全文获取类型
收费全文 | 1193篇 |
免费 | 28篇 |
专业分类
教育 | 1022篇 |
科学研究 | 30篇 |
各国文化 | 22篇 |
体育 | 54篇 |
综合类 | 3篇 |
文化理论 | 6篇 |
信息传播 | 84篇 |
出版年
2023年 | 8篇 |
2022年 | 8篇 |
2021年 | 18篇 |
2020年 | 20篇 |
2019年 | 32篇 |
2018年 | 64篇 |
2017年 | 63篇 |
2016年 | 65篇 |
2015年 | 30篇 |
2014年 | 38篇 |
2013年 | 319篇 |
2012年 | 42篇 |
2011年 | 33篇 |
2010年 | 30篇 |
2009年 | 28篇 |
2008年 | 38篇 |
2007年 | 31篇 |
2006年 | 27篇 |
2005年 | 37篇 |
2004年 | 28篇 |
2003年 | 15篇 |
2002年 | 19篇 |
2001年 | 18篇 |
2000年 | 17篇 |
1999年 | 15篇 |
1998年 | 12篇 |
1997年 | 10篇 |
1996年 | 15篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 8篇 |
1992年 | 7篇 |
1991年 | 11篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 8篇 |
1987年 | 6篇 |
1986年 | 7篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 7篇 |
1977年 | 3篇 |
1975年 | 4篇 |
1971年 | 5篇 |
1969年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有1221条查询结果,搜索用时 395 毫秒
91.
Helen S. Du Samuel K.W. Chu Gary E. Gorman Felix L.C. Siu 《Library & information science research》2014
Three groups of social bookmarking users, namely experienced users, users with moderate level of experience, and novice users, were investigated, in terms of their reported tagging behaviors, perceived usefulness of social bookmarking in information discovery and management, and perceived usefulness of the bookmarking features provided. Based on the empirical analysis of the Connotea users, who are primarily in academia, the study shows that experienced academic users generally prefer to use social bookmarking while moderately experienced and novice users still prefer to use the traditional bookmarking methods, such as creating and using bookmarks on a dedicated computer. Experienced academic users were also found to create more tags per bookmark comparing to the other two groups. Most novice academic users, however, only created one tag per bookmark, which just met Connotea's minimum requirement. Surprisingly different from the collaborative design nature of the social bookmarking systems, the study finds that our participants, particularly experienced academic users, prefer to create and use their own bookmarks rather than sharing bookmarks created by others. In fact, experienced users have significantly higher frequency (once every two weeks) of creating bookmarks than the other two groups (once a month or less). In addition, website design features and functions, such as automatic collection of bibliographic information, are regarded by all participants as helpful for information discovery. The in-depth examination and discussion of the opinions of Connotea users may be useful for further improvement of the design features and usage applications, particularly for academic social bookmarking websites. The results may also have potential implications to the future development of social bookmarking services in general. 相似文献
92.
93.
94.
95.
Helen Bilton 《International Journal of Early Years Education》1994,2(2):54-65
The majority of state nursery education in the United Kingdom is part‐time. Although there are exceptions this usually means that children attend either in the morning or afternoon. The format of the afternoon session can often resemble the morning session, offering similar activities. This paper sets out to examine the comparative quality of experience for children attending part‐time nursery at different times of the day. It looks particularly at storytime, when the whole group of children is brought together to share a story. The findings suggest the two sessions are not of equal value to the children, that children may not be performing as well in the afternoon and that the traditional group storytime may not be as effective for the afternoon children. This type of storytime may need to be adapted/changed to match the needs of the particular group of children, taking into consideration performance during the day. Finally, suggestions are given for other ways to ensure children have worthwhile story experiences. 相似文献
96.
97.
Helen Thompson 《Health information and libraries journal》1987,4(3):181-182
98.
99.
100.
This paper identifies two conceptions of security in contemporary concerns over the vulnerability of computers and networks
to hostile attack. One is derived from individual-focused conceptions of computer security developed in computer science and
engineering. The other is informed by the concerns of national security agencies of government as well as those of corporate
intellectual property owners. A comparative evaluation of these two conceptions utilizes the theoretical construct of “securitization,”developed
by the Copenhagen School of International Relations.
This article has been on the drawing boards for longer than I dare to admit. Along the way, many have helped its development
by generously sharing their wisdom: James Der Derian, Niva Elkin-Koren, Ed Felten, Batya Friedman, Lene Hansen, audiences
at CEPE, TPRC, the Yale Cybercrime and Digital Law Enforcement Conference, and Watson Institute’s Symposium in Dis/Simulations
of War and Peace,” and University of Newcastle, Computer Science Department. Thanks, also, to Sam Howard-Spink for excellent
editorial assistance. 相似文献