首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12763篇
  免费   166篇
  国内免费   20篇
教育   8835篇
科学研究   1253篇
各国文化   120篇
体育   1470篇
综合类   6篇
文化理论   171篇
信息传播   1094篇
  2022年   107篇
  2021年   148篇
  2020年   261篇
  2019年   390篇
  2018年   510篇
  2017年   538篇
  2016年   422篇
  2015年   292篇
  2014年   352篇
  2013年   2444篇
  2012年   343篇
  2011年   295篇
  2010年   253篇
  2009年   243篇
  2008年   245篇
  2007年   254篇
  2006年   225篇
  2005年   199篇
  2004年   178篇
  2003年   220篇
  2002年   168篇
  2001年   192篇
  2000年   182篇
  1999年   180篇
  1998年   100篇
  1997年   94篇
  1996年   132篇
  1995年   101篇
  1994年   114篇
  1993年   106篇
  1992年   167篇
  1991年   159篇
  1990年   152篇
  1989年   154篇
  1988年   134篇
  1987年   128篇
  1986年   144篇
  1985年   142篇
  1984年   117篇
  1983年   133篇
  1982年   120篇
  1981年   113篇
  1980年   97篇
  1979年   171篇
  1978年   117篇
  1977年   113篇
  1976年   113篇
  1975年   85篇
  1974年   93篇
  1971年   74篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
61.
Der gleichzeitige Betrieb mehrerer Gast-Betriebssysteme auf einem einzigen physischen Rechner unter einem Host-Betriebssystem ist eine leistungsfähige moderne Entwicklung. Bekannte Beispiele sind VMware für die IA32-Architektur sowie das Betriebssystem z/VM und die PR/SM-LPAR Einrichtungen der zSeries-Architektur. Die Nutzung eines Betriebssystems als Gast bedingt einen Leistungsverlust. Die als Partitionierung bezeichnete Zuordnung von Systemressourcen zu den einzelnen Gast-Betriebssysteme ist schwierig, wenn eine dynamische Anpassung an sich ändernde Lastprofile erforderlich ist. Diese Probleme lassen sich mittels Erweiterungen der Hardwarearchitektur adressieren, sowie durch Softwarestrukturen, welche diese Erweiterungen nutzen. Die Erweiterungen der Hardwarearchitektur gehen über das hinaus, was auf heutigen Rechnerarchitekturen wie IA32 oder Mips verfügbar ist. Der vorliegende Beitrag erläutert den optimalen Betrieb von Gast-Betriebssystemen und die begleitenden Partitionierungsmöglichkeiten auf der zSeries-Plattform und beschreibt die zusätzlichen Hardware- und Software-Einrichtungen, welche dies ermöglichen.  相似文献   
62.
63.
传媒经济学研究的历史、方法与范例   总被引:3,自引:0,他引:3  
本文主要回顾了传媒经济学在西方的发展历程、研究方法以及不同时期的研究议题。传媒经济学是构建于不同的经济学理论和分析方法之上的应用性学科,它致力于研究经济和金融力量如何影响传媒体系和传媒组织。西方传媒经济学创建于20世纪50年代,至今已发展成为一个活跃的和跨学科研究领域。文章认为,西方传媒经济学的主要研究范例包括理论型、应用型和批评型范例;其研究方法可分为行业市场研究、公司研究和影响力研究。在介绍西方传媒经济学研究的同时,本文还简要回顾了传媒经济学在中国的兴起与发展。  相似文献   
64.
ABSTRACT

Lighting a cultural heritage artifact requires balancing visual perception with preventive conservation, by providing the best lighting (in terms of spectral distribution and quantity) to enable the viewer to appreciate details and color, while limiting photo-induced degradation. The paper outlines the methodology applied by a multi-disciplinary team while lighting the Shroud of Turin at its last public exhibition in 2015. The methodology considered the special requirements of the Shroud, including exposure to ultraviolet light, while providing appropriate display conditions that would meet audience expectations. The desired appearance (readability of the body image and color) was defined with the help of Shroud researchers and confirmed by subjective tests, while appropriate light levels for preservation were set in agreement with standard requirements and using knowledge of the degradation of linen in visible and UV light. The installation provided a controlled environment and a managed visitor route to the Shroud, assuring excellent perception of both details and color, with the lowest illuminance level about 15?lx.  相似文献   
65.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
66.
67.
Against the backdrop of Spain’s Transparency Act, this article discusses the presence or otherwise of a series of document types, proposed as management-related transparency indicators, on 61 (8 national and 53 provincial) historic archive websites. Although examples of good practice were identified, the information provided was found to be scant, in particular as regards lines of action, organisational objectives and yearly reports. The information most commonly provided on the websites included the collection classification chart, service use regulations and citizen charters. The inference drawn was that archives, so intently focused on their role in the application of the Act by the organisations they serve, neglect their own administrative obligations in respect of its provisions. The recommendation is that as government-funded and subsidised public service institutions, historic archives should exercise transparency by furnishing the information stipulated in the Act on their websites.  相似文献   
68.
ABSTRACT

Latent Dirichlet allocation (LDA) topic models are increasingly being used in communication research. Yet, questions regarding reliability and validity of the approach have received little attention thus far. In applying LDA to textual data, researchers need to tackle at least four major challenges that affect these criteria: (a) appropriate pre-processing of the text collection; (b) adequate selection of model parameters, including the number of topics to be generated; (c) evaluation of the model’s reliability; and (d) the process of validly interpreting the resulting topics. We review the research literature dealing with these questions and propose a methodology that approaches these challenges. Our overall goal is to make LDA topic modeling more accessible to communication researchers and to ensure compliance with disciplinary standards. Consequently, we develop a brief hands-on user guide for applying LDA topic modeling. We demonstrate the value of our approach with empirical data from an ongoing research project.  相似文献   
69.
ABSTRACT

Employing a number of different standalone programs is a prevalent approach among communication scholars who use computational methods to analyze media content. For instance, a researcher might use a specific program or a paid service to scrape some content from the Web, then use another program to process the resulting data, and finally conduct statistical analysis or produce some visualizations in yet another program. This makes it hard to build reproducible workflows, and even harder to build on the work of earlier studies. To improve this situation, we propose and discuss four criteria that a framework for automated content analysis should fulfill: scalability, free and open source, adaptability, and accessibility via multiple interfaces. We also describe how to put these considerations into practice, discuss their feasibility, and point toward future developments.  相似文献   
70.
Placing Facebook     
Facebook is challenging professional journalism. These challenges were evident in three incidents from 2016: the allegation that Facebook privileged progressive-leaning news on its trending feature; Facebook’s removal of the Pulitzer Prize-winning “Napalm Girl” photo from the pages of prominent users; and the proliferation of “fake news” during the US presidential election. Using theoretical concepts from the field of boundary work, this paper examines how The Guardian, The New York Times, Columbia Journalism Review and Poynter editorialized Facebook’s role in these three incidents to discursively construct the boundary between the value of professional journalism to democracy and Facebook’s ascendant role in facilitating essential democratic functions. Findings reveal that these publications attempted to define Facebook as a news organization (i.e., include it within the boundaries of journalism) so that they could then criticize the company for not following duties traditionally incumbent upon news organizations (i.e., place it outside the boundaries of journalism). This paper advances scholarship that focuses on both inward and outward conceptions of boundary work, further explores the complex challenge of defining who a journalist is in the face of rapidly changing technological norms, and advances scholarship in the field of media ethics that positions ethical analysis at the institutional level.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号