首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   531篇
  免费   1篇
各国政治   9篇
工人农民   3篇
世界政治   6篇
外交国际关系   64篇
法律   267篇
中国共产党   5篇
中国政治   16篇
政治理论   29篇
综合类   133篇
  2024年   1篇
  2023年   8篇
  2022年   21篇
  2021年   25篇
  2020年   20篇
  2019年   17篇
  2018年   34篇
  2017年   13篇
  2016年   14篇
  2015年   17篇
  2014年   43篇
  2013年   39篇
  2012年   26篇
  2011年   32篇
  2010年   16篇
  2009年   47篇
  2008年   39篇
  2007年   35篇
  2006年   26篇
  2005年   11篇
  2004年   15篇
  2003年   11篇
  2002年   6篇
  2001年   10篇
  2000年   2篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有532条查询结果,搜索用时 0 毫秒
121.
人工智能作为当前最为尖端的科技成果,对于专利法的挑战是全方面的,既包括人工智能技术本体的专利法律保护、人工智能发明成果的专利法律规制,还涉及人工智能应用工具的专利法律影响问题。造成上述难题的原因包括人工智能的复合性技术结构、人工智能法律客体的本质属性以及人工智能的超强运算能力等人工智能基本特质。为此,应通过优化人工智能技术本身的专利保护模式、开展人工智能自主发明的专利法律规制、创设人工智能应用工具的专利实践指引等措施,实现对人工智能时代专利法律问题的有效应对。  相似文献   
122.
Commercialization of new university technology within the new product development process is an important tool by which established firms can expand their innovative capabilities. The strategic importance of the university technology to the firm, however, can vary considerably. An exclusivity agreement is a useful tool to protect the firm’s investment and help ensure that value is appropriated through the commercialization process. An empirical study of 66 technology transfer projects in the information and communications technology industry reveals that licensing transactions are usually secured by some form of exclusivity agreements when the product innovation enabled by the new university technology is new-to-the-firm or new-to-the-market and the firm’s perception of the strategic value of the new technologies is high.   相似文献   
123.
电子政务是一把双刃剑 ,在提高行政效率的同时可能损害民族文化的多样性和公民基本权利保护的法治价值。为此 ,必须确立“价值支配科技”的哲学理念 ,认真审视普遍存在的电子政务泡沫 ,整合现代信息化理论、新公共管理理论和法治国家理论 ,为我国电子政务的良性发展构建系统的理论基础。  相似文献   
124.
本文在全面说明签名笔迹特点的基础上,阐述了签名笔迹特征层次结构模型的核心内容,重点探讨开展签名笔迹量化检验研究用实验样本的方案设计,收集方法与范围。同时,提出实验样本的设计与搜集应本着“贴近实战,服务办案”的原则,并具体设计了签名笔迹量化检验研究用实验样本的设计方案与具体内容,提出广泛收集具有代表性实验样本的具体要求。另外,提出了研究用实验样本筛选方法和扫描输入计算机具体要求。科学合理的设计与收集签名笔迹量化检验研究用实验样本,才能确保签名笔迹量化检验研究具体分析与统计结果的科学性和实用性。  相似文献   
125.
This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual's transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme.  相似文献   
126.
    
This paper critically assesses the compatibility of s3 Digital Economy Act 2010 (DEA) with Article 8 of the European Convention on Human Rights (1950) (ECHR). The analysis draws on Ofcom’s Initial Obligations and two UK cases, namely: British Telecommunications Plc & Anor, R (on the application of) v The Secretary of State for Business, Innovation and Skills,11 British Telecommunications Plc & Anor, R (on the application of) v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin).View all notes and R (British Telecommunications plc and TalkTalk Telecom Group plc) v Secretary of State for Culture, Olympics, Media and Sport and others.22 R (British Telecommunications plc and TalkTalk Telecom Group plc) v Secretary of State for Culture, Olympics, Media and Sport and others [2012] EWCA Civ 232.View all notes It argues that the implementation of this obligation allows directed surveillance of subscribers’ activities without legal authorisation under the Regulation of Investigatory Powers Act 2000 (RIPA). It also analyses compliance with the Strasbourg Court’s three-part, non-cumulative test, to determine whether s3 of the DEA is, firstly, ‘in accordance with the law’; secondly, pursues one or more legitimate aims contained within Article 8(2) of the Convention; and thirdly, is ‘necessary’ and ‘proportionate’. It concludes that unless the implementation of s3 of the DEA required the involvement of State authorities and was specifically targeted at serious, commercial scale online copyright infringement cases it could infringe part one and part three of the ECtHR’s test, thereby violating subscribers’ Article 8 ECHR rights.  相似文献   
127.
    
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situations. The procedure's aim of minimising disruption to the data centre during the acquisition process is achieved through the use of RAM forensics. This affords initial cluster reconnaissance which in turn facilitates targeted data acquisition on the identified DataNodes. To evaluate the methodology's feasibility, a small Hadoop Distributed File System (HDFS) was configured and forensic artefacts simulated upon it by deleting data originally stored in the cluster. RAM acquisition and analysis was then performed on the NameNode in order to test the validity of the suggested methodology. The results are cautiously positive in establishing that RAM analysis of the NameNode can be used to pinpoint the data blocks affected by the attack, allowing a targeted approach to the acquisition of data from the DataNodes, provided that the physical locations can be determined. A full forensic analysis of the DataNodes was beyond the scope of this project.  相似文献   
128.
    
One of the ways in which aid actors have responded to the growing need for good quality data to inform decision-making processes has been to invest in information communication technology to improve data collection and analysis. The specific information communication technology approach that has been used by Concern Worldwide is Digital Data Gathering. This refers to gathering data using an electronic handheld device such as a smartphone or data pen. As with any approach it has its advantages and limitations. This article shares the lessons and challenges that Concern has had in the utilisation of Digital Data Gathering.  相似文献   
129.
    
《Science & justice》2021,61(5):627-634
The importance of ensuring the results of any digital forensic (DF) examination are effectively communicated cannot be understated. In most cases, this communication will be done via written report, yet despite this there is arguably limited best practice guidance available which is specific for this field in regards to report construction. Poor reporting practices in DF are likely to undermine the reliability of evidence provided across this field, where there is a need for formalised guidance regarding the requirements for effective DF report construction; this should not be a task left solely to each individual practitioner to determine without instruction. For this, the field of DF should look to the wider forensic community and the existing work in this area for support. In line with many other ‘traditional’ forensic science types, a DF practitioner can be commissioned to report in one of three ways - ‘technical’, ‘investigative’ or ‘evaluative’, where each reporting type maintains a specific purpose and interpretative-context, determined by the examination workflow undertaken by a practitioner following client instruction. This work draws upon guidance set out in fundamental forensic science reporting literature in order to describe each reporting type in turn, outlining their scope, content and construction requirements in an attempt to provide support for the DF field.  相似文献   
130.
    
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号