首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44篇
  免费   1篇
管理学   12篇
民族学   1篇
人口学   1篇
理论方法论   2篇
综合类   24篇
社会学   5篇
  2020年   1篇
  2018年   2篇
  2017年   2篇
  2015年   3篇
  2014年   1篇
  2013年   4篇
  2012年   1篇
  2011年   1篇
  2010年   3篇
  2009年   3篇
  2008年   3篇
  2007年   4篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2003年   3篇
  2002年   4篇
  1997年   1篇
排序方式: 共有45条查询结果,搜索用时 46 毫秒
1.
“9·1 1”事件和“打恐”战争爆发后 ,国际形势发生了深刻变化。大国关系基本稳定 ,并趋于改善和发展。大国安全观念发生重大变化 ,集体安全和南北问题开始受到西方国家的重视。和平、缓和、发展和稳定的国际形势遇到了极大挑战。美国的单边主义和全球战略攻势阻止不了世界多极化进程和世界和平与发展的总趋势  相似文献   
2.
In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure.  相似文献   
3.
This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.  相似文献   
4.
The essay offers one piece of a larger conjunctural analysis, in an effort to contribute to a better story of the contemporary organic crisis. It considers three elements of the complexity of the ‘crises’ of knowledge: First, it explores the increasingly felt social perception that knowledge (and the forms of authority that accompany it) has become less determined and determining, less identifiable, less effective, more troubled. It argues that one must think about these developments historically and contextually, rather than going along with the panic that has surrounded their increasing visibility in recent political events. Second, it considers some of the attacks on the university as well as some of the recent changes in the political economy and institutional forms of the academy. Finally, it argues that academics have failed to examine their own contributions to the crises of knowledge, failed to consider the ways their own cultures and practices can be located within rather than against the crises of knowledge.  相似文献   
5.
随着Internet应用的不断深入,Web服务器成为了黑客的主要攻击目标。为克服传统误用入侵检测系统无法识别未知Web攻击和异常入侵检测系统误报率高等缺陷,受生物免疫系统启发,该文提出了一种基于免疫原理的Web攻击检测方法。给出了自体、非自体、抗原、抗体基因库、免疫细胞等的数学定义,描述了免疫学习算法。对比实验结果表明该方法较传统的基于神经网络和ID3算法的Web攻击检测技术能有效检测未知Web攻击,具有检测率和分类率高、误报率低和实时高效等特点,是检测Web攻击的一种有效新途径。  相似文献   
6.
ABSTRACT

Drawing on Amartya Sen’s writings, this article presents the capability approach to democracy and shows its relevance for the sociological reflection and research on democratic processes conceived as ways to convert individual preferences into collective norms or decisions. Two moments are key in this respect: the formation of individual preferences and their translation into collective norms in the course of public debates. The initial sections present Sen’s conception of democracy, particularly emphasizing its articulation with the notions of ‘positional objectivity’ and ‘conversion’. Then, this conception is compared with two other mechanisms that may be used to coordinate individual decisions or preferences, namely the market and idealistic views on deliberative democracy. The article emphasizes how the capability approach departs from these two conceptions with regard to the two key concepts of capacity to aspire and capability for voice. The final section shows how Sen’s notion of democracy may open up a new field for research, namely the sociological investigation of the informational (or knowledge) basis of democracy.  相似文献   
7.
城市单位职工位置能力与获取住房利益关系的实证研究   总被引:1,自引:1,他引:0  
我国城市现阶段单位职工获取住房利益的大小依赖于职工自身具备的位置能力高低.在影响职工位置能力的因素中,职工所在的"单位"起着至关重要的作用.在此基础上,职工的职务、政治面貌、收入和职业也对住房利益获得起着重要作用.  相似文献   
8.
根据修订后的新刑法第九十三条对国家工作人员的有关规定 ,结合刑法理论和司法实践 ,国家机关人员应包括国家机关中从事公务的工作人员和“以国家工作人员论”的国家工作人员两部分 ,其本质特征就在于“从事公务” ,因此 ,“利用职务之便”是国家工作人员职务犯罪客观构成的本质要件 ,也是国家工作人员职务犯罪与普通犯罪的根本区别所在。  相似文献   
9.
谈包装设计的定位理论   总被引:1,自引:0,他引:1  
时代的发展带来产品包装的变化,包装"沟通"的功能凸显。本文通过论证实例的方法,对包装 定位设计的三个基本因素进行了阐述和分析,并强调了定位设计理论在现代包装设计构思中的重要地 位和作用。  相似文献   
10.
“9.11”事件及布什政府的反恐战略推动美国关注南亚地区的安全与稳定,同时印度与巴基斯坦围绕克什米尔的争端成为美国必须面对的重要挑战。印度、巴基斯坦加入反恐盟约并不能使印巴危机缓解,在美国反恐战略和印巴“核因素”的双重制约下,2002年印巴军事对峙最后成为双方解决争端、实现和平的难得机会,致使“9.11”事件及其后续发展成为推动南亚和平进程的重要催化剂。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号