首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   629篇
  免费   8篇
各国政治   6篇
工人农民   7篇
世界政治   1篇
外交国际关系   12篇
法律   178篇
中国共产党   10篇
中国政治   77篇
政治理论   21篇
综合类   325篇
  2023年   2篇
  2022年   4篇
  2021年   13篇
  2020年   12篇
  2019年   2篇
  2018年   3篇
  2017年   4篇
  2016年   5篇
  2015年   7篇
  2014年   23篇
  2013年   25篇
  2012年   33篇
  2011年   33篇
  2010年   44篇
  2009年   44篇
  2008年   54篇
  2007年   51篇
  2006年   44篇
  2005年   41篇
  2004年   41篇
  2003年   47篇
  2002年   39篇
  2001年   41篇
  2000年   18篇
  1999年   1篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1990年   1篇
排序方式: 共有637条查询结果,搜索用时 0 毫秒
211.
计算机技术的发展大大促进了科学技术和生产力的迅猛发展,给人们的生活和生产带来了方便和效率,然而层出不穷且破坏性越来越大的计算机病毒对计算机系统的安全构成了严重的危害,造成了越来越大的损失。计算机病毒的出现促使人们必须正视它,不得不采取措施和它做不屈不挠的斗争。  相似文献   
212.
计算机犯罪是一种新型犯罪案件,其犯罪现场是不可见的,具有潜在性、后发性的特点。计算机案件现场勘查不同于其他案件的勘查,要做好此类犯罪的现场勘查,必须充分掌握其现场的保护方法、勘查方法、证据的收集等。  相似文献   
213.
暂缓起诉制度的试行是为了保护未成年人的利益,这与我国刑事立法有关未成年人犯罪的原则要求并不矛盾,但其解决问题的方式在刑事立法的基本原则方面越出了法律界限,而法律的界限是法治的基础.  相似文献   
214.
计算机犯罪作为高科技犯罪之一,在世界范围内蔓延已经是人类社会不能再忽视它的存在。虽然世界各国对计算机犯罪都有不同程度的立法,但关于计算机犯罪的侦查很少有专门的规定。本文借鉴其他各国的经验,就我国计算机犯罪的发现、立案标准和侦查程序,作一个比较分析研究。  相似文献   
215.
侦查程序的基础理论   总被引:1,自引:0,他引:1  
目前,刑法、刑事诉讼法都将其主要目标从惩治犯罪的单一目标更正为保障人权目标与惩治犯罪目标并重。要保障人权,从法律制度上,侦查阶段乃是重中之重;中国现有侦查程序的不完善是一个问题,侦查实践与现有侦查程序的脱节又是一个问题。两个问题的共同“症结”在于基础理论的缺失。本文主要就侦查程序的基础理论及其与国外相关制度、理论的比较和一些新兴问题,作一些相关探讨。  相似文献   
216.
成立中国仲裁协会是我国仲裁管理体制改革的必然选择,也是建立现代民商事仲裁制度的需要。我国1994年《仲裁法》对成立中国仲裁协会作出了明文规定,但10多年来,我国仲裁协会一直未能成立,其中一个重要原因就是人们对仲裁协会基本问题的认识存在分歧,本文即从分析中国仲裁协会的地位、性质、职能等基本问题入手,以期通过讨论形成共识,从而促进中国仲裁协会的尽快成立。  相似文献   
217.
Prototyping plays various roles in software engineering: it can function in an exploratory way in order to gather requirements, or generate an artifact that, through iterative cycles of development, leads to final delivery of the product or system. According to literature (Beaudouin-Lafon, M., and W. Mackay. 2007. “Prototyping Tools and Techniques.” In Human Computer Interaction Handbook: Fundamentals. CRC Press.; Lim, Y. K., E. Stolterman, and J. Tenenberg. 2008. “The anatomy of prototypes: Prototypes as filters, prototypes as manifestations of design ideas.” ACM Transactions on Computer-Human Interaction (TOCHI) 15 (2): 7.), a prototype can be described as an incomplete but flexible communication tool for a design idea, both manifesting and filtering interesting aspects of the original idea. On this basis, we propose a Peircean definition for this tool: a prototype can be considered as a complex set of signs, or better as a text, because each of its features literally “stands for” corresponding features of the final artifact, foreseeing particular aspects or the overall capacity of the outcome. But what happens when stakeholders involved in a project have no or little competence in tools and technologies discussed? Can they correctly interpret a prototype? To answer this question, we propose a Discourse Analysis (Duranti, A. 1997. Linguistic Anthropology. Cambridge, Mass: Cambridge University Press; Potter, J. 2004. “Discourse analysis as a way of analyzing naturally occurring talk.” In Qualitative research: Theory, Method and Practice, edited by D. Silverman, 200–221. SAGE; Schegloff, J. 1989. “Harvey Sacks’ lectures on conversation: an Introduction/memoir.” Human Studies 12: 185–209.) of a co-design session with elders of a daily centre for frail adults in Rome. In this context, we could observe how interactions between the material aspect of the prototype (i.e. the product itself) and its intended meaning (i.e. its significance) can produce distortions, in the form of aberrant interpretations or even a complete lack of comprehension. During this communication breakdown, prototypes lose their connection to the features and behaviors of the product: the relation between representamen and interpretant is lost.  相似文献   
218.
219.
Crimes, such as robbery and murder, often involve firearms. In order to assist with the investigation into the crime, firearm examiners are asked to determine whether cartridge cases found at a crime scene had been fired from a suspect's firearm. This examination is based on a comparison of the marks left on the surfaces of cartridge cases. Firing pin impressions can be one of the most commonly used of these marks. In this study, a total of nine Ruger model 10/22 semiautomatic rifles were used. Fifty cartridges were fired from each rifle. The cartridge cases were collected, and each firing pin impression was then cast and photographed using a comparison microscope. In this paper, we will describe how one may use a computer vision algorithm, the Histogram of Orientated Gradient (HOG), and a machine learning method, Support Vector Machines (SVMs), to classify images of firing pin impressions. Our method achieved a reasonably high accuracy at 93%. This can be used to associate a firearm with a cartridge case recovered from a scene. We also compared our method with other feature extraction algorithms. The comparison results showed that the HOG-SVM method had the highest performance in this classification task.  相似文献   
220.
《Digital Investigation》2014,11(4):273-294
A major challenge to digital forensic analysis is the ongoing growth in the volume of data seized and presented for analysis. This is a result of the continuing development of storage technology, including increased storage capacity in consumer devices and cloud storage services, and an increase in the number of devices seized per case. Consequently, this has led to increasing backlogs of evidence awaiting analysis, often many months to years, affecting even the largest digital forensic laboratories. Over the preceding years, there has been a variety of research undertaken in relation to the volume challenge. Solutions posed range from data mining, data reduction, increased processing power, distributed processing, artificial intelligence, and other innovative methods. This paper surveys the published research and the proposed solutions. It is concluded that there remains a need for further research with a focus on real world applicability of a method or methods to address the digital forensic data volume challenge.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号