全文获取类型
收费全文 | 3032篇 |
免费 | 10篇 |
专业分类
教育 | 2095篇 |
科学研究 | 533篇 |
体育 | 104篇 |
综合类 | 7篇 |
文化理论 | 62篇 |
信息传播 | 241篇 |
出版年
2022年 | 3篇 |
2021年 | 15篇 |
2020年 | 3篇 |
2019年 | 9篇 |
2018年 | 68篇 |
2017年 | 104篇 |
2016年 | 176篇 |
2015年 | 118篇 |
2014年 | 57篇 |
2013年 | 106篇 |
2012年 | 151篇 |
2011年 | 172篇 |
2010年 | 83篇 |
2009年 | 35篇 |
2008年 | 72篇 |
2007年 | 65篇 |
2006年 | 50篇 |
2005年 | 686篇 |
2004年 | 473篇 |
2003年 | 301篇 |
2002年 | 134篇 |
2001年 | 65篇 |
2000年 | 30篇 |
1999年 | 26篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1980年 | 1篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1970年 | 1篇 |
1961年 | 1篇 |
排序方式: 共有3042条查询结果,搜索用时 0 毫秒
61.
It is said that “absence makes the heart grow fonder.” But, when and why does an absent event become salient to the heart or to the brain? An absent event may become salient when its nonoccurrence is surprising. Van Hamme and Wasserman (1994) found that a nonpresented but expected stimulus can actually change its associative status—and in the opposite direction from a presented stimulus. Associative models like that of Rescorla and Wagner (1972) focus only on presented cues; so, they cannot explain this result. However, absent cues can be permitted to change their value by assigning different learning parameters to present and absent cues. Van Hamme and Wasserman revised the Rescorla-Wagner model so that the α parameter is positive for present cues, but negative for absent cues; now, changes in the associative strength of absent cues move in the opposite direction as presented ones. This revised Rescorla-Wagner model can thus explain such otherwise vexing empirical findings as backward blocking, recovery from overshadowing, and backward conditioned inhibition. Moreover, the revised model predicts new effects. For example, explicit information about the absence of nonpresented cues should increase their salience (that is, their negative α value should be larger), leading to stronger associative changes than when no explicit mention is made of cue absence. Support for this prediction is detailed in a new causal judgment experiment in which participants rated the effectiveness of different foods’ triggering a patient’s allergic reaction. Overall, these and other findings encourage us to view human causal learning from an associative perspective. 相似文献
62.
We explored response rate as a possible mediator of learned stimulus equivalence. Five pigeons were trained to discriminate
four clip art pictures presented during a 10-sec discrete-trial fixed interval (FI) schedule: two paired with a one-pellet
reinforcer, which supported a low rate of responding, and two paired with a nine-pellet reinforcer, which supported a high
rate of responding. After subjects associated one stimulus from each of these pairs with a discriminative choice response,
researchers presented two new clip art stimuli during a 10-sec FI: one trained with a differential reinforcement of low rate
schedule (DRL) after the FI and the other trained with a differential reinforcement of high rate schedule (DRH) after the
FI. Each of the stimuli that were withheld during choice training was later shown to see if the choice responses would transfer
to these stimuli. The results suggest that response rate alone does not mediate learned stimulus equivalence. 相似文献
63.
64.
This article introduces a research study on student model formation and development in introductory mechanics. As a point
of entry, I present a detailed analysis of the Long Decay Model of one-dimensional projectile motion. This model has been
articulated by Galileo (in De Motu) and by contemporary students. Implications for instruction are discussed.
Mark Lattery is an Associate Professor of Physics at the University of Wisconsin Oshkosh. He holds a Ph.D. in experimental high-energy physics from the University of Minnesota. His current research interests include physics education and the history of physics. 相似文献
Mark Joseph LatteryEmail: |
Mark Lattery is an Associate Professor of Physics at the University of Wisconsin Oshkosh. He holds a Ph.D. in experimental high-energy physics from the University of Minnesota. His current research interests include physics education and the history of physics. 相似文献
65.
Debasis?GangulyEmail authorView authors OrcID profile Gareth?J.?F.?Jones Aarón?Ramírez-de-la-Cruz Gabriela?Ramírez-de-la-Rosa Esaú?Villatoro-Tello 《Information Retrieval》2018,21(1):1-23
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents. 相似文献
66.
67.
This paper addresses a neglected topic in the knowledge management literature: how the size of a network of actors affects the nature of intra-network social relations and knowledge processes. It makes a theoretical contribution to developing understanding in this area drawing on a range of literatures including practice-based perspectives on knowledge, the literature on the embeddedness of social relations, and relevant knowledge management literature. The central focus of this paper is on the relationship between network size, network density, and how these variables affect intra-network knowledge processes. It suggests that as network size increases network density is likely to decrease (as it becomes problematic for the actors in such networks to retain strong ties with a significant proportion of the network's members), which it will be suggested has significant ramifications for intra-network knowledge processes. This paper concludes by reflecting on the implications of the ideas developed for network-based forms of organizing, and innovation processes. 相似文献
68.
J?rgen Gulddahl Rasmussen 《Tertiary Education and Management》2001,7(4):354-356
Volume Contents
Contents Volume 7 2001 相似文献69.
Johnny Hartz S?raker 《Ethics and Information Technology》2012,14(3):209-219
It has become commonplace to hold the view that virtual surrogates for the things that are good in life are inferior to their actual, authentic counterparts, including virtual education, virtual skill-demanding activities and virtual acts of creativity. Virtual friendship has also been argued to be inferior to traditional, embodied forms of friendship. Coupled with the view that virtual friendships threaten to replace actual ones, the conclusion is often made that we ought to concentrate our efforts on actual friendships rather than settle for virtual replacements. The purpose of this paper is to offer a balanced and empirically grounded analysis of the relative prudential value of actual and virtual friendship. That is, do actual and virtual friendships differ when it comes to enhancing our subjective well-being? In doing so, I will discuss a number of presuppositions that lie behind common criticisms of virtual friendship. This will include, among other considerations, their potential for replacing actual friendship, as well as the possibility for self-disclosure, trust, sharing and dynamic spread of happiness in virtual worlds. The purpose is not to arrive at a firm, normative conclusion, but rather to introduce a number of considerations that we should take into account in our individual deliberations over which role virtual friendships ought to have in our unique life situations. 相似文献
70.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献