首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1032篇
  免费   75篇
各国政治   18篇
工人农民   45篇
世界政治   19篇
外交国际关系   53篇
法律   414篇
中国共产党   28篇
中国政治   154篇
政治理论   96篇
综合类   280篇
  2024年   3篇
  2023年   21篇
  2022年   39篇
  2021年   28篇
  2020年   41篇
  2019年   32篇
  2018年   28篇
  2017年   41篇
  2016年   32篇
  2015年   28篇
  2014年   61篇
  2013年   83篇
  2012年   74篇
  2011年   55篇
  2010年   50篇
  2009年   47篇
  2008年   52篇
  2007年   65篇
  2006年   68篇
  2005年   59篇
  2004年   49篇
  2003年   40篇
  2002年   51篇
  2001年   27篇
  2000年   12篇
  1999年   4篇
  1998年   3篇
  1997年   1篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1983年   2篇
排序方式: 共有1107条查询结果,搜索用时 46 毫秒
821.
In recent years a bewildering array of smartphone applications (“apps”) has emerged to support separated parents' communication. Post-separation parenting apps vary in cost and features; they typically comprise a messaging tool, shared calendar, expense tracker and a means to export records for legal purposes. A key challenge for separated parents and family law practitioners alike is knowing which apps or app feature(s) can work well for different family contexts, needs and budgets. The present study sought to evaluate nine popular post-separation parenting apps and their features using small-n Human–Computer Interaction methods. Mediators role-played high conflict ex-couples while completing a set of five common post-separation communication or organizational tasks. A cross-case analysis of ratings was conducted. We found that (a) many of the mediators changed their apparent enthusiasm for co-parenting apps once they had used the apps themselves; (b) all nine apps were rated somewhere between “Poor” to Fair’; and (c) features of some of the best-known apps were not rated as highly as some of the features of more recent, lesser-known apps.  相似文献   
822.
In recent years a great deal of attention has turned to the need for policy-relevant research in criminology. Methodologically, attention has been trained on the use of randomized experimental designs and cumulative systematic reviews of evidence to accomplish this goal. Our work here reviews and demonstrates the utility of the Bayesian analytic framework, in the context of crime prevention and justice treatment studies, as a means of furthering the goals of research synthesis and creation of policy-relevant scientific statements. Evidence from various fields is used as a foundation for the discussion, and an empirical example illustrates how this approach might be useful in practical criminological research. It is concluded that Bayesian analysis offers a useful complement to existing approaches and warrants further inclusion in the ongoing discussion about how best to assess program effectiveness, synthesize evidence, and report findings from crime and justice evaluations in a way that is relevant to policy makers and practitioners.
Christopher J. SullivanEmail:

Christopher J. Sullivan   is an Assistant Professor in the Department of Criminology, University of South Florida, USA. He completed his doctorate at Rutgers University in 2005. His research interests include developmental criminology, juvenile delinquency and prevention policy, and research methodology and analytic methods. Recent publications have appeared in Criminology, Youth Violence and Juvenile Justiceand the Journal of Research in Crime and Delinquency. Dr. Thomas Mieczkowski   is a Professor and Chair of Criminology at the University of South Florida, USA. His research interests have included drug smuggling, theories of syndicated crime organizations, drug distribution organizations and methods, drug epidemiology, and the validation of various drug detection technologies. Dr. Mieczkowski has published over 100 scholarly articles, book chapters, and three books. He received his Ph.D. from Detroit’s Wayne State University in 1985.  相似文献   
823.
Abstract:  For any measurement of a person's height in an image, a difference exists between the actual height of the person and the image measurement. In order to gain knowledge about statistical behavior of differences between actual and measured heights it is necessary to make reference recordings, e.g., of test persons under the same recording conditions. To test whether the differences are dependent on camera and further circumstances, an experiment was set up which involved the measurement of 22 test persons using three cameras of varying quality. Reproducibility of measurements per image appears to be strongly dependent on the camera (quality), whereas systematic bias differs with the view point of the camera. Operator dependency of the measurement process is found, so its repetition by different operators is recommended.  相似文献   
824.
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.  相似文献   
825.
The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%.  相似文献   
826.
侦查僵局与侦查情势研究   总被引:4,自引:0,他引:4  
侦查情势理论要求侦查主体在侦查过程中正确、全面、发展地诠释和控制对侦查有意义的各种条件与状况 ;侦查主体未能正确地诠释侦查情势或未能根据侦查情势正确使用侦查方法是侦查僵局的成因 ;运用侦查情势理论 ,合理使用侦查方法 ,可以突破侦查僵局 ,实现侦查最优化。  相似文献   
827.
How do voters respond to candidates accused of sexual harassment? The literature on political scandals demonstrates that candidate characteristics, scandal type, and voter characteristics matter; as well as party affiliation. However, empirical evidence suggests that not all co-partisans react the same way. Why is this the case? Our study uses Schwartz's (1996) theory of values to hypothesise that voters prioritising ‘universalism’ and ‘benevolence’ are less likely to vote for candidates accused of sexual harassment compared to voters who prioritise ‘self-enhancement’ values. Using an original, mixed methods, online survey experiment (n = 704), we show that American voters do become less favourable towards candidates linked to allegations of sexual harassment; but a sizeable minority would nevertheless vote for a co-partisan candidate accused of sexual harassment. Values are an important mechanism to explain this heterogeneity. Qualitative data corroborates our findings, and helps explain why sexual harassment allegations are not always a barrier to electoral success.  相似文献   
828.
While digital policies provide significant value within contemporary governance, not many governments' digital policies are adapted to rapidly changing technologies and associated expectations. The limited adaptability can be explained by governments' focus on institutional shifts as an instrument to generate policy changes. Therefore, this article examines the impact of institutional shifts on digital policy by leveraging the Punctuated Equilibrium Theory (PET) as a lens to explore the Belgian federal government between 2000 and 2020. This is done through performing a distributional application of the PET and an explaining-outcome congruence case study. The results highlight the role of institutional shifts in directing digital policy, but also underscore the importance of other factors (i.e., policy image, attention allocation and/or structure of the political system) and the presence of policy entrepreneurs to explain the (in)stability of digital policy.  相似文献   
829.
关于夫妻共同债务构成的法理基础,现有法律、司法解释的规定基本存在两个范畴:一个是物权法财产共同共有理论,并试图把婚姻家庭内部行为与外部行为区别开来,提出夫妻共同财产包括积极财产和消极财产(消极财产即夫妻共同债务),该理论的核心是"财产共有则债务共担".另一个是"法律行为理论",其影响夫妻共同债务构成最主要的是夫妻双方有...  相似文献   
830.
吕国民 《河北法学》2006,24(8):38-41
作为一种全新的商业运作模式,数字化产品贸易给世界贸易注入了新的活力,同时也给WTO带来了一系列的规制问题,因为在这一贸易过程中,货物和服务之间的明显界限消失了,相同产品可以被当作货物、服务,也可以被当作特许合同.为此WTO成员展开了激烈争论,尚未达成一致意见.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号