首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   959篇
  免费   30篇
各国政治   8篇
工人农民   56篇
世界政治   38篇
外交国际关系   64篇
法律   196篇
中国共产党   59篇
中国政治   153篇
政治理论   164篇
综合类   251篇
  2024年   1篇
  2023年   8篇
  2022年   17篇
  2021年   10篇
  2020年   27篇
  2019年   21篇
  2018年   45篇
  2017年   40篇
  2016年   25篇
  2015年   17篇
  2014年   34篇
  2013年   102篇
  2012年   61篇
  2011年   89篇
  2010年   79篇
  2009年   58篇
  2008年   43篇
  2007年   53篇
  2006年   45篇
  2005年   41篇
  2004年   53篇
  2003年   42篇
  2002年   37篇
  2001年   24篇
  2000年   11篇
  1999年   3篇
  1997年   1篇
  1995年   1篇
  1993年   1篇
排序方式: 共有989条查询结果,搜索用时 0 毫秒
791.
姜晓光 《学理论》2010,(6):188-189
互文性自提出以来在文学批评、翻译等领域得到了长足的发展。后被引入到语篇语言学中,越来越多地用于语篇分析理论及实用性语篇的研究上。本文从语言教学的角度,着重探讨了英语阅读语篇中互文性表现形式以及对英语阅读教学的相关启示。  相似文献   
792.
行动学习法的理念与实践   总被引:4,自引:0,他引:4  
张忠友  彭强 《桂海论丛》2006,22(6):49-52
行动学习是一个以完成预定的工作为目的,在同事的支持下持续不断地进行反思与学习的过程。行动学习法是通过行动学习来解决问题的方法。该方法上世纪90年代介绍到我国后引起了一些培训机构的重视,并在四川省中高级公务员的培训实践中取得了显著的效果。  相似文献   
793.
刘永庭 《河北法学》2006,24(7):152-156
民事诉讼解决民事纠纷,其诉讼职能的分配应侧重当事人,因此在民事诉讼结构中应建立符合当事人本位的权利体系.在我国则是如何在符合我国传统政治文化特点的诉讼模式下力图达到当事人个人主动性与法官适当程度控制之间的衡平,核心问题之一就是如何在我国的诉讼模式下完善当事人本位.  相似文献   
794.
新时期高校党的组织生活改革探讨   总被引:5,自引:0,他引:5  
新时期高校党的组织生活质量有待提高。改革建议是:要充分认识组织生活对加强高校党建的重要意义;要在正确的导向性、高度的民主性、务实的服务性、灵活的创新性等方面赋予高校党的组织生活鲜明的高校特色和时代特征;要从建章立制、建立科学评估体系和开展评估等方面改进和加强管理,全面提高高校党的组织生活质量。  相似文献   
795.
学习型社会与高校图书馆的发展   总被引:2,自引:0,他引:2  
在构建学习型社会过程中,高校图书馆应采取相应对策,不断创新与完善高校图书馆的服务,将高校图书馆建成学习型组织,使高校图书馆成为人们进行“终身教育”的最佳场所。  相似文献   
796.
《国际相互影响》2012,38(1):39-52

International and intercultural communication and their respective cognate constructs, political international and cultural international communication, are redefined and interrelated in order to create a clearer definitional base for theory building in communication among nations and peoples. International communication is any symbolic interaction between people of different nation states. Political international communication is politically significant symbolic internation between nation states. Intercultural communication is communication between people of different cultures in which cultural values are an obvious factor in the nature of the interaction and/or determining the outcome of the interaction. Cultural international communication is intercultural communication between people of different nation states. There are four advantages of this model over existing constructs. The model: (1) unifies yet distinguishes among each different type of communication (2) focuses attention on political significance (3) separates cultural international from intercultural communication (4) argues that international communication is inherently persuasive and that intercultural communication is an interpersonal transaction.  相似文献   
797.
Two-dimensional animation when combined with multiple-choice questions affords an interesting and innovative formative feedback tool for engaging law students in problem-based learning. This article investigates methods for making animation a more accessible medium for legal academics. The article also describes, evaluates and reflects upon the results of a focus group and a survey of online law student perceptions on the combined use of animation and multiple-choice questions as a formative feedback tool. Ethical issues involving delinquent and guilty clients were used as the context in which to describe an animation workflow and explore student attitudes to animation. A website was created within which animations created by academics were included to provide feedback to scaffold student understanding of legal ethics. Students viewed the animations as a very positive learning experience, in the sense of making the lesson more interesting to learn, assisting them to learn and help visualise the ethical problems. Student comments highlighted design features which, when refined, may improve the quality of both the animations and the student experience in studying law using animation.  相似文献   
798.
Individuals with intellectual and developmental disabilities (IDD) in forensic inpatient beds are both complex and understudied. Previous studies have been limited and largely based on smaller clinical samples. We used data from a population-based cohort of Ontario adults with IDD (H-CARDD cohort, n?=?66,000) to describe their prevalence in forensic inpatient beds during 2005–2015 and compare their demographic and clinical profiles with non-IDD forensic patients. Results show that forensic patients with IDD and without IDD have similar profiles, with the exception that patients with IDD are more likely to have a psychiatric disorder and to be younger, rural, and have high or very high morbidity. Strong support was found for disproportionate admission: individuals with IDD are 12.2% of forensic inpatients but only 0.8% of the general population (d?=?1.57). Support for disproportionate utilization was less dramatic and mixed. Little difference was found in terms of the per cent of longer-stay (treatment) admissions or multiple forensic admissions; however, patients with IDD did have longer number of bed days over 10 years (averaging 220.6 days more, d?=?0.28). A better understanding of the barriers to discharge for individuals with IDD will support implementation of appropriate pathways out of the hospital.  相似文献   
799.
The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%.  相似文献   
800.
探索自主创新途径,提高自主创新能力,必须充分重视人的主观能动性,突出人的主体地位,这就需要主体性原则方法论的引导,因此,主体性原则在成功通向一条有中国特色的自主创新的道路上具有重要的理论意义和实践意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号