全文获取类型
收费全文 | 629篇 |
免费 | 8篇 |
专业分类
各国政治 | 6篇 |
工人农民 | 7篇 |
世界政治 | 1篇 |
外交国际关系 | 12篇 |
法律 | 178篇 |
中国共产党 | 10篇 |
中国政治 | 77篇 |
政治理论 | 21篇 |
综合类 | 325篇 |
出版年
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 13篇 |
2020年 | 12篇 |
2019年 | 2篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 7篇 |
2014年 | 23篇 |
2013年 | 25篇 |
2012年 | 33篇 |
2011年 | 33篇 |
2010年 | 44篇 |
2009年 | 44篇 |
2008年 | 54篇 |
2007年 | 51篇 |
2006年 | 44篇 |
2005年 | 41篇 |
2004年 | 41篇 |
2003年 | 47篇 |
2002年 | 39篇 |
2001年 | 41篇 |
2000年 | 18篇 |
1999年 | 1篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有637条查询结果,搜索用时 0 毫秒
211.
王盘岗 《西南政法大学学报》2003,5(2):40-44
计算机技术的发展大大促进了科学技术和生产力的迅猛发展,给人们的生活和生产带来了方便和效率,然而层出不穷且破坏性越来越大的计算机病毒对计算机系统的安全构成了严重的危害,造成了越来越大的损失。计算机病毒的出现促使人们必须正视它,不得不采取措施和它做不屈不挠的斗争。 相似文献
212.
朱东风 《山西警官高等专科学校学报》2006,14(4):79-81
计算机犯罪是一种新型犯罪案件,其犯罪现场是不可见的,具有潜在性、后发性的特点。计算机案件现场勘查不同于其他案件的勘查,要做好此类犯罪的现场勘查,必须充分掌握其现场的保护方法、勘查方法、证据的收集等。 相似文献
213.
暂缓起诉制度的试行是为了保护未成年人的利益,这与我国刑事立法有关未成年人犯罪的原则要求并不矛盾,但其解决问题的方式在刑事立法的基本原则方面越出了法律界限,而法律的界限是法治的基础. 相似文献
214.
郑汉军 《湖北警官学院学报》2003,(3):67-71
计算机犯罪作为高科技犯罪之一,在世界范围内蔓延已经是人类社会不能再忽视它的存在。虽然世界各国对计算机犯罪都有不同程度的立法,但关于计算机犯罪的侦查很少有专门的规定。本文借鉴其他各国的经验,就我国计算机犯罪的发现、立案标准和侦查程序,作一个比较分析研究。 相似文献
215.
侦查程序的基础理论 总被引:1,自引:0,他引:1
陈真 《四川警官高等专科学校学报》2003,15(1):6-13
目前,刑法、刑事诉讼法都将其主要目标从惩治犯罪的单一目标更正为保障人权目标与惩治犯罪目标并重。要保障人权,从法律制度上,侦查阶段乃是重中之重;中国现有侦查程序的不完善是一个问题,侦查实践与现有侦查程序的脱节又是一个问题。两个问题的共同“症结”在于基础理论的缺失。本文主要就侦查程序的基础理论及其与国外相关制度、理论的比较和一些新兴问题,作一些相关探讨。 相似文献
216.
中国仲裁协会基本问题研究——兼论我国《仲裁法》有关条款的修改 总被引:1,自引:0,他引:1
成立中国仲裁协会是我国仲裁管理体制改革的必然选择,也是建立现代民商事仲裁制度的需要。我国1994年《仲裁法》对成立中国仲裁协会作出了明文规定,但10多年来,我国仲裁协会一直未能成立,其中一个重要原因就是人们对仲裁协会基本问题的认识存在分歧,本文即从分析中国仲裁协会的地位、性质、职能等基本问题入手,以期通过讨论形成共识,从而促进中国仲裁协会的尽快成立。 相似文献
217.
