首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   43542篇
  免费   680篇
  国内免费   28篇
教育   31125篇
科学研究   3710篇
各国文化   476篇
体育   3699篇
综合类   18篇
文化理论   367篇
信息传播   4855篇
  2021年   449篇
  2020年   692篇
  2019年   1070篇
  2018年   1439篇
  2017年   1400篇
  2016年   1257篇
  2015年   774篇
  2014年   1128篇
  2013年   8365篇
  2012年   1036篇
  2011年   1102篇
  2010年   821篇
  2009年   875篇
  2008年   960篇
  2007年   881篇
  2006年   798篇
  2005年   719篇
  2004年   730篇
  2003年   629篇
  2002年   642篇
  2001年   822篇
  2000年   814篇
  1999年   716篇
  1998年   439篇
  1997年   437篇
  1996年   515篇
  1995年   457篇
  1994年   408篇
  1993年   404篇
  1992年   591篇
  1991年   600篇
  1990年   581篇
  1989年   613篇
  1988年   555篇
  1987年   572篇
  1986年   541篇
  1985年   616篇
  1984年   497篇
  1983年   479篇
  1982年   409篇
  1981年   386篇
  1980年   394篇
  1979年   560篇
  1978年   411篇
  1977年   378篇
  1976年   331篇
  1975年   295篇
  1974年   310篇
  1973年   284篇
  1971年   295篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
211.
This study examines mistreatment through the perspectives of employees with different cultural backgrounds and positions in order to understand the ways in which some voices are muted and others are privileged. Mistreatment is interactional, distributive, procedural, or systemic abuse of employees taking place at both interpersonal and institutional levels on the basis of cultural diversity. Narrative analysis of semi-structured interviews with employees of a large research and development organization revealed three types of muted narratives used to respond to mistreatment (muted-but-engaged, angrily disengaged, and resigned) as well as one type of privileged response. The narratives provided evidence of two processes by which voices became muted: repeated silencing over time and silencing through ambiguity of policies.  相似文献   
212.
The University of Colorado at Boulder Libraries used participatory management to reduce a special collections backlog. Without an increase in budget or staffing, technical and public services departments designed a pilot project to redeploy internal human resources in a collaborative manner. The process of backlog management is discussed.  相似文献   
213.
214.
215.
In 2001, the Regenstrief Institute for Health Care and the Indiana University School of Medicine (IUSM) began an IAIMS planning effort to create a vision and a tactical plan for the first Integrated Advanced Information Management Systems (IAIMS) implementation to cross a large area and include unaffiliated institutions. A number of elements made this planning effort unique. Among these elements were the existence of a network infrastructure that supported the Indianapolis Network for Patient Care, the existence of a mature medical informatics program at the Regenstrief Institute, and the existence of a wide-area knowledge network fostered by the IUSM libraries. However, the leadership for a strong information technology role in the IUSM that could promote collaboration in support of education and research across the diverse Indianapolis hospital systems had been lacking. By bringing together various groups, each with a commitment to improve health care quality and public health across the Indianapolis metropolitan area, regardless of individual institutional affiliation, the strategic directions for I3-Indianapolis IAIMS Initiative have been defined and the foundations for a third generation IAIMS construct have been laid in Indianapolis, Indiana.  相似文献   
216.
BACKGROUND: The analysis included forty-one academic health sciences library (HSL) Websites as captured in the first two weeks of January 2001. Home pages and persistent navigational tools (PNTs) were analyzed for layout, technology, and links, and other general site metrics were taken. METHODS: Websites were selected based on rank in the National Network of Libraries of Medicine, with regional and resource libraries given preference on the basis that these libraries are recognized as leaders in their regions and would be the most reasonable source of standards for best practice. A three-page evaluation tool was developed based on previous similar studies. All forty-one sites were evaluated in four specific areas: library general information, Website aids and tools, library services, and electronic resources. Metrics taken for electronic resources included orientation of bibliographic databases alphabetically by title or by subject area and with links to specifically named databases. RESULTS: Based on the results, a formula for determining obligatory links was developed, listing items that should appear on all academic HSL Web home pages and PNTs. CONCLUSIONS: These obligatory links demonstrate a series of best practices that may be followed in the design and construction of academic HSL Websites.  相似文献   
217.
OBJECTIVES: This paper explores the potential of multinomial logistic regression analysis to perform Web usage mining for an academic health sciences library Website. METHODS: Usage of database-driven resource gateway pages was logged for a six-month period, including information about users' network addresses, referring uniform resource locators (URLs), and types of resource accessed. RESULTS: It was found that referring URL did vary significantly by two factors: whether a user was on-campus and what type of resource was accessed. CONCLUSIONS: Although the data available for analysis are limited by the nature of the Web and concerns for privacy, this method demonstrates the potential for gaining insight into Web usage that supplements Web log analysis. It can be used to improve the design of static and dynamic Websites today and could be used in the design of more advanced Web systems in the future.  相似文献   
218.
219.
Der Burrows-Wheeler-Kompressionsalgorithmus hat als ein universelles Kompressionsverfahren in den letzten Jahren aufgrund seiner hervorragenden Kompressionsraten und hohen Verarbeitungsgeschwindigkeiten eine bemerkenswerte Beachtung erfahren. Das Herzstück des Algorithmus stellt die sogenannte Burrows-Wheeler-Transformation dar. Es handelt sich bei dieser Transformation um eine Permutation der Eingabedaten, welche Zeichen mit ähnlichem Kontext nahe beieinander anordnet. Die Transformation sowie die zugehörige Rücktransformation werden zusammen mit den weiteren Stufen des Algorithmus in einer gegenüber der Standardversion verbesserten Variante vorgestellt und die Ergebnisse mit denen anderer Datenkompressionsalgorithmen verglichen.  相似文献   
220.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号