首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   0篇
教育   18篇
科学研究   4篇
体育   1篇
信息传播   12篇
  2017年   1篇
  2013年   3篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   2篇
  2006年   1篇
  2005年   3篇
  2003年   1篇
  2002年   1篇
  2001年   8篇
  1995年   2篇
  1989年   2篇
  1985年   1篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1975年   2篇
排序方式: 共有35条查询结果,搜索用时 15 毫秒
11.
12.
This study examined how grouping arrangements affect students achievement, social interaction, and motivation. Students of high, average and low ability were randomly assigned to homogeneous or heterogeneous ability groups. All groups attended the same plant biology course. The main results indicate that low-ability students achieve more and are more motivated to learn in heterogeneous groups. Average-ability students perform better in homogeneous groups whereas high-ability students show equally strong learning outcomes in homogeneous and heterogeneous groups. Results on social interaction indicate that heterogeneous groups produce higher proportions of individual elaborations, whereas homogeneous groups use relatively more collaborative elaborations. In the discussion, these differences in social interaction are used to explain the differential effects of grouping arrangements on achievement scores. Practical implications are discussed and topics for further research are advanced.  相似文献   
13.
关于<山海经>产生于何时何地,众说纷纭.本文主要用文化人类学的方法,从先秦社会发展演变入手,探讨<山海经>各部分的特点,认为<山海经>成书于战国中后期,其中<五藏山经>所记诸神多是比较古老的原始自然神,而<海荒经>中所记诸神,多是战国中后期由方士把历史人物神话化的结果.  相似文献   
14.
15.
16.
There is a common problem in artificial intelligence (AI) and information security. In AI, an expert system needs to be able to justify and explain a decision to the user. In information security, experts need to be able to explain to the public why a system is secure. In both cases, an important goal of explanation is to acquire or maintain the users’ trust. In this paper, I investigate the relation between explanation and trust in the context of computing science. This analysis draws on literature study and concept analysis, using elements from system theory as well as actor-network theory. I apply the conceptual framework to both AI and information security, and show the benefit of the framework for both fields by means of examples. The main focus is on expert systems (AI) and electronic voting systems (security). Finally, I discuss consequences of the analysis for ethics in terms of (un)informed consent and dissent, and the associated division of responsibilities.  相似文献   
17.
18.
作为全国高新技术产业开发区"排头兵"的北京中关村,其产业现状却有些令人尴尬:6000多家中小企业长期处于没有规模的初创期,资产上千万元的企业仅200余家,成为行业有影响的"龙头"型企业更是屈指可数,同时也没有形成上、中、下游产品配套发展的产业链.  相似文献   
19.
This paper argues that Knowledge Management Technology (KMT) is socially constructed in use based on the affordances and constraints of the technology artefact. Since many Knowledge Management (KM) systems are introduced with vague purposes (such as to improve knowledge sharing) it is therefore their affordances and constraints which strongly shape the socially constructed ‘KMT-in-practice’. The paper argues that knowledge is also socially constructed and that knowledge creation requires an element of surprise and challenge to routine. Using a case study of the British Council's KM programme between 1998 and 2003, the paper explores the social construction of a KMT as it is developed and used; describing how various features afforded by the technology influence its adoption and institutionalisation. The paper concludes by arguing that KMTs-in-practice, which are successful in supporting knowledge creation, must paradoxically remain in a state of neither stabilisation and acceptance, nor abandonment and disuse. Practical implications of how this might be achieved are provided.  相似文献   
20.
This paper presents an approach to locating experts within organisations through the use of the indispensable communication medium and source of information, email. The approach was realised through the email expert locator architecture developed by the authors, which uses email content in the modelling of individuals’ expertise profiles. The approach has been applied to a real-world application, EKE, and evaluated using focus group sessions and system trials. In this work, the authors report the findings obtained from the focus groups sessions. The aim of the sessions was to obtain information about the participants’ perceptions, opinions, underlying attitudes, and recommendations with regard to the notion of exploiting email content for expertise profiling. The paper provides a review of the various approaches to expertise location that have been developed and highlights the end-users’ perspectives on the usability and functionality of EKE and the socio-ethical challenges raised by its adoption from an industrial perspective.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号