的时间点和活动区域。狭义的目标轨迹概念是指造型体在时空运动中,通过信息交换,遗留在承受体上记录其社会交互活动状况的总和。它以社会网络分析、信息交换、数据挖掘等原理为支撑。可以以人员轨迹、车辆轨迹、涉案的特定物等为标识,通过运用时序、空间、信息联查等方法,分析视频监控信息中的目标轨迹。  相似文献   
137.
    
At present, very little research has been devoted to investigating the ability of laser scanning technology to accurately measure height from surveillance video. The goal of this study was to test the accuracy of one particular laser scanner to estimate suspect height from video footage. The known heights of 10 individuals were measured using an anthropometer. The individuals were then recorded on video walking along a predetermined path in a simulated crime scene environment both with and without headwear. The difference between the known heights and the estimated heights obtained from the laser scanner software were compared using a one-way t-test. The height estimates obtained from the software were not significantly different from the known heights whether individuals were wearing headwear (p = 0.186) or not (p = 0.707). Thus, laser scanning is one technique that could potentially be used by investigators to determine suspect height from video footage.  相似文献   
138.
    
Developments in technology have created the possibility for law enforcement authorities to use for surveillance purposes devices that are in the hands or private premises of individuals (e.g. smart phones, GPS devices, smart meters, etc.). The extent to which these devices interfere with an individual's private sphere might differ. In the European Union, surveillance measures are considered lawful if they have been issued in conformity with the legal rules and the proportionality principle. Taking a fundamental rights approach, this paper focuses on the information needed for adopting proportionate decisions when authorizing the use for surveillance of devices that are not built for surveillance purposes. Since existing methods of privacy assessment of technologies do not offer the required information, this paper suggests the need for a new method of assessing privacy implications of technologies and devices which combines an assessment of privacy aspects with the different dimensions of surveillance.  相似文献   
139.
    
Communication technologies, such as the mobile phone, often represent a double-edged sword in romantic relationships. While the mobile phone can enhance the quality of communication, it can simultaneously become a source of conflict. The dialectic framework of communication privacy management offers a nuanced lens from which to investigate rules for the use of the mobile phone in the dyadic of romantic relationships. This study investigates mobile phone usage rules that are negotiated by adolescents and young adults in romantic relationships. The study specifically focuses on rules around mobile privacy management. Findings from in-depth interviews indicate that the negotiation of rules is a crucial part of young adult relationships. Enhancing trust and fostering harmony were important factors in the rule development process. The implications, limitations, and future possibilities for research are discussed.  相似文献   
140.
视频监控系统在侦查中的应用价值   总被引:2,自引:0,他引:2  
严峻的犯罪形势要求公安机关转变侦查破案的思维方式,创新打击犯罪的策略方法,向科技要警力。视频监控系统在打击犯罪中具有传统侦查手段所不具备的独特价值,在预防犯罪、抓获犯罪嫌疑人、固定证据和案件串并等方面发挥着重要的作用。但视频监控系统在建设、具体应用和法律规范方面还存在一些问题需要研究解决。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号