全文获取类型
收费全文 | 36097篇 |
免费 | 426篇 |
国内免费 | 25篇 |
专业分类
教育 | 25129篇 |
科学研究 | 3079篇 |
各国文化 | 398篇 |
体育 | 3599篇 |
综合类 | 28篇 |
文化理论 | 311篇 |
信息传播 | 4004篇 |
出版年
2021年 | 328篇 |
2020年 | 537篇 |
2019年 | 785篇 |
2018年 | 1020篇 |
2017年 | 1039篇 |
2016年 | 967篇 |
2015年 | 605篇 |
2014年 | 801篇 |
2013年 | 6570篇 |
2012年 | 730篇 |
2011年 | 802篇 |
2010年 | 632篇 |
2009年 | 683篇 |
2008年 | 705篇 |
2007年 | 666篇 |
2006年 | 630篇 |
2005年 | 551篇 |
2004年 | 828篇 |
2003年 | 636篇 |
2002年 | 683篇 |
2001年 | 650篇 |
2000年 | 704篇 |
1999年 | 590篇 |
1998年 | 344篇 |
1997年 | 356篇 |
1996年 | 436篇 |
1995年 | 364篇 |
1994年 | 375篇 |
1993年 | 336篇 |
1992年 | 492篇 |
1991年 | 513篇 |
1990年 | 472篇 |
1989年 | 543篇 |
1988年 | 478篇 |
1987年 | 494篇 |
1986年 | 475篇 |
1985年 | 557篇 |
1984年 | 452篇 |
1983年 | 443篇 |
1982年 | 374篇 |
1981年 | 348篇 |
1980年 | 346篇 |
1979年 | 488篇 |
1978年 | 379篇 |
1977年 | 340篇 |
1976年 | 315篇 |
1975年 | 269篇 |
1974年 | 284篇 |
1973年 | 257篇 |
1971年 | 263篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
971.
Steffen E. Seufert 《Informatik - Forschung und Entwicklung》2002,17(1):1-11
Zusammenfassung. In diesem Beitrag wird ein formaler Ansatz zur Ableitung von Zugriffsrechten auf der Basis eines formalen Organisationsmodells
vorgestellt. Hierzu wird der Ansatz der rollenbasierten Zugriffskontrolle (engl. Role-Based Access Control, kurz RBAC) um die M?glichkeit erweitert, Aufbauorganisationen zu modellieren. Der Vorteil gegenüber rollenbasierten Ans?tzen mit einfachen
Rollenhierarchien ist die klare Struktur, die einem Zugriffskontrollmodell durch die Organisationsform aufgepr?gt wird. Des
Weiteren k?nnen organisatorische Regelungen, wie z.B. Urlaubsvertretung oder Weisungsbefugnis, direkt im Modell hinterlegt
werden. Aufwendig zu pflegende und h?ufig inkonsistente Rollenkataloge werden obsolet. Sicherheitsstrategien mit unpr?zisen
Vorgaben lassen sich mittels der vorgestellten Technik der sog. `Kompetenzerweiterung' umsetzen. Das zugrundeliegende Paradigma
des vorgestellten Ansatzes unterscheidet sich stark von anderen Ans?tzen mit statischer Autorisation. Nutzer k?nnen sich Zugriffsrechte
in fest definierten Grenzen selbstverantwortlich zuteilen, wobei jedoch eine nachtr?gliche Kontrolle stark vereinfacht und
damit praktikabel wird.
Eingegangen am 22. Februar 2001 / Angenommen am 22. Mai 2001 相似文献
972.
973.
Identifying and accessing reliable, relevant consumer health information rapidly on the Internet may challenge the health sciences librarian and layperson alike. In this study, seven search engines are compared using representative consumer health topics for their content relevancy, system features, and attributes. The paper discusses evaluation criteria; systematically compares relevant results; analyzes performance in terms of the strengths and weaknesses of the search engines; and illustrates effective search engine selection, search formulation, and strategies. 相似文献
974.
