全文获取类型
收费全文 | 3422篇 |
免费 | 61篇 |
国内免费 | 16篇 |
专业分类
教育 | 2610篇 |
科学研究 | 204篇 |
各国文化 | 37篇 |
体育 | 271篇 |
综合类 | 29篇 |
文化理论 | 25篇 |
信息传播 | 323篇 |
出版年
2022年 | 36篇 |
2021年 | 47篇 |
2020年 | 68篇 |
2019年 | 110篇 |
2018年 | 156篇 |
2017年 | 150篇 |
2016年 | 149篇 |
2015年 | 71篇 |
2014年 | 111篇 |
2013年 | 573篇 |
2012年 | 115篇 |
2011年 | 117篇 |
2010年 | 103篇 |
2009年 | 107篇 |
2008年 | 112篇 |
2007年 | 116篇 |
2006年 | 101篇 |
2005年 | 96篇 |
2004年 | 93篇 |
2003年 | 121篇 |
2002年 | 151篇 |
2001年 | 131篇 |
2000年 | 90篇 |
1999年 | 37篇 |
1998年 | 38篇 |
1997年 | 43篇 |
1996年 | 34篇 |
1995年 | 39篇 |
1994年 | 27篇 |
1993年 | 44篇 |
1992年 | 28篇 |
1991年 | 23篇 |
1990年 | 31篇 |
1989年 | 25篇 |
1988年 | 22篇 |
1987年 | 16篇 |
1986年 | 13篇 |
1985年 | 14篇 |
1984年 | 12篇 |
1983年 | 6篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 9篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 6篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 8篇 |
1973年 | 10篇 |
排序方式: 共有3499条查询结果,搜索用时 31 毫秒
101.
在研发驱动的内生经济增长理论的框架内,对企业研发竞争行为和政府研发政策的最新研究进展进行了深入探讨,并结合我国产业现状指出政府为产业领先者提供补贴并对新的产业领先企业的利润征税能使社会福利达到最优。 相似文献
102.
103.
104.
Previous papers on grey literature by the authors have described (1) the need for formal metadata to allow machine understanding
and therefore scalable operations; (2) the enhancement of repositories of grey (and other) e-publications by linking with
CRIS (Current Research Information Systems); (3) the use of the research process to collect metadata incrementally reducing
the threshold barrier for end-users and improving quality in an ambient GRIDs environment. This paper takes the development
one step further and proposes “intelligent” grey objects. The hypothesis is in 2 parts: (1) that the use of passive catalogs
of metadata does not scale (a) in a highly distributed environment with millions of nodes and (b) with vastly increased volumes
of R&D output grey publications with associated metadata; (2) that a new paradigm is required that (a) integrates grey with
white literature and other R&D outputs such as software, data, products and patents (b) in a self-managing, self-optimizing
way and that this paradigm manages automatically curation, provenance digital rights, trust, security and privacy. Concerning
(1) existing repositories provide catalogs; harvesting takes increasing time ensuring non-currency. The end-user expends much
manual effort/intelligence to utilize the results. The elapsed time of (1) the network (2) the centralized (or centrally controlled
distributed) catalog server searches (3) end-user intervention becomes unacceptable. Concerning (2) there is no paradigm currently
known to the authors that satisfies the requirement. Our proposal is outlined below. Hyperactive combines both hyperlinking
and active properties of a (grey) object. Hyperlinking implies multimedia components linked to form the object and also external
links to other resources. The term active implies that objects do not lie passively in a repository to be retrieved by end-users.
They “get a life” and the object moves through the network knowing where it is going. A hyperactive grey object is wrapped
by its (incrementally recorded) formal metadata and an associated (software) agent. It moves through process steps such as
initial concept, authoring, reviewing and depositing in a repository. The workflow is based on the rules and information in
the corporate data repository with which the agent interacts. Once the object is deposited, the agent associated with it actively
pushes the object to the end-users (or systems) whose metadata indicate interest or an obligation in a workflowed process.
The agents check the object and user (or system) metadata for rights, privacy, security parameters, and for any charges and
assure compatibility. Alternatively the object can be found passively by end-user or system agents. The object can also associate
itself with other objects forming relationships utilising metadata or content. Declared relationships include references and
citations; workflowed relationships include versions and also links to corporate information and research datasets and software;
inferenced relationships are discovered relationships such as between documents by different authors developed from an earlier
idea of a third author. Components of this paradigm have been implemented to some extent. The challenge is implementing—respecting
part two of the hypothesis—the integration architecture. This surely is harnessing the power of grey.
