全文获取类型
收费全文 | 149507篇 |
免费 | 2480篇 |
国内免费 | 977篇 |
专业分类
教育 | 100354篇 |
科学研究 | 19345篇 |
各国文化 | 2148篇 |
体育 | 11100篇 |
综合类 | 1481篇 |
文化理论 | 1201篇 |
信息传播 | 17335篇 |
出版年
2022年 | 818篇 |
2021年 | 1880篇 |
2020年 | 2292篇 |
2019年 | 2840篇 |
2018年 | 3316篇 |
2017年 | 3680篇 |
2016年 | 3694篇 |
2015年 | 3274篇 |
2014年 | 4564篇 |
2013年 | 29105篇 |
2012年 | 4324篇 |
2011年 | 4942篇 |
2010年 | 4378篇 |
2009年 | 4509篇 |
2008年 | 4219篇 |
2007年 | 4257篇 |
2006年 | 4434篇 |
2005年 | 3985篇 |
2004年 | 3800篇 |
2003年 | 3136篇 |
2002年 | 2913篇 |
2001年 | 2686篇 |
2000年 | 2096篇 |
1999年 | 2016篇 |
1998年 | 1779篇 |
1997年 | 1804篇 |
1996年 | 1897篇 |
1995年 | 1605篇 |
1994年 | 1584篇 |
1993年 | 1557篇 |
1992年 | 1574篇 |
1991年 | 1443篇 |
1990年 | 1431篇 |
1989年 | 1359篇 |
1988年 | 1205篇 |
1987年 | 1099篇 |
1986年 | 1150篇 |
1985年 | 1417篇 |
1984年 | 1290篇 |
1983年 | 1269篇 |
1982年 | 1254篇 |
1981年 | 1173篇 |
1980年 | 1167篇 |
1979年 | 1256篇 |
1978年 | 1205篇 |
1977年 | 1119篇 |
1976年 | 993篇 |
1975年 | 803篇 |
1974年 | 816篇 |
1973年 | 776篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
科技期刊的选题策划是科技期刊出版流程中的重要环节,也是编辑理念和编辑实践的重要体现.本文结合《数据采集与处理》近年来在选题策划方面所做的工作和经验,介绍选题策划的基本原则及方法和途径,明确指出选题策划是办刊宗旨的具体体现.《数据采集与处理》在选题策划方面取得的成绩说明选题策划对科技期刊发展十分重要. 相似文献
993.
在阐述数字叙事领域互动理论的基础上,借鉴美国学者玛丽-劳尔·瑞安(Marie-Laure Ryan)的"数字文本用户参与层理论",分析超文本小说、互动游戏、虚拟游戏等数字叙事中的用户参与行为.指出随着用户参与数字叙事深度和广度的加强,用户的参与行为在整个故事生成中的作用更加重要,但用户的参与行为始终受到故事情节和数字叙事系统的制约. 相似文献
994.
Debasis?GangulyEmail authorView authors OrcID profile Gareth?J.?F.?Jones Aarón?Ramírez-de-la-Cruz Gabriela?Ramírez-de-la-Rosa Esaú?Villatoro-Tello 《Information Retrieval》2018,21(1):1-23
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents. 相似文献
995.
996.
Scott A. Mitchell 《传播与批判/文化研究》2018,15(3):197-212
This article introduces emergent memory, a conceptual extension to rhetorics of public memory, to describe memory’s genesis in sites built without commemorative commitments. Examining Detroit’s “8 Mile Wall,” a site built to reinforce segregated housing, this project argues the rhetorical tenets of emergent memory present in this space. As a relic of segregated history, the wall symbolically recalls the city’s controversial past, but has recently been the subject of a local mural project to redefine the wall’s purpose. Some consider this a step toward reclamation, as it visually repositions the disturbing remnant. For others, the murals simply cannot overwrite troubling memories of the city’s discriminatory history. This essay uses emergent memory to describe how the wall’s complicated mnemonic legacy simultaneously harkens to a difficult history and how the mural additions use that same legacy to convey an optimistic future for Detroit and those marked by this urban space. 相似文献
997.
Franklin J. Boster Rain Wuyu Liu Ying Cheng Wonkyung Kim Sonia Jawaid Shaikh 《Communication Studies》2018,69(1):4-22
Stickiness refers to the set of persuasive message properties: simple, unexpected, concrete, credible, emotional, and stories (SUCCES). Heath and Heath (2007) argue that a sticky message is expected to be more memorable and hence more persuasive than a non-sticky message. A 2 (sticky v. non-sticky message) x 3 (pretest v. posttest v. delayed test) longitudinal experiment is employed to examine the persuasiveness of sticky messages on applying sunscreen. Results of a mixed model analysis of variance show that the sticky message produces attitudes and behaviors more favorable to the message recommendation than the non-sticky message. Specifically, a time × message induction non-additive effect was found, which sustained only in the sticky message condition across time. Despite this interesting effect, its explanation remains elusive. 相似文献
998.
Inconsistency is often considered an indication of deceit. The conceptualization of consistency used in deception research, however, has not made a clear distinction between two concepts long differentiated by philosophers: coherence and correspondence. The existing literature suggests that coherence is not generally useful for deception detection. Correspondence, however, appears to be quite useful. The present research developed a model of how correspondence is utilized to make judgments, and this article reports on four studies designed to elaborate on the model. The results suggest that judges attend strongly to correspondence and that they do so in an additive fashion. As noncorrespondent information accumulates, an increasingly smaller proportion of judges make truthful assessments of guilty suspects. This work provides a basic framework for examining how information is utilized to make deception judgments and forms the correspondence and coherence module of truth-default theory. 相似文献
999.
David E. Clementson 《Communication Studies》2018,69(5):522-544
This article explores people’s susceptibility to political deception. Participants watched a news interview in which a politician either answered all the questions or deceptively evaded a question. In Study 1 (n = 202), deception is perceived through the dodge being irrelevant for voters who do not identify with the politician. In Study 2 (n = 618), partisan voters consider the politician more deceptive, and acting more deceptively, when the politician has their opposing party affiliation, independent of whether he dodges. When the politician shares their party identification, voters identify with the politician more and consider his responses more relevant. Findings are consistent with theoretical positions of identification, the cooperative principle, and social identity. 相似文献
1000.
Calvin R. Coker 《传播与批判/文化研究》2018,15(1):35-52
This article analyzes the Supreme Court decision in Obergefell v. Hodges, showing that a subset of the dissent constructed devout religious groups as victims to rearticulate power relations between the state, LGBT groups, and religious entities. This rearticulation is possible as a consequence of ambiguity in the legal concept of religious liberty, which is explored in depth. That ambiguity is employed to mount an argument against the decision, moving LGBT individuals from oppressed to oppressor of religious groups. The study contextualizes this inversion against the material and symbolic conditions of both the LGBT and devout Christian communities in the United States. 相似文献