首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   243篇
  免费   21篇
工人农民   4篇
世界政治   1篇
法律   155篇
中国共产党   1篇
中国政治   15篇
政治理论   10篇
综合类   78篇
  2023年   3篇
  2022年   2篇
  2021年   4篇
  2020年   13篇
  2019年   3篇
  2018年   2篇
  2017年   2篇
  2016年   4篇
  2015年   3篇
  2014年   11篇
  2013年   13篇
  2012年   20篇
  2011年   24篇
  2010年   17篇
  2009年   15篇
  2008年   18篇
  2007年   18篇
  2006年   24篇
  2005年   20篇
  2004年   18篇
  2003年   9篇
  2002年   11篇
  2001年   5篇
  2000年   2篇
  1999年   3篇
排序方式: 共有264条查询结果,搜索用时 15 毫秒
251.
在目前国内有关刑事和解的理论研究和实务操作中,均存在着过度抬高被害人地位的问题,似乎只要被害人谅解犯罪嫌疑人,案件就可以无条件地适用刑事和解。而从本质上讲,犯罪嫌疑人和被害人之间的和解协议能否得到司法机关的认可并导致量刑上的从宽处理,既取决于被害人有无刑事实体处分权,也受到犯罪嫌疑人的人身危险性等因素的制约。因此,被害人的谅解并不是刑事和解的核心要素,应当重视犯罪客体在刑事和解中的价值,它决定着被害人刑事实体处分权的有无与刑事和解的适用范围。  相似文献   
252.
诉讼证明的终极对象为实体法律要件事实,对实体法律要件事实的价值评判和利益衡量以及要件事实与行为结果之间因果关系的判断,决定着立法者对实体法律要件事实的摄取和规定。"法律真实论"在理论上难以成立,以此指导司法实践也是有害的,因此,应当坚持客观真实的诉讼证明标准。由于诉讼证明标准是对司法者认定实体法律要件事实的应然要求,即追求实体法律要件事实的客观存在,因此,刑事诉讼与民事诉讼的诉讼证明标准应为一元制。  相似文献   
253.
论社会危害性理论与实质刑法观的关联关系与风险防范   总被引:1,自引:0,他引:1  
社会危害性理论与法益理论确实可以成为实质刑法观的理论基础,但是社会危害性理论与实质刑法观的关联性比较复杂,并非如部分学者所提示的那样一一对应。就持有传统社会危害性理论立场的学者而言,他们其实并非可以简单地归入实质刑法观立场;而主张改革完善传统社会危害性理论的部分学者,反而坚持实质刑法观立场。在中国语境下,实质刑法观面临的风险与批评,主要根源就在于作为实质刑法观理论基础的社会危害性理论具有太过强大的解释功能,且实质解释论的功能表现包括了保障人权的正面功能与严重侵犯人权的负面功能的两面,呈现出矛盾属性。为了防范风险,不但需要发展实质刑法观,而且需要完善社会危害性理论。单面的实质刑法观或者保守的实质刑法观,主张通过实质罪刑法定原则的限制、实质犯罪论的限制与实质司法解释权的限制,以有效防范开放的实质刑法观可能存在的侵蚀人权保障机能的风险,因而应当成为当下中国最理想的选择。  相似文献   
254.
Biometrics contributes a new dimension to authentication and identification process of persons. Besides knowledge (passwords) and possession (smart cards), biometrics provides new means of personal identification. Biometrics procedures are used to recognize or verify behavioral or physical characteristics of a person. Also biometry provides us with a user-friendly method for automatically identification and becoming a competitor for current identification systems, especially for electronic transactions. Cause of biometric increasing position in electronic transaction and security identification system we must to assure perfect information security tools to purpose stability such a systems. But before deploying any security tools or system, one should carefully examine the sensibility and added value of it, as we do in our daily work. However, there are ways to compromise a system based on biometric identification. This article focuses on the future and draw-after of biometric identification, specifically implication on tomorrow's network society.  相似文献   
255.