Debasis?GangulyEmail authorView authors OrcID profile Gareth?J.?F.?Jones Aarón?Ramírez-de-la-Cruz Gabriela?Ramírez-de-la-Rosa Esaú?Villatoro-Tello 《Information Retrieval》2018,21(1):1-23
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents. 相似文献
975.
Voisin CE de la Varre C Whitener L Gartlehner G 《Health information and libraries journal》2008,25(3):198-207
BACKGROUND: Because of the expense of updating practice guidelines, recent attention has focused on approaches that can reliably assess any updating required. Shekelle et al. (Journal of the American Medical Association 2001, 286, 1461-7) proposed using limited literature searches with expert involvement to reduce resources used in assessing whether a guideline needs updating. OBJECTIVES: This study compared Shekelle's method and the traditional systematic review method regarding comprehensiveness and effort. METHODS: Two research teams translated critical key questions on screening test treatments and outcomes to Medical Subjects Headings (MeSH) and search strategies. They refined Shekelle's method over three iterations, seeking greater efficiency. Using both methods independently, teams assessed the need to update six topics from the 1996 Guide to Clinical Preventive Services (US Preventive Services Task Force). Outcomes included completeness of study identification, importance of missed studies and effort involved. RESULTS: The revised review approach produced fewer citations than the traditional approach and saved time, identifying fewer eligible studies than the traditional approach. None of the studies missed was rated important by the experts consulted. CONCLUSIONS: The revised review approach provides an acceptable method for judging whether a guideline requires updating. Librarians were an integral part of the research process that streamlined the searches. 相似文献
976.
A Theory of Media Power and a Theory of Media Use: Different Stories,Questions, and Ways of Thinking
Sandra J. Ball-Rokeach 《Mass Communication and Society》2013,16(1-2):5-40
In this article, I compare the assumptions, concepts, and propositions of media system dependency (MSD) theory and uses and gratifications (U&G) theory at the microlevel of analysis. The epistemological origins of these theories are situated within the differing social and personal contexts that affected their development. Those MSD assumptions that serve as background to this comparison are specified, and major hypotheses concerning the social ecology of microeffects processes are discussed, particularly as they pertain to public opinion concerns. Following this elaboration of MSD theory, basic differences between MSD and U&G conceptions of the audience, interpersonal networks, the media system, and the nature of media power are addressed. I conclude with a brief comment on the implications of the Internet for theorizing micro media effects. 相似文献
977.
978.
Do physical activity beliefs differ by age and gender? 总被引:1,自引:0,他引:1
Age and gender are consistently related to physical activity (PA), yet theoretical explanation for these associations is scant. The present study compared the mean values and correlations of a population sample, divided by gender and age group, with respect to theory of planned behavior beliefs (behavioral, normative, and control) and PA. Participants were a sample (N=6,739) of adults (M age=49.65, SD=16.04) who completed measures of social and health demographics, theory of planned behavior beliefs, and self-reported PA. Mean analyses identified greater perceived control over PA for seniors than for young and middle-aged adults (N>.025). Belief-behavior correlations, however, were not different across age and gender in 24 of 26 tests (q<.19). Thus, PA beliefs are invariant across age and gender with the exception of mean levels of perceived control, which are lower among younger adults than older adults. Factors such as early parenthood and career demands were considered the likely reasons for differences. Overall, the evidence suggests that adapting theoretical models for specific age groups or based on gender may not be necessary. 相似文献
979.
Christopher J. Carpenter 《Communication Research Reports》2013,30(2):163-170
A new compliance-gaining technique is introduced called the “just-one-more” (JOM) technique that increases compliance rates by including the phrase “I just need one more person to help.” Two studies are reported (N = 160 in each). The first established the effectiveness of the technique as compared to a direct request. The second tested the hypothesis that goal difficulty moderates the technique's effectiveness in a 2 (JOM or direct request) × 2 (requester needs five surveys or 100). Results indicate that the JOM was substantially more effective than a direct request in the 100 surveys condition but not the five. 相似文献
980.