首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   425篇
  免费   21篇
各国政治   14篇
工人农民   7篇
世界政治   5篇
外交国际关系   33篇
法律   117篇
中国共产党   19篇
中国政治   56篇
政治理论   41篇
综合类   154篇
  2023年   2篇
  2021年   7篇
  2020年   9篇
  2019年   7篇
  2018年   9篇
  2017年   11篇
  2016年   9篇
  2015年   8篇
  2014年   30篇
  2013年   48篇
  2012年   40篇
  2011年   33篇
  2010年   27篇
  2009年   30篇
  2008年   14篇
  2007年   26篇
  2006年   30篇
  2005年   31篇
  2004年   23篇
  2003年   15篇
  2002年   14篇
  2001年   11篇
  2000年   4篇
  1999年   1篇
  1996年   2篇
  1994年   1篇
  1992年   1篇
  1990年   1篇
  1988年   1篇
  1985年   1篇
排序方式: 共有446条查询结果,搜索用时 46 毫秒
341.
风险投资运作过程中存在委托-代理关系,存在信息不对称.信息不对称带来"逆向选择"和"道德风险"问题.从制度经济学角度考虑,设计一套行之有效的激励和约束机制能够最大限度地减少"逆向选择"和"道德风险"的发生,提高投资市场的运行效率.  相似文献   
342.
执政党不忘初心、牢记使命的制度建设研究   总被引:1,自引:1,他引:0  
郑彬  李超群 《理论建设》2020,36(1):23-28
不忘初心、牢记使命是中国共产党对全体党员的价值要求,是执政党对广大人民群众的政治承诺。十九届四中全会提出要建设不忘初心、牢记使命的制度,是不忘初心、牢记使命主题教育常态化的现实要求,也是提升执政党制度建设水平的内在要求,更是提升执政党治理水平、巩固执政地位的迫切需求。不忘初心、牢记使命制度作为党内重要制度,涵盖着党员教育、党员学习与党性修养等制度,与干部选拔任用制度、纪检检查制度等相衔接。推动不忘初心、牢记使命制度落地生根,就要建立党中央领导、各级党委负责的领导机制,将不忘初心、牢记使命上升为党章要求,通过尊重党员主体地位、调动党员积极性等方面来推动不忘初心、牢记使命制度的落实。  相似文献   
343.
The present study examined blindness for identification decisions from target-present (TP) and target-absent (TA) lineups using a field study methodology. Eighty pedestrians were exposed to a staged theft. Subsequently, they were asked to identify the thief and the victim from separate, simultaneous six-person lineups. Their identification decision concerning the thief lineup was manipulated such that participants’ selections were exchanged with a previously unidentified lineup member (choice exchange) and lineup rejections were turned into identifications (choice reversal). Participants were 7–10 times less likely to detect choice exchanges (66.7%) compared with choice reversals (11.2%). Furthermore, identification accuracy was not a prerequisite for detection. Thus, rejections and particularly selections made from both TP and TA lineups are susceptible to choice blindness. Finally, our study implies that for blindness in eyewitness identification decisions between-category changes (i.e. choice reversals) are easier to detect than within-category changes (i.e. choice exchanges).  相似文献   
344.
刑法学研究进路 ,是指刑法学研究的具体路径与步骤的选择。了解刑法学研究的进路 ,对于掌握刑法学术一般规律 ,建立刑法学研究模式 ,优化刑法学学术成果 ,具有积极意义。根据研究对象和研究角度的不同 ,刑法学研究可以有不同的进路。  相似文献   
345.
《国际相互影响》2012,38(2):163-182
An essential, but often overlooked, role of concepts lies in how they constitute or define populations. Explicit choices made by researchers about concept structure are tied inextricably to the selection rule for identifying cases to include in analyses. Concept construction issues are absolutely crucial because the concept structure used interacts in various, usually hidden, ways with theories and hypotheses that researchers want to test. The concepts used to select cases may be correlated with common dependent variables hence producing selection bias. We illustrate this potential by exploring international crises as they have been conceptualized by the ICB Project. We show that two alternative conceptualizations of “crisis” produce populations that correlate with common ICB dependent variables. Our empirical analyses pay particular attention to variables related to power because they are particularly susceptible to being influenced by these selection effects.  相似文献   
346.
《国际相互影响》2012,38(4):409-440
We study mediation in international conflict as a process of strategic interaction among the two disputants and the (would-be) mediator. We develop a rational model that examines the choice, process, and outcome of mediation. We start with a conflict game of incomplete information played by rational players that examines the conditions under which disputants and would-be mediators would consider mediation a preferred strategy. The mediation game that follows models the mediator's choice of mediation strategy and the possible responses of the disputants offers. Finally, we explore the conditions under which a mediated solution emerges and the conditions under which mediation fails.

The credibility of the mediator—defined as the extent to which disputants believe the mediator's statements, threats, or promises and her ability to deliver the promised agreement—emerges as a key factor that drives the model. Each disputant has an assessment of the mediator's credibility. Broadly speaking, the more credible the mediator is perceived by the disputant, the more accepting the disputant will be of her offers. Yet, the mediator does not know how credible she is in the view of the disputants. This uncertainty affects the mediator's decision to intervene and her choice of strategies. We derive testable propositions from this model and test them on a dataset consisting of mediation efforts in international conflicts over the years 1945–1995. The findings generally support the propositions derived from the model, and we explore the theoretical and empirical implications of these findings.  相似文献   
347.
The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%.  相似文献   
348.
针对邓正来<全球化与中国法学--一种开放性"全球化"观的建构>一文做的知识批判.在一如既往地肯定邓氏对中国法学研究的范式转换(从现代性范式到全球化范式)所做的贡献及其开放问题的能力与论辩能力的同时,也指出其知识-法学的论辩路径对本土特殊问题的遮蔽,如意识形态话语对学术和学者的宰制,以及缺乏良性互动的话语机制和学术机制等.  相似文献   
349.
Transnational collaboration between regulatory agencies has proliferated rapidly within the last three decades. However, given that information regarding the motives, trustworthiness, and capabilities of potential partners is typically imperfect, decisions about with whom to collaborate are inevitably characterized by a degree of uncertainty. To better capture these dynamics, this article uses a network analytical perspective and hypothesizes that agencies are more likely to form agreements with agencies to whom they are already indirectly connected (transitivity), that are highly connected (preferential attachment), or with whom they share tie-characteristics (assortativity). To test these hypotheses, a stochastic actor-oriented model is used to analyze an original, self-coded data set in which bilateral information exchange agreements between national securities agencies (n = 143) are mapped out over a 18-year period. The results show that the formation of agreements between regulatory agencies is driven by (i) the number of shared partners (i.e. triadic closure); and (ii) similarity regarding agency characteristics (i.e. homophily).  相似文献   
350.
论我国自主创新文化建设   总被引:1,自引:0,他引:1  
自主创新的内外系统具有不确定性和复杂性。由于系统复杂性和文化嵌入性,没有主体的创新实践和没有文化的创新主体皆不存在,自主创新生成于社会文化建构。创新文化类型、层次与具体内容各方面均内涵丰富,其建构旨在建设融合"责任心、宽容心、自信心、恒心"的创新文化支撑体系。自主创新文化建设的路径选择在于主体、制度、教育、科学精神、传统文化等层面进行系统推进,从而在根本上实现"尊重创新、鼓励创新、向往创新"的社会文化转向。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号