When in forensic casework or empirical research in‐person assessment of human decomposition is not possible, the sensible substitution is color photographic images. To date, no research has confirmed the utility of color photographic images as a proxy for in situ observation of the level of decomposition. Sixteen observers scored photographs of 13 human cadavers in varying decomposition stages (PMI 2–186 days) using the Total Body Score system (total n = 929 observations). The on‐site TBS was compared with recorded observations from digital color images using a paired samples t‐test. The average difference between on‐site and photographic observations was ?0.20 (t = ?1.679, df = 928, p = 0.094). Individually, only two observers, both students with <1 year of experience, demonstrated TBS statistically significantly different than the on‐site value, suggesting that with experience, observations of human decomposition based on digital images can be substituted for assessments based on observation of the corpse in situ , when necessary.  相似文献   
256.
This paper presents investigations into the ability of speaker verification technology to discriminate between identical twins. It is shown that whilst, in general, the genetic and non-genetic characteristics of voice are both of value to speaker verification capabilities, it is the latter which is highly beneficial in the separation of the speech of identical twins. It is further demonstrated that through the use of unconstrained cohort normalisation as a complementary means for the exploitation of such voice characteristics, the verification reliability can be considerably enhanced for both identical twins and unrelated speakers. Experiments were conducted using a bespoke clean-speech database consisting of utterances from 49 identical twin pairs. The paper details the problem in speaker verification posed by identical twins, discusses the experimental investigations and provides an analysis of the results.  相似文献   
257.
反思与重构:论我国诱惑侦查制度的法治化   总被引:2,自引:0,他引:2  
作为主动侦查手段的一种特殊形式,诱惑侦查在打击犯罪,维护社会秩序方面具有较高的效能,然而我国侦查机关在运用这一手段时却存在着诸多混乱的情况,这与我国“依法治国,建设社会主义法治国家”的宏伟目标是相悖的。在侦查程序日益强调人权保障的今天,对我国诱惑侦查制度进行法律规制无疑是一项重要的课题。  相似文献   
258.
“规范出发型”和“事实出发型”是分别作为代表罗马法系和日尔曼法系诉讼理念的关键词;在中国这一有着悠久成文法传统的国度,裁判案件应在“规范出发型”理念下指导下进行。一般来说,实体法保护的权利仅限于自身框架之内,避免以虚构权利的方式达到保护利益的目的,特别是在该利益可以通过实体法上本来就具有的权利予以保护之时。在适用上,外部的基准应是民事实体法,而不应是宪法;内部的基准应是以规则为主体,只在个别情况下适用原则予以矫正或弥补。  相似文献   
259.
沈伟 《法学研究》2015,(4):184-208
与双边投资协议在全球范围内的爆炸式增长形成鲜明对比,国际投资保护领域的多边协定相对而言谈判进展缓慢并且较少受到关注.亚洲地区最近的多边投资协定,当属《东盟—中国投资协议》及《中日韩三方协定》.本文以中国签订的双边和多边投资协议为研究对象,考察国民待遇、最惠国待遇、公平和公正待遇、全面保护与安全、征收以及资本转移等主要实体保护标准的演进.《东盟—中国投资协议》与《中日韩三方协定》为外国投资者提供的实体保护标准,越发显示出更为自由的保护投资者的立场,这将有利于促进投资、改善投资相关规章制度的透明度、加强投资领域的多边合作,最终推动整个亚太地区的区域投资协定的签署以及投资法律体系的自由化和多边化发展.  相似文献   
260.
In forensic voice comparison, deep learning has become widely popular recently. It is mainly used to learn speaker representations, called embeddings or embedding vectors. Speaker embeddings are often trained using corpora mostly containing widely spoken languages. Thus, language dependency is an important factor in automatic forensic voice comparison, especially when the target language is linguistically very different from that the model is trained on. In the case of a low-resource language, developing a corpus for forensic purposes containing enough speakers to train deep learning models is costly. This study aims to investigate whether a model pre-trained on multilingual (mostly English) corpus can be used on a target low-resource language (here, Hungarian), not represented by the model. Often multiple samples are not available from the offender (unknown speaker). Samples are therefore compared pairwise with and without speaker enrollment for suspect (known) speakers. Two corpora are used that were developed especially for forensic purposes and a third that is meant for traditional speaker verification. Speaker embedding vectors are extracted by the x-vector and ECAPA-TDNN techniques. Speaker verification was evaluated in the likelihood-ratio framework. A comparison is made between the language combinations (modeling, LR calibration, and evaluation). The results were evaluated by Cllrmin and EER metrics. It was found that the model pre-trained on a different language but on a corpus with a significant number of speakers can be used on samples with language mismatch. Sample duration and speaking style also seem to affect the performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号