首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   31篇
各国政治   3篇
工人农民   1篇
世界政治   3篇
外交国际关系   7篇
法律   229篇
中国共产党   1篇
中国政治   28篇
政治理论   17篇
综合类   35篇
  2024年   1篇
  2023年   12篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   21篇
  2018年   19篇
  2017年   23篇
  2016年   19篇
  2015年   19篇
  2014年   43篇
  2013年   31篇
  2012年   11篇
  2011年   17篇
  2010年   14篇
  2009年   13篇
  2008年   5篇
  2007年   12篇
  2006年   6篇
  2005年   7篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有324条查询结果,搜索用时 31 毫秒
91.
Based on extended fieldwork among Ful?e Wo?aa?e in Niger and by analysing an ethnographic case, this paper discusses aspects of continuity and change in the practice of a culture-specific form of elopement marriage, called te’egal, in which a married woman leaves her husband to marry a man from another clan. The discussion focuses on two major aspects: (1) the extensive use of mobile phone communication in arranging and logistically managing elopement, and (2) the increasing police involvement in the settlement of te’egal cases. Mobile phone use in the context of elopement is interpreted as a modern means of achieving cultural ends. It acts as a catalyst, making elopement more dynamic. In the wider context of globalization and urbanity, however, this leads not simply to continuity but also to contradictions, as the moral and legal institutions of the state increasingly interfere with the normative framework of customary law.  相似文献   
92.
郭旨龙 《法学杂志》2020,(3):101-113
评估执法的正当需求和手机用户的合法权益成为移动互联网时代的程序规制命题。移动设备搜查对警察权力的重要性和公民权利保护的重要性日益凸显,应当将移动设备视为人们具有合理信赖的一个信息隐私空间。英国、美国的手机搜查规范上的域内不统一导致搜查实践的多样态、公民权利的保护缺陷。但其应对证据的移动电子化的基本思路——根据信息种类或其他变量进行立法,区别对待搜查条件——对中国相关搜查问题的解释和解决具有镜鉴意义。我国需要考虑确立获得搜查批准的原则,通过类型化规则给执法提供明确指导,并且明确搜查后的系列权利保障,进行电子搜查规则的适时调整与动态平衡。  相似文献   
93.
手机通话语音的实验研究   总被引:1,自引:0,他引:1  
当前,手机通话语音已成为司法语音鉴定中最为常见的一种语音形式。本研究从手机通信系统的信道特点出发,分析手机通话语音的声谱特点和共振峰频率变化等情况;同时还比较了不同通话网络、不同通话方式及不同手机的通话语音特点。实验发现,手机通话语音与直接录音语音有明显的变化,主要表现在高低频信息的带宽滤波效应、高低频共振峰的漂移、语音质量、音色、韵律特征等方面;还发现,不同手机通话条件下的语音变化程度不同。最后,讨论了手机通话语音变化对说话人鉴定的影响及鉴定中的注意事项。  相似文献   
94.
田毅鹏 《思想战线》2007,33(2):36-42
作为“流动的现代性”,轿车文明对当代城市社会发展的影响,绝不仅仅表现在便利快捷、产业利润、交通拥堵、噪音污染、尾气排放等具体而有形的利害层面,最具实质意义的是从根本上重塑了都市社会空间,并导致郊区的勃兴和内城的衰落、“公共领域”的私有化、城市空间的分化与隔离、“私”空间的流动性等剧烈变动。  相似文献   
95.
首先分析了网络取证的基本概念,然后介绍了网络取证系统的分析过程,最后提出和设计了一个分布式网络实时取证系统的实现模型。  相似文献   
96.
97.
我国20年来关于农业劳动力转移的讨论,较多关注劳动力转移的数量以及劳动力转移对于经济发展的意义,较少关注已经完成行业转移的农民面临怎样的社会环境,“农民工”谤种就业模式具有低地位职业、低技术劳动、流动就业这三个基本特征,氏地位主要形成于先赋的原因;劳动素质低和社会网支持差是低技术劳动的原因;家庭经济选择是就业流动性大的原因。“农民工”就业模式将成为一种持续存在的社会问题。  相似文献   
98.
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situations. The procedure's aim of minimising disruption to the data centre during the acquisition process is achieved through the use of RAM forensics. This affords initial cluster reconnaissance which in turn facilitates targeted data acquisition on the identified DataNodes. To evaluate the methodology's feasibility, a small Hadoop Distributed File System (HDFS) was configured and forensic artefacts simulated upon it by deleting data originally stored in the cluster. RAM acquisition and analysis was then performed on the NameNode in order to test the validity of the suggested methodology. The results are cautiously positive in establishing that RAM analysis of the NameNode can be used to pinpoint the data blocks affected by the attack, allowing a targeted approach to the acquisition of data from the DataNodes, provided that the physical locations can be determined. A full forensic analysis of the DataNodes was beyond the scope of this project.  相似文献   
99.
Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well‐defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.  相似文献   
100.
Over the past decade, a substantial effort has been put into developing methods to classify file fragments. Throughout, it has been an article of faith that data fragments, such as disk blocks, can be attributed to different file types. This work is an attempt to critically examine the underlying assumptions and compare them to empirically collected data. Specifically, we focus most of our effort on surveying several common compressed data formats, and show that the simplistic conceptual framework of prior work is at odds with the realities of actual data. We introduce a new tool, zsniff, which allows us to analyze deflate-encoded data, and we use it to perform an empirical survey of deflate-coded text, images, and executables. The results offer a conceptually new type of classification capabilities that cannot be achieved by other means.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号