全文获取类型
收费全文 | 3018篇 |
免费 | 27篇 |
国内免费 | 62篇 |
专业分类
教育 | 2114篇 |
科学研究 | 487篇 |
体育 | 68篇 |
综合类 | 151篇 |
文化理论 | 2篇 |
信息传播 | 285篇 |
出版年
2023年 | 1篇 |
2022年 | 15篇 |
2021年 | 40篇 |
2020年 | 60篇 |
2019年 | 54篇 |
2018年 | 26篇 |
2017年 | 26篇 |
2016年 | 22篇 |
2015年 | 56篇 |
2014年 | 187篇 |
2013年 | 262篇 |
2012年 | 274篇 |
2011年 | 242篇 |
2010年 | 141篇 |
2009年 | 128篇 |
2008年 | 150篇 |
2007年 | 249篇 |
2006年 | 220篇 |
2005年 | 220篇 |
2004年 | 187篇 |
2003年 | 167篇 |
2002年 | 119篇 |
2001年 | 92篇 |
2000年 | 72篇 |
1999年 | 31篇 |
1998年 | 13篇 |
1997年 | 18篇 |
1996年 | 13篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
排序方式: 共有3107条查询结果,搜索用时 890 毫秒
91.
丘志敏 《洛阳工业高等专科学校学报》2004,14(2):17-18,48
撞刀是数控车培训过程中易出现的问题之一。为了更进一步减少撞刀问题的发生和提高学生的数控综合素质.通过对撞刀事故发生的原因进行分析与总结,提出了一些防止发生撞刀事故的方法与措施,这对数控车技能人才的培养有着非常鲜明的指导意义。 相似文献
92.
探讨“TT作曲家软件”在音乐教学实践中的应用问题,论述多媒体作为辅助高校音乐创作教学手段的广阔发展前景,对CAI在音乐教学中的实践作大胆的建议。 相似文献
93.
Windows环境上机考试自动评分算法的研究 总被引:1,自引:0,他引:1
针对Windows平台上机操作考试,阐述了通过面向对象、OLE自动化技术和VBA嵌入式编程实现计算机自动评分的策略,及各种常见操作类型的自动评分算法实例。 相似文献
94.
Kari Gwen Coleman 《Ethics and Information Technology》2001,3(4):247-265
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents. 相似文献
95.
Linus Dahlander 《Research Policy》2006,35(8):1243-1259
Since Teece's seminal paper explaining who were the gainers from technological innovation, increased globalization and the information and communication technology revolution have brought new ways for firms to organize and appropriate from innovation. A new more open model of innovation suggests that firms can benefit from sources of innovation that stem from outside the firm. The central theme of this paper is how firms try to unlock communities as complementary assets. These communities exist outside firm boundaries beyond ownership or hierarchical control. Because of practices developed by communities to protect their work, firms need to assign individuals to work in these communities in order to gain access to developments and, to an extent, influence the direction of the community. Using network analysis we show that some software firms sponsor individuals to act strategically within a free and open source software (FOSS) community. Firm sponsored individuals interact with more individuals than interact with them, and also they seek to interact with central individuals in the community. However, we can see differences in how individuals interact, depending on whether their affiliation is with a dedicated FOSS firm or an incumbent in the software industry. Apparently, some firm managers believe they need ‘a man on the inside’ to be able to gain access to communities. 相似文献
96.
以浙江软件产业为研究对象,介绍企业创新动力、创新能力和企业持续技术创新传导机制的现状,以及浙江软件产业发展和软件企业创新能力现状,在此基础上,建立浙江软件企业自主创新能力构建路径模型,从自主研发创新和引进创新两个角度提出传导路径,探寻浙江软件企业创新能力提升的方法,得出浙江软件企业自主创新应以消化吸收再创新为主的结论。 相似文献
97.
软件产权法律保护"度"的经济学分析 总被引:1,自引:0,他引:1
软件产权保护是知识产权保护研究中最炽热的领域之一,也是争论最多的领域之一,原因是软件产权保护在“创新”与“垄断”之间存在两难选择。本文首先分析了软件产权主要法律保护手段的成本与效益,对其成效做出扼要评价,在此基础上分析软件产权保护“度”的均衡,得出软件产权在强调复制权、专利权等知识产权傈护的同时,应限制好软件产权的保护性垄断。 相似文献
98.
以长江某段设计水位和整治线宽度的确定和冲淤等值线图的绘制为例,介绍了MATLAB软件的特点及在航道整治工程中的应用。 相似文献
99.
Sameer Hinduja 《Ethics and Information Technology》2007,9(3):187-204
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior
on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical
framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining
the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students
in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software
piracy; other elements which appear more salient are suggested and discussed in conclusion. 相似文献
100.
健全修复人员的绩效评价指标体系和评价制度是当前档案与古籍文献保护人才培养的重要工作之一。依据职业标准《文献修复师》的基本原则,从基本要求、相关知识和实践技能三个层面构建了档案与古籍文献修复人员职业素养评价指标体系,并通过Yaahp软件采用模糊层次分析法建立指标权重集,对国家古籍保护中心2007年至2015年古籍修复技术与保护相关培训班的课程内容进行实证分析和模糊综合评价,以期为档案和古籍文献保护评价体系的构建提供思考。 相似文献