首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36097篇
  免费   426篇
  国内免费   25篇
教育   25129篇
科学研究   3079篇
各国文化   398篇
体育   3599篇
综合类   28篇
文化理论   311篇
信息传播   4004篇
  2021年   328篇
  2020年   537篇
  2019年   785篇
  2018年   1020篇
  2017年   1039篇
  2016年   967篇
  2015年   605篇
  2014年   801篇
  2013年   6570篇
  2012年   730篇
  2011年   802篇
  2010年   632篇
  2009年   683篇
  2008年   705篇
  2007年   666篇
  2006年   630篇
  2005年   551篇
  2004年   828篇
  2003年   636篇
  2002年   683篇
  2001年   650篇
  2000年   704篇
  1999年   590篇
  1998年   344篇
  1997年   356篇
  1996年   436篇
  1995年   364篇
  1994年   375篇
  1993年   336篇
  1992年   492篇
  1991年   513篇
  1990年   472篇
  1989年   543篇
  1988年   478篇
  1987年   494篇
  1986年   475篇
  1985年   557篇
  1984年   452篇
  1983年   443篇
  1982年   374篇
  1981年   348篇
  1980年   346篇
  1979年   488篇
  1978年   379篇
  1977年   340篇
  1976年   315篇
  1975年   269篇
  1974年   284篇
  1973年   257篇
  1971年   263篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
971.
Zusammenfassung. In diesem Beitrag wird ein formaler Ansatz zur Ableitung von Zugriffsrechten auf der Basis eines formalen Organisationsmodells vorgestellt. Hierzu wird der Ansatz der rollenbasierten Zugriffskontrolle (engl. Role-Based Access Control, kurz RBAC) um die M?glichkeit erweitert, Aufbauorganisationen zu modellieren. Der Vorteil gegenüber rollenbasierten Ans?tzen mit einfachen Rollenhierarchien ist die klare Struktur, die einem Zugriffskontrollmodell durch die Organisationsform aufgepr?gt wird. Des Weiteren k?nnen organisatorische Regelungen, wie z.B. Urlaubsvertretung oder Weisungsbefugnis, direkt im Modell hinterlegt werden. Aufwendig zu pflegende und h?ufig inkonsistente Rollenkataloge werden obsolet. Sicherheitsstrategien mit unpr?zisen Vorgaben lassen sich mittels der vorgestellten Technik der sog. `Kompetenzerweiterung' umsetzen. Das zugrundeliegende Paradigma des vorgestellten Ansatzes unterscheidet sich stark von anderen Ans?tzen mit statischer Autorisation. Nutzer k?nnen sich Zugriffsrechte in fest definierten Grenzen selbstverantwortlich zuteilen, wobei jedoch eine nachtr?gliche Kontrolle stark vereinfacht und damit praktikabel wird. Eingegangen am 22. Februar 2001 / Angenommen am 22. Mai 2001  相似文献   
972.
973.
Identifying and accessing reliable, relevant consumer health information rapidly on the Internet may challenge the health sciences librarian and layperson alike. In this study, seven search engines are compared using representative consumer health topics for their content relevancy, system features, and attributes. The paper discusses evaluation criteria; systematically compares relevant results; analyzes performance in terms of the strengths and weaknesses of the search engines; and illustrates effective search engine selection, search formulation, and strategies.  相似文献   
974.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
975.
BACKGROUND: Because of the expense of updating practice guidelines, recent attention has focused on approaches that can reliably assess any updating required. Shekelle et al. (Journal of the American Medical Association 2001, 286, 1461-7) proposed using limited literature searches with expert involvement to reduce resources used in assessing whether a guideline needs updating. OBJECTIVES: This study compared Shekelle's method and the traditional systematic review method regarding comprehensiveness and effort. METHODS: Two research teams translated critical key questions on screening test treatments and outcomes to Medical Subjects Headings (MeSH) and search strategies. They refined Shekelle's method over three iterations, seeking greater efficiency. Using both methods independently, teams assessed the need to update six topics from the 1996 Guide to Clinical Preventive Services (US Preventive Services Task Force). Outcomes included completeness of study identification, importance of missed studies and effort involved. RESULTS: The revised review approach produced fewer citations than the traditional approach and saved time, identifying fewer eligible studies than the traditional approach. None of the studies missed was rated important by the experts consulted. CONCLUSIONS: The revised review approach provides an acceptable method for judging whether a guideline requires updating. Librarians were an integral part of the research process that streamlined the searches.  相似文献   
976.
In this article, I compare the assumptions, concepts, and propositions of media system dependency (MSD) theory and uses and gratifications (U&G) theory at the microlevel of analysis. The epistemological origins of these theories are situated within the differing social and personal contexts that affected their development. Those MSD assumptions that serve as background to this comparison are specified, and major hypotheses concerning the social ecology of microeffects processes are discussed, particularly as they pertain to public opinion concerns. Following this elaboration of MSD theory, basic differences between MSD and U&G conceptions of the audience, interpersonal networks, the media system, and the nature of media power are addressed. I conclude with a brief comment on the implications of the Internet for theorizing micro media effects.  相似文献   
977.
978.
Do physical activity beliefs differ by age and gender?   总被引:1,自引:0,他引:1  
Age and gender are consistently related to physical activity (PA), yet theoretical explanation for these associations is scant. The present study compared the mean values and correlations of a population sample, divided by gender and age group, with respect to theory of planned behavior beliefs (behavioral, normative, and control) and PA. Participants were a sample (N=6,739) of adults (M age=49.65, SD=16.04) who completed measures of social and health demographics, theory of planned behavior beliefs, and self-reported PA. Mean analyses identified greater perceived control over PA for seniors than for young and middle-aged adults (N>.025). Belief-behavior correlations, however, were not different across age and gender in 24 of 26 tests (q<.19). Thus, PA beliefs are invariant across age and gender with the exception of mean levels of perceived control, which are lower among younger adults than older adults. Factors such as early parenthood and career demands were considered the likely reasons for differences. Overall, the evidence suggests that adapting theoretical models for specific age groups or based on gender may not be necessary.  相似文献   
979.
A new compliance-gaining technique is introduced called the “just-one-more” (JOM) technique that increases compliance rates by including the phrase “I just need one more person to help.” Two studies are reported (N = 160 in each). The first established the effectiveness of the technique as compared to a direct request. The second tested the hypothesis that goal difficulty moderates the technique's effectiveness in a 2 (JOM or direct request) × 2 (requester needs five surveys or 100). Results indicate that the JOM was substantially more effective than a direct request in the 100 surveys condition but not the five.  相似文献   
980.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号