首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   758篇
  免费   4篇
各国政治   6篇
工人农民   4篇
世界政治   6篇
外交国际关系   15篇
法律   253篇
中国共产党   10篇
中国政治   23篇
政治理论   38篇
综合类   407篇
  2023年   3篇
  2022年   9篇
  2021年   13篇
  2020年   14篇
  2019年   6篇
  2018年   23篇
  2017年   10篇
  2016年   5篇
  2015年   7篇
  2014年   45篇
  2013年   53篇
  2012年   29篇
  2011年   73篇
  2010年   62篇
  2009年   81篇
  2008年   39篇
  2007年   54篇
  2006年   48篇
  2005年   48篇
  2004年   48篇
  2003年   31篇
  2002年   32篇
  2001年   18篇
  2000年   5篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1988年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有762条查询结果,搜索用时 15 毫秒
751.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
752.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
753.
Internet of things (IoT) is changing the way data is collected and processed. The scale and variety of devices, communication networks, and protocols involved in data collection present critical challenges for data processing and analyses. Newer and more sophisticated methods for data integration and aggregation are required to enhance the value of real-time and historical IoT data. Moreover, the pervasive nature of IoT data presents a number of privacy threats because of intermediate data processing steps, including data acquisition, data aggregation, fusion and integration. User profiling and record linkage are well studied topics in online social networks (OSNs); however, these have become more critical in IoT applications where different systems share and integrate data and information. The proposed study aims to discuss the privacy threat of information linkage, technical and legal approaches to address it in a heterogeneous IoT ecosystem. The paper illustrates and explains information linkage during the process of data integration in a smart neighbourhood scenario. Through this work, the authors aim to enable a technical and legal framework to ensure stakeholders awareness and protection of subjects about privacy breaches due to information linkage.  相似文献   
754.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
755.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
756.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
757.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
758.
759.
为了实现高效规范的管理,保证公安派出所窗口服务质量的稳定性,我们通过计算机信息化管理与窗口服务工作的有机融合,自主研发了“派出所窗口服务信息管理系统”(Windows Service and Information System of Police Station)。该系统的研究开发汲取了企业管理学、行政管理学、计算机科学中的先进理念,在基层派出所推行后显示出了良好的应用发展前景。  相似文献   
760.
诱惑侦查是侦查实践中一项卓有成效的侦查措施。实施诱惑侦查应获取准确的情报,并对情报进行查证和研判,选择合适的侦查诱饵,制定周密详尽的侦查方案。诱惑侦查中应精心运筹侦查谋略,注重虚实型和调动型谋略的设计和运用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号