首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7481篇
  免费   75篇
  国内免费   6篇
教育   5093篇
科学研究   1041篇
各国文化   33篇
体育   415篇
综合类   15篇
文化理论   106篇
信息传播   859篇
  2023年   19篇
  2022年   30篇
  2021年   42篇
  2020年   61篇
  2019年   97篇
  2018年   207篇
  2017年   301篇
  2016年   353篇
  2015年   229篇
  2014年   193篇
  2013年   833篇
  2012年   297篇
  2011年   331篇
  2010年   219篇
  2009年   154篇
  2008年   175篇
  2007年   197篇
  2006年   145篇
  2005年   797篇
  2004年   607篇
  2003年   392篇
  2002年   208篇
  2001年   179篇
  2000年   116篇
  1999年   103篇
  1998年   74篇
  1997年   56篇
  1996年   74篇
  1995年   42篇
  1994年   49篇
  1993年   35篇
  1992年   55篇
  1991年   54篇
  1990年   42篇
  1989年   43篇
  1988年   38篇
  1987年   36篇
  1986年   42篇
  1985年   46篇
  1984年   43篇
  1983年   28篇
  1982年   35篇
  1981年   31篇
  1979年   38篇
  1978年   32篇
  1977年   21篇
  1976年   18篇
  1974年   21篇
  1972年   25篇
  1971年   19篇
排序方式: 共有7562条查询结果,搜索用时 109 毫秒
51.
The current state of the Russian Science Citation Index is analyzed. Several areas for its further development identified by long-standing active users, such as data searching, refinement, and storage; current user alerts; data input with the Science Index license; patent information; and the application programming interface (API) are investigated.  相似文献   
52.
The information practices of collaborative interdisciplinary researchers, especially in distributed environments, remain understudied. Embracing the naturalistic paradigm, this qualitative case study relies upon semi-structured interviews, snowball sampling, and grounded analysis. Based on interviews with 53 participants from 11 Digging Into Data 3 (DID3, 2014-2016) projects, this study examines the working practices of scholars (library and information science professionals, humanists, and computer scientists) engaging in collaborative, international, data-intensive, publicly-funded interdisciplinary research. Benefits of such work include avoiding redundancy, exploding disciplinary silos, and more ambitious, larger-scale outputs. Challenges and lessons learned center on innovation, flexibility, and failure, translation, intermediaries, divisions of labor and delegation of responsibilities and tasks, conflict resolution, technology, outputs and publication, and timeframe, sustainability, and infrastructure.  相似文献   
53.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
54.
55.
56.
57.
This article considers the dynamics and specifics of training highly qualified scientific staff (philosophy doctors and doctors of sciences) in the field of information security and data protection in a 10-year period of 2004–2013 in basic research specialties as classified by the Higher Attestation Commission (VAC) of the Ministry of Education and Science of the Russian Federation.  相似文献   
58.
This paper demonstrates the application of module arithmetic for controlling the level of information security by a new technique referred as integer splitting. The basic definitions and concepts of the method are provided. The mathematical function of arising transformation is described in detail; its properties were studied and the basic theorems were proven that justify the use of splitting in practical applications. An active system was designed and characteristic cases of its operation are considered.  相似文献   
59.
60.
Dropping out of university is regularly discussed as a negative indicator. However, research on actual career trajectories of dropouts is virtually non‐existent. This study estimates the association between tertiary dropouts and career chances in 15 European countries. Using data from the 2011 Programme for the International Assessment of Adult Competencies (PIAAC), estimates are derived from the application of propensity score matching taking a variety of individual background characteristics including cognitive skills into account. Results indicate that individuals are likely to fare better in the labour market if they enrol in university and drop out than if they do not enrol at all. Policy makers need to revise the notion that dropping out is purely negative.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号