全文获取类型
收费全文 | 2911篇 |
免费 | 6篇 |
专业分类
教育 | 2006篇 |
科学研究 | 528篇 |
体育 | 82篇 |
综合类 | 7篇 |
文化理论 | 63篇 |
信息传播 | 231篇 |
出版年
2022年 | 3篇 |
2021年 | 16篇 |
2020年 | 2篇 |
2019年 | 4篇 |
2018年 | 56篇 |
2017年 | 100篇 |
2016年 | 167篇 |
2015年 | 116篇 |
2014年 | 52篇 |
2013年 | 60篇 |
2012年 | 151篇 |
2011年 | 165篇 |
2010年 | 82篇 |
2009年 | 30篇 |
2008年 | 67篇 |
2007年 | 58篇 |
2006年 | 47篇 |
2005年 | 686篇 |
2004年 | 471篇 |
2003年 | 300篇 |
2002年 | 132篇 |
2001年 | 64篇 |
2000年 | 30篇 |
1999年 | 25篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1976年 | 2篇 |
排序方式: 共有2917条查询结果,搜索用时 15 毫秒
31.
Debasis?GangulyEmail authorView authors OrcID profile Gareth?J.?F.?Jones Aarón?Ramírez-de-la-Cruz Gabriela?Ramírez-de-la-Rosa Esaú?Villatoro-Tello 《Information Retrieval》2018,21(1):1-23
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents. 相似文献
32.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
33.
This paper deals with intercultural aspects of privacy, particularly with regard to important differences between Japanese
and the Western views. This paper is based on our discussions with Rafael Capurro – a dialogue now represented by two separate
but closely interrelated articles. The companion paper is broadly focused on the cultural and historical backgrounds of the
concepts of privacy and individualism in “Western” worlds; our main theme focuses on different concepts of privacy in Japan
and their sources in related aspects of Japanese culture. The interrelationship between our two papers is apparent in our
taking up identical or similar topics in each paper. Reading our two papers in conjunction with each other will bring about
deeper and broader insights into the diverse values and worldviews of Japan and Western cultures that underlie concepts of
privacy that at a surface level appear to be similar 相似文献
34.
35.
Five suburban community colleges in a metropolitan area collaborated on a survey to parents of high school graduates of the class of 2002 who attended the colleges in fall 2002. The study was undertaken to learn more about parents roles in their students selection of community colleges, to give insights and information about this important community college constituency, and to assist community colleges to shape more effective ways to foster positive and supportive opinions among parents of potential students. Parents want the community college to provide students with credits and grade point averages enabling transfer, overestimate their students academic skills as measured by course placement tests, engaged in a number of college-choice activities, and indicate that factors associated with lifestyle and money were major reasons for selecting the community college. Associations between parents social capital and perceptions of their students academic abilities were found for a number of dependent variables examined. The study also revealed important differences in how participating institutions record and calculate key measures such as credits earned and grade point averages. 相似文献
36.
We investigated differences between field-study classrooms and traditional science classrooms in terms of the learning environment and students’ attitudes to science, as well as the differential effectiveness of field-study classrooms for students differing in sex and English proficiency. A modified version of selected scales from the What Is Happening In this Class? questionnaire was used to assess the learning environment, whereas students’ attitudes were assessed with a shortened version of a scale from the Test of Science Related Attitudes. A sample of 765 grade 5 students from 17 schools responded to the learning environment and attitude scales in terms of both their traditional science classrooms and classrooms at a field-study centre in Florida. Large effect sizes supported the effectiveness of the field-studies classroom in terms of both the learning environment and student attitudes. Relative to the home school science class, the field-study class was considerably more effective for students with limited English proficiency than for native English speakers. 相似文献
37.
38.
39.
40.
This paper reports research on the effects of variations in injection velocity and permeability on the heat transfer and flow
through a highly porous medium between two horizontal parallel plates situated at constant distance with constant suction
by the upper plate. Due to this type of variation in injection velocity and in permeability the flow becomes three dimensional.
The governing equations are solved by adopting complex variable notations to obtain the expressions for the velocity and temperature
field. The skin-friction along the main flow direction and rate of heat transfer are discussed with the help of graphs. 相似文献