全文获取类型
收费全文 | 531篇 |
免费 | 1篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 3篇 |
世界政治 | 6篇 |
外交国际关系 | 64篇 |
法律 | 267篇 |
中国共产党 | 5篇 |
中国政治 | 16篇 |
政治理论 | 29篇 |
综合类 | 133篇 |
出版年
2024年 | 1篇 |
2023年 | 8篇 |
2022年 | 21篇 |
2021年 | 25篇 |
2020年 | 20篇 |
2019年 | 17篇 |
2018年 | 34篇 |
2017年 | 13篇 |
2016年 | 14篇 |
2015年 | 17篇 |
2014年 | 43篇 |
2013年 | 39篇 |
2012年 | 26篇 |
2011年 | 32篇 |
2010年 | 16篇 |
2009年 | 47篇 |
2008年 | 39篇 |
2007年 | 35篇 |
2006年 | 26篇 |
2005年 | 11篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 6篇 |
2001年 | 10篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有532条查询结果,搜索用时 0 毫秒
121.
人工智能作为当前最为尖端的科技成果,对于专利法的挑战是全方面的,既包括人工智能技术本体的专利法律保护、人工智能发明成果的专利法律规制,还涉及人工智能应用工具的专利法律影响问题。造成上述难题的原因包括人工智能的复合性技术结构、人工智能法律客体的本质属性以及人工智能的超强运算能力等人工智能基本特质。为此,应通过优化人工智能技术本身的专利保护模式、开展人工智能自主发明的专利法律规制、创设人工智能应用工具的专利实践指引等措施,实现对人工智能时代专利法律问题的有效应对。 相似文献
122.
The strategic value of new university technology and its impact on exclusivity of licensing transactions: An empirical study 总被引:1,自引:0,他引:1
Commercialization of new university technology within the new product development process is an important tool by which established
firms can expand their innovative capabilities. The strategic importance of the university technology to the firm, however,
can vary considerably. An exclusivity agreement is a useful tool to protect the firm’s investment and help ensure that value
is appropriated through the commercialization process. An empirical study of 66 technology transfer projects in the information
and communications technology industry reveals that licensing transactions are usually secured by some form of exclusivity
agreements when the product innovation enabled by the new university technology is new-to-the-firm or new-to-the-market and
the firm’s perception of the strategic value of the new technologies is high.
相似文献
123.
论电子政务的理论基础——以“价值支配科技”的基本观念为核心 总被引:3,自引:0,他引:3
电子政务是一把双刃剑 ,在提高行政效率的同时可能损害民族文化的多样性和公民基本权利保护的法治价值。为此 ,必须确立“价值支配科技”的哲学理念 ,认真审视普遍存在的电子政务泡沫 ,整合现代信息化理论、新公共管理理论和法治国家理论 ,为我国电子政务的良性发展构建系统的理论基础。 相似文献
124.
本文在全面说明签名笔迹特点的基础上,阐述了签名笔迹特征层次结构模型的核心内容,重点探讨开展签名笔迹量化检验研究用实验样本的方案设计,收集方法与范围。同时,提出实验样本的设计与搜集应本着“贴近实战,服务办案”的原则,并具体设计了签名笔迹量化检验研究用实验样本的设计方案与具体内容,提出广泛收集具有代表性实验样本的具体要求。另外,提出了研究用实验样本筛选方法和扫描输入计算机具体要求。科学合理的设计与收集签名笔迹量化检验研究用实验样本,才能确保签名笔迹量化检验研究具体分析与统计结果的科学性和实用性。 相似文献
125.
Clare SullivanAuthor Vitae 《Computer Law & Security Report》2009,25(3):227-236
This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual's transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme. 相似文献
126.
Felipe Romero-Moreno 《International Review of Law, Computers & Technology》2016,30(3):229-247
This paper critically assesses the compatibility of s3 Digital Economy Act 2010 (DEA) with Article 8 of the European Convention on Human Rights (1950) (ECHR). The analysis draws on Ofcom’s Initial Obligations and two UK cases, namely: British Telecommunications Plc & Anor, R (on the application of) v The Secretary of State for Business, Innovation and Skills,1 and R (British Telecommunications plc and TalkTalk Telecom Group plc) v Secretary of State for Culture, Olympics, Media and Sport and others.2 It argues that the implementation of this obligation allows directed surveillance of subscribers’ activities without legal authorisation under the Regulation of Investigatory Powers Act 2000 (RIPA). It also analyses compliance with the Strasbourg Court’s three-part, non-cumulative test, to determine whether s3 of the DEA is, firstly, ‘in accordance with the law’; secondly, pursues one or more legitimate aims contained within Article 8(2) of the Convention; and thirdly, is ‘necessary’ and ‘proportionate’. It concludes that unless the implementation of s3 of the DEA required the involvement of State authorities and was specifically targeted at serious, commercial scale online copyright infringement cases it could infringe part one and part three of the ECtHR’s test, thereby violating subscribers’ Article 8 ECHR rights. 相似文献
127.
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situations. The procedure's aim of minimising disruption to the data centre during the acquisition process is achieved through the use of RAM forensics. This affords initial cluster reconnaissance which in turn facilitates targeted data acquisition on the identified DataNodes. To evaluate the methodology's feasibility, a small Hadoop Distributed File System (HDFS) was configured and forensic artefacts simulated upon it by deleting data originally stored in the cluster. RAM acquisition and analysis was then performed on the NameNode in order to test the validity of the suggested methodology. The results are cautiously positive in establishing that RAM analysis of the NameNode can be used to pinpoint the data blocks affected by the attack, allowing a targeted approach to the acquisition of data from the DataNodes, provided that the physical locations can be determined. A full forensic analysis of the DataNodes was beyond the scope of this project. 相似文献
128.
Kai Matturi 《Development in Practice》2016,26(1):52-63
One of the ways in which aid actors have responded to the growing need for good quality data to inform decision-making processes has been to invest in information communication technology to improve data collection and analysis. The specific information communication technology approach that has been used by Concern Worldwide is Digital Data Gathering. This refers to gathering data using an electronic handheld device such as a smartphone or data pen. As with any approach it has its advantages and limitations. This article shares the lessons and challenges that Concern has had in the utilisation of Digital Data Gathering. 相似文献
129.
《Science & justice》2021,61(5):627-634
The importance of ensuring the results of any digital forensic (DF) examination are effectively communicated cannot be understated. In most cases, this communication will be done via written report, yet despite this there is arguably limited best practice guidance available which is specific for this field in regards to report construction. Poor reporting practices in DF are likely to undermine the reliability of evidence provided across this field, where there is a need for formalised guidance regarding the requirements for effective DF report construction; this should not be a task left solely to each individual practitioner to determine without instruction. For this, the field of DF should look to the wider forensic community and the existing work in this area for support. In line with many other ‘traditional’ forensic science types, a DF practitioner can be commissioned to report in one of three ways - ‘technical’, ‘investigative’ or ‘evaluative’, where each reporting type maintains a specific purpose and interpretative-context, determined by the examination workflow undertaken by a practitioner following client instruction. This work draws upon guidance set out in fundamental forensic science reporting literature in order to describe each reporting type in turn, outlining their scope, content and construction requirements in an attempt to provide support for the DF field. 相似文献
130.