相似文献
Anne AssersonEmail: |
105.
106.
BACKGROUND: This study was undertaken to provide evidence that library outreach projects in the NHS in the Thames Valley Strategic Health Authority area were effective and could justify continued funding. Objectives: The object was to assess whether information literacy skills training taken up by health professionals impacts on their confidence and skills in using electronic sources of health information. METHOD: A total of 487 health professionals taking up training on a voluntary basis were assessed by completing a self-assessment questionnaire prior to and after training to establish their information literacy skills and confidence levels. Of these, 223 trainees (46%) also returned 6-week follow-up questionnaires. RESULTS: Results showed that 464 trainees (95%) intended to apply what they had learnt in a variety of ways; use of specific resources greatly increased after training and confidence in using them increased substantially. Use of search techniques increased considerably overall, whereas use of Google decreased. CONCLUSIONS: The major findings of this research are that training health-care personnel in the use of electronic resources impacts positively on their information literacy skills and confidence, and that the information available to them is considered to have potential value across health-care practice. 相似文献
107.
Veenstra R Lindenberg S Zijlstra BJ De Winter AF Verhulst FC Ormel J 《Child development》2007,78(6):1843-1854
For this study, information on Who Bullies Who was collected from 54 school classes with 918 children (M age = 11) and 13,606 dyadic relations. Bullying and victimization were viewed separately from the point of view of the bully and the victim. The two perspectives were highly complementary. The probability of a bully-victim relationship was higher if the bully was more dominant than the victim, and if the victim was more vulnerable than the bully and more rejected by the class. In a bully-victim dyad, boys were more often the bullies. There was no finding of sex effect for victimization. Liking reduced and disliking increased the probability of a bully-victim relationship. 相似文献
108.
109.
Evaluating electronic resources: Personal Development Planning resources at the Open University,a case study 总被引:1,自引:1,他引:0
This paper discusses the evaluation of Web‐based tools to support Personal Development Planning (PDP) in order to illustrate issues associated with the introduction and assessment of the effectiveness of online resources. The aims of the evaluation were based on concerns about the very complex situation that offering online resources including PDP poses for part‐time off‐campus students. In this paper the authors utilize a modified RUFDATA framework (Saunders, 2000) and consider the benefits a range of methods, including surveys and observational studies, can offer evaluations of electronic resources. They found that students used and valued some aspects of the provision but that even with best efforts of instructional designers, and user testing at the draft stage, students do not always behave as intended. This evaluation highlighted the need for a range of strategies for evaluating online resources and that regardless of student attitude there are real worries about eLearning imposing extra workload burdens on ‘time poor’ adults. 相似文献
110.
Duggan A Caldera D Rodriguez K Burrell L Rohde C Crowne SS 《Child abuse & neglect》2007,31(8):801-827
OBJECTIVES: To assess the impact of a voluntary, paraprofessional home visiting program in preventing child maltreatment and reducing the multiple, malleable psychosocial risks for maltreatment for which families had been targeted. METHODS: This collaborative, experimental study focused on 6 Healthy Families Alaska (HFAK) programs; 325 families were enrolled in 2000-2001, randomized to intervention and control groups, and interviewed to measure baseline attributes. Follow-up data were collected when children were 2 years old (85% follow-up rate). Outcomes included maltreatment reports, measures of potential maltreatment and parental risks, for example, poor mental health, substance use, and partner violence. HFAK records were reviewed to measure home visiting services. Home visitors were surveyed to measure perceived effectiveness and training adequacy. RESULTS: Parental risks were common at baseline, and one-sixth of families had a substantiated child protective services report in the child's first 2 years of life. There was no overall program effect on maltreatment reports, and most measures of potential maltreatment. Home visited mothers reported using mild forms of physical discipline less often than control mothers. The groups were similar in their use of more severe forms of physical discipline. There was no program impact on parental risks. There was no impact on outcomes for families with a 'high dose' of home visiting. Home visitors often failed to address parental risks and seldom linked families with community resources. Contradictions in the model compromised effectiveness. CONCLUSIONS: The program did not prevent child maltreatment, nor reduce the parental risks that had made families eligible for service. Research is needed to develop and test strategies to improve the effectiveness of home visiting. 相似文献