Prototyping plays various roles in software engineering: it can function in an exploratory way in order to gather requirements, or generate an artifact that, through iterative cycles of development, leads to final delivery of the product or system. According to literature (Beaudouin-Lafon, M., and W. Mackay. 2007. “Prototyping Tools and Techniques.” In Human Computer Interaction Handbook: Fundamentals. CRC Press.; Lim, Y. K., E. Stolterman, and J. Tenenberg. 2008. “The anatomy of prototypes: Prototypes as filters, prototypes as manifestations of design ideas.” ACM Transactions on Computer-Human Interaction (TOCHI) 15 (2): 7.), a prototype can be described as an incomplete but flexible communication tool for a design idea, both manifesting and filtering interesting aspects of the original idea. On this basis, we propose a Peircean definition for this tool: a prototype can be considered as a complex set of signs, or better as a text, because each of its features literally “stands for” corresponding features of the final artifact, foreseeing particular aspects or the overall capacity of the outcome. But what happens when stakeholders involved in a project have no or little competence in tools and technologies discussed? Can they correctly interpret a prototype? To answer this question, we propose a Discourse Analysis (Duranti, A. 1997. Linguistic Anthropology. Cambridge, Mass: Cambridge University Press; Potter, J. 2004. “Discourse analysis as a way of analyzing naturally occurring talk.” In Qualitative research: Theory, Method and Practice, edited by D. Silverman, 200–221. SAGE; Schegloff, J. 1989. “Harvey Sacks’ lectures on conversation: an Introduction/memoir.” Human Studies 12: 185–209.) of a co-design session with elders of a daily centre for frail adults in Rome. In this context, we could observe how interactions between the material aspect of the prototype (i.e. the product itself) and its intended meaning (i.e. its significance) can produce distortions, in the form of aberrant interpretations or even a complete lack of comprehension. During this communication breakdown, prototypes lose their connection to the features and behaviors of the product: the relation between representamen and interpretant is lost. 相似文献
218.
219.
Zhijian Wen PhD James M. Curran PhD SallyAnn Harbison PhD Gerhard E. Wevers 《Journal of forensic sciences》2023,68(6):1946-1957
Crimes, such as robbery and murder, often involve firearms. In order to assist with the investigation into the crime, firearm examiners are asked to determine whether cartridge cases found at a crime scene had been fired from a suspect's firearm. This examination is based on a comparison of the marks left on the surfaces of cartridge cases. Firing pin impressions can be one of the most commonly used of these marks. In this study, a total of nine Ruger model 10/22 semiautomatic rifles were used. Fifty cartridges were fired from each rifle. The cartridge cases were collected, and each firing pin impression was then cast and photographed using a comparison microscope. In this paper, we will describe how one may use a computer vision algorithm, the Histogram of Orientated Gradient (HOG), and a machine learning method, Support Vector Machines (SVMs), to classify images of firing pin impressions. Our method achieved a reasonably high accuracy at 93%. This can be used to associate a firearm with a cartridge case recovered from a scene. We also compared our method with other feature extraction algorithms. The comparison results showed that the HOG-SVM method had the highest performance in this classification task. 相似文献
220.
《Digital Investigation》2014,11(4):273-294
A major challenge to digital forensic analysis is the ongoing growth in the volume of data seized and presented for analysis. This is a result of the continuing development of storage technology, including increased storage capacity in consumer devices and cloud storage services, and an increase in the number of devices seized per case. Consequently, this has led to increasing backlogs of evidence awaiting analysis, often many months to years, affecting even the largest digital forensic laboratories. Over the preceding years, there has been a variety of research undertaken in relation to the volume challenge. Solutions posed range from data mining, data reduction, increased processing power, distributed processing, artificial intelligence, and other innovative methods. This paper surveys the published research and the proposed solutions. It is concluded that there remains a need for further research with a focus on real world applicability of a method or methods to address the digital forensic data volume challenge. 相似文献