首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30篇
  免费   0篇
  国内免费   2篇
教育   11篇
科学研究   13篇
综合类   1篇
信息传播   7篇
  2019年   1篇
  2017年   2篇
  2016年   1篇
  2015年   1篇
  2013年   4篇
  2012年   1篇
  2011年   4篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   4篇
  2006年   2篇
  2005年   3篇
  2003年   1篇
  2002年   1篇
  2000年   1篇
  1999年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
11.
The paper examines the state of library automation in academic and special libraries in Nigeria. As a background, an attempt was made to present efforts made by different bodies and institutions in the country to automate their entire library systems. Also disclosed are the reasons why the libraries opted for automated systems, the successes achieved by some of the libraries in automating their systems, and the problems faced by the libraries who succeeded in automating some of their systems as well as those who are still in the process of doing so. Considering the fact that the automation of library systems in Nigeria has spread from academic and special libraries to the public, and there are also a number of companies/institutions engaged in the provision and servicing of computer hardware and software including management information systems, the paper concluded that the future of library automation in the country is bright.  相似文献   
12.
目前对垃圾邮件的过滤主要有基于内容、基于IP地址和基于规则等方法,这些方法对垃圾邮件的过滤起到了一定作用。但单种邮件过滤技术只是针对邮件的某种属性进行过滤,因而造成邮件过滤判断的片面性。对此,设计了基于陪审团机制的邮件过滤系统。在这个系统中,各种现有的邮件过滤器对邮件的过滤结果,并非邮件过滤的最后结果,而是作为该系统的邮件过滤判断的一个输入值,最后根据系统所定的计算规则得出邮件的最终过滤结果。  相似文献   
13.
基于SQL Server网络数据库系统稳定安全的数据存储和方便的网络访问的特性,利用ASP3.0和ASP.NET技术建立与SQL Server数据库为核心的WEB式的单位内部邮件系统.  相似文献   
14.
With the growth of digital records, particularly email, archives must adapt their methods of acquiring, appraising and providing access to records. As one possible solution, the Provincial Archives of New Brunswick advocates the use of digital forensics. This article moves beyond simply advocating a technical solution, however, to include a fuller understanding of the challenges archivists may encounter when appraising email, such as the discovery of personal information, personally identifiable information and other information that is not reflected in traditional correspondence.  相似文献   
15.
孙景  丁伟  杨晓艳 《海外英语》2012,(4):115-116
The wide application of internet technology has provided the possibility to study and research new writing concepts and teaching modes in the classroom of English as a Second Language(ESL).In this trend,using email to assist English writing class has gained much attention in this field.This paper discusses the evaluation of email effectiveness with the implication of the Second Language Acquisition(SLA) theory.The result shows that the email assisted English writing class is a very salient method though it had its limitation somehow.  相似文献   
16.
《The Reference Librarian》2013,54(75-76):163-172
Summary

Emerging technologies continue to offer librarians new opportunities to improve user services. Comment and query links on some library web pages are absorbing a significant share of the customer service workload previously handled by traditional reference desks. Fa miliar types of patron problems of course continue to crop up at the “vir tual reference desk.” New and different aspects of patron problems also appear. Originating with the experiences of a research university li brary's web group in dealing with incoming user messages, this study examines the challenges as well as advantages of dealing with “problem patron” phenomena in a virtual environment.  相似文献   
17.
The management of email remains a major challenge for organisations. In this article, we explore the extent of the perceptions of email as a business critical tool within an organisation and how the level of such perceptions may moderate the level of email overload experienced by individuals within the organisation. Data from a sample of 1100 employees of a multinational technology firm are analysed using multivariate techniques. The results suggest that without a clearly stated code of email practice within an organisation, there are likely to be large variations in what is perceived as ‘business-critical’ email and, as a result, a substantial amount of email generated within the organisation may not be ‘business-critical’, potentially increasing the level of ‘email-overload’ experienced by individuals within the organisation.  相似文献   
18.
【目的】 为学术期刊的邮件推送提供参考,给出提高打开率和点击率的方法建议。【方法】 根据2014—2016年《中国激光》杂志社邮件推送的经验,从内容、美观性、对象、频率、题目五个方面总结了提高打开率和点击率的策略。【结果】 内容设计与推送对象等因素对提高推送邮件的打开率和点击率有明显作用。【结论】 主题多样、版式美观、收件人相关、发送频率恰当、题目中肯是提高邮件推送打开率和点击率的重要因素,也是实现邮件推送作用的有效保证。学术期刊论文推送工作中,应当不断探索以提升邮件推送效果。  相似文献   
19.
利用网站实现学术期刊的主动宣传   总被引:1,自引:0,他引:1  
利用网站实现科技期刊的主动宣传是期刊进行组稿、扩大影响,进而提高被引频次和影响因子的最方便、最经济和最有效的手段,也是科技期刊网站建设的比较高级阶段,即从坐等读者上门转变为主动宣传,提高服务意识和服务内容的阶段。目前最广为采用的技术和服务主要包括两种:Email Alert服务和RSS聚焦服务。本文介绍了这两种服务的含义、内容和技术实现方法。  相似文献   
20.
This paper investigates the research question if senders of large amounts of irrelevant or unsolicited information – commonly called “spammers” – distort the network structure of social networks. Two large social networks are analyzed, the first extracted from the Twitter discourse about a big telecommunication company, and the second obtained from three years of email communication of 200 managers working for a large multinational company. This work compares network robustness and the stability of centrality and interaction metrics, as well as the use of language, after removing spammers and the most and least connected nodes. The results show that spammers do not significantly alter the structure of the information-carrying network, for most of the social indicators. The authors additionally investigate the correlation between e-mail subject line and content by tracking language sentiment, emotionality, and complexity, addressing the cases where collecting email bodies is not permitted for privacy reasons. The findings extend the research about robustness and stability of social networks metrics, after the application of graph simplification strategies. The results have practical implication for network analysts and for those company managers who rely on network analytics (applied to company emails and social media data) to support their decision-making processes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号