首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115篇
  免费   11篇
工人农民   1篇
外交国际关系   1篇
法律   102篇
中国政治   4篇
政治理论   3篇
综合类   15篇
  2024年   1篇
  2023年   3篇
  2022年   5篇
  2021年   2篇
  2020年   8篇
  2019年   5篇
  2018年   1篇
  2017年   4篇
  2016年   3篇
  2015年   4篇
  2014年   9篇
  2013年   8篇
  2012年   15篇
  2011年   12篇
  2010年   6篇
  2009年   3篇
  2008年   9篇
  2007年   10篇
  2006年   3篇
  2005年   5篇
  2004年   8篇
  2000年   1篇
  1988年   1篇
排序方式: 共有126条查询结果,搜索用时 15 毫秒
91.
商业银行的资产业务不断地发展,传统的授信模式也随之发生改变,以往多以房产抵押或者信用为主,现今增加了担保措施和还款来源。应收账款作为还款来源以及担保措施之一也日益凸显重要性,在实际操作中,主要包括应收账款转让和应收账款质押。为了利益最大化,债权人可能重复处理债权,将债权同时用于转让和质押,以获得更多的融资的情形,二者并存时难免会产生冲突。所以,应从应收账款转让与应收账款质押的基础理论出发,分析相关法律关系以及并存现状,从而对确立冲突解决规则提出建议。  相似文献   
92.
抵押担保是实践中常见的一种防范债权风险,保障交易安全的债权担保方式.由于抵押关系中不转移担保物的实际占有,在同一物上设立多个抵押权成为可能.抵押物变卖时,并存于同一抵押物之上的数个抵押权以什么顺序获偿涉及抵押权能否实现以及能够实现的范围,由此引发了抵押权顺位的问题.我国《担保法》及其司法解释和《物权法》就抵押权顺位的规定均提之甚少,而抵押权的顺位实则蕴涵着抵押权人可能获偿的利益,对抵押权人来说具有重要的意义,同时也影响着抵押物所有人的再融资,所以,对抵押权顺位的研究颇具现实意义.  相似文献   
93.
商标侵权如何进行判断,是商标法理论与实践中极其重要的课题,由于我国商标法立法中关于商标侵权判断的规定存在较多争议,司法实践中也遇到各种问题均难以解决,文章就商标侵权的判断核心进行论述,分析了各国立法例,探讨了有关商标侵权判定标准的合理立法模式。  相似文献   
94.
论适时审判请求权   总被引:1,自引:0,他引:1  
韩红俊 《法律科学》2011,(5):134-142
适时审判请求权是诉权的重要组成部分。诉讼外纠纷解决方式的倡导、民事审限制度的规定和法院诉讼促进义务的强化皆从一定程度上促进了法院适时裁判。但若能基于案件性质和当事人需求等因素对某些案件予以优先审理,并对诉讼拖延提供事前预防和事后的救济措施,将会给当事人的适时审判请求权提供充分的保障。  相似文献   
95.
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance.  相似文献   
96.
关于任务型教学法的几个问题   总被引:1,自引:0,他引:1  
任务教学法是教师通过引导学生完成各种任务来实现教学目标,即用目标语进行有目的交际的教学活动。任务型教学法分为“结构型”、“交际型”和“中间型”三种模式。结合我国外语教学实践,“中间型”模式更适合我国外语教学。  相似文献   
97.
Recent challenges to fingerprint evidence have brought forward the need for peer-reviewed scientific publications to support the evidential value assessment of fingerprint. This paper proposes some research directions to gather statistical knowledge of the within-source and between-sources variability of configurations of three minutiae on fingermarks and fingerprints. This paper proposes the use of the likelihood ratio (LR) approach to assess the value of fingerprint evidence. The model explores the statistical contribution of configurations of three minutiae using Tippett plots and related measures to assess the quality of the system. Features vectors used for statistical analysis have been obtained following a preprocessing step based on Gabor filtering and image processing to extract minutia position, type, and direction. Spatial relationships have been coded using Delaunay triangulation. The metric, used to assess similarity between two feature vectors is based on an Euclidean distance measure. The within-source variability has been estimated using a sample of 216 fingerprints from four fingers (two donors). Between-sources variability takes advantage of a database of 818 ulnar loops from randomly selected males. The results show that the data-driven approach adopted here is robust. The magnitude of LRs obtained under the prosecution and defense propositions stresses upon the major evidential contribution that small portions of fingermark, containing three minutiae, can provide regardless of its position on the general pattern.  相似文献   
98.
99.
100.
目的建立计算亲子鉴定亲权指数(PI)和个体识别似然比(LR)的计算软件。方法依据相关行业规范和文献中给出的计算方法,利用计算机语言Visual Basic 6.0编写程序。结果开发出适用于PI和LR的计算软件。结论该计算软件可以帮助工作人员提高计算效率,服务法医物证工作。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号