全文获取类型
收费全文 | 1218篇 |
免费 | 39篇 |
国内免费 | 41篇 |
专业分类
教育 | 602篇 |
科学研究 | 363篇 |
体育 | 9篇 |
综合类 | 50篇 |
信息传播 | 274篇 |
出版年
2024年 | 4篇 |
2023年 | 2篇 |
2022年 | 16篇 |
2021年 | 25篇 |
2020年 | 36篇 |
2019年 | 41篇 |
2018年 | 11篇 |
2017年 | 24篇 |
2016年 | 38篇 |
2015年 | 68篇 |
2014年 | 161篇 |
2013年 | 198篇 |
2012年 | 205篇 |
2011年 | 158篇 |
2010年 | 56篇 |
2009年 | 47篇 |
2008年 | 30篇 |
2007年 | 37篇 |
2006年 | 39篇 |
2005年 | 18篇 |
2004年 | 23篇 |
2003年 | 16篇 |
2002年 | 12篇 |
2001年 | 8篇 |
2000年 | 12篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有1298条查询结果,搜索用时 15 毫秒
981.
Aleata Hubbard 《Computer Science Education》2018,28(2):117-135
This review synthesizes literature on computing pedagogical content knowledge (PCK). Shulman introduced PCK in the 1980s to describe the amalgam of knowledge teachers draw upon in their work and use of the construct is increasing in the computing education community. From a systematic search of the literature, I identified 19 articles drawn from 9 countries for review and summarize how computing PCK is conceptualized and investigated in the data set. Five conceptualizations of computing PCK were present: (a) two models of computing PCK components, (b) one model of PCK development and (c) two models focused on the metaphoric and problem-solving nature of computing. The most common research lines addressed were the nature and development of individual PCK. Mostly qualitative methods created by authors were employed. A focus on discipline-specific approaches for future computing PCK research is recommended. 相似文献
982.
云计算的出现和应用,促进了信息服务的进程,也为电子健康信息服务提供有力的技术支持,然而云计算在我国电子健康信息服务领域的应用与我国的现状和发展要求仍有差距,云计算在电子健康信息服务的应用前景应该成为我们关注的问题。通过对国内外文献的梳理,探讨云计算在电子健康服务领域应用的优势和挑战,并据此提出了解决对策。针对云计算在电子健康信息服务的应用挑战,从有效降低投入成本、建立隐私机制、引入第三方认证、完善相关法律以及采取容错技术5个方面提出建设意见,以期能为电子健康信息服务行业的发展提供借鉴。 相似文献
983.
Toni Downes 《Education and Information Technologies》1999,4(1):65-79
Since the 1980s there have been a number of studies that investigate the use of computers in homes. Many of these focused on the adults or adolescents in the family. Few studies have focused on children, particularly those between the ages of five and twelve. If children of these ages were included in a study they were usually situated within a study of the family and its dynamics, and often their experiences were viewed through the eyes of the adults in the family. The study described in this paper is unique in that the children's perceptions, beliefs and practices were the major focus and the children themselves were the informants. The study investigated children's computer experiences within their homes and their perceptions and beliefs about a range of issues associated with these experiences. The focus in this paper is on the range of computer activities in which children engaged. The major finding was that children's activities, whether game playing, other leisure-related activities or work-related activities, involved 'playful' interactions with the computer which led to exploratory approaches to learning about both the computer and the task itself. © 1999 IFIP, published by Kluwer Academic Publishers 相似文献
984.
基于可信计算平台提出了一种新的离线电子现金方案,该方案将电子现金、用户身份、平台身份三者有机绑定在一起,利用可信计算平台的认证技术和存储保护功能,极大地增强了电子现金的安全性,同时还具有支付起源非否认、电子现金有限流通期限等特点.该方案对于电子现金的备份,电子现金的盗用和丢失,都提供了良好的保护,并对所提出的电子现金协议进行了详细的安全性分析. 相似文献
985.
该文从会计电算化是企业实现管理现代化的必由之路谈起 ,认为要实现会计电算化 ,人才缺乏是瓶颈问题 ,这对高校《会计电算化》教学带来了机遇和挑战 ,文中对《会计电算化》课程的特点、教学中的问题和经验进行了分析和探讨。 相似文献
986.
云计算的出现,给图书馆带来了机遇和挑战,给知识服务带来了巨大的影响。通过对云计算与知识服务分析,明晰云计算对图书馆知识服务提供的技术支持,确立团队协作机制在知识服务过程中的重要作用以及为知识服务提供的智力支持。 相似文献
987.
傅勤 《苏州市职业大学学报》2009,20(3):87-89
阐述了《计算方法》课程的重要地位和课程特点,探讨了该课程改革的必要性、可行性及改革的一些设想,较为系统地研究了如何引入数值思想,并介绍了以加强应用性、实践性为目的的一些做法和取得的成效. 相似文献
988.
《Information processing & management》2023,60(1):103150
Nowadays, researchers are investing their time and devoting their efforts in developing and motivating the 6G vision and resources that are not available in 5G. Edge computing and autonomous vehicular driving applications are more enhanced under the 6G services that are provided to successfully operate tasks. The huge volume of data resulting from such applications can be a plus in the AI and Machine Learning (ML) world. Traditional ML models are used to train their models on centralized data sets. Lately, data privacy becomes a real aspect to take into consideration while collecting data. For that, Federated Learning (FL) plays nowadays a great role in addressing privacy and technology together by maintaining the ability to learn over decentralized data sets. The training is limited to the user devices only while sharing the locally computed parameter with the server that aggregates those updated weights to optimize a global model. This scenario is repeated multiple rounds for better results and convergence. Most of the literature proposed client selection methods to converge faster and increase accuracy. However, none of them has targeted the ability to deploy and select clients in real-time wherever and whenever needed. In fact, some mobile and vehicular devices are not available to serve as clients in the FL due to the highly dynamic environments and/or do not have the capabilities to accomplish this task. In this paper, we address the aforementioned limitations by introducing an on-demand client deployment in FL offering more volume and heterogeneity of data in the learning process. We make use of containerization technology such as Docker to build efficient environments using any type of client devices serving as volunteering devices, and Kubernetes utility called Kubeadm to monitor the devices. The performed experiments illustrate the relevance of the proposed approach and the efficiency of the deployment of clients whenever and wherever needed. 相似文献
989.
[目的/意义]结合信息生态理论和现代化治理理论,重构云计算环境下国家数字学术资源信息安全协同治理框架,以期对其信息安全进行有效治理.[方法/过程]在分析信息生态与国家数字学术资源信息安全协同治理关联关系的基础上,构建信息生态视角下国家数字学术资源信息安全协同治理框架,并分析其构成要素间的协同关系.同时,基于信息生态视角... 相似文献
990.
社会性人物搜索研究 总被引:1,自引:0,他引:1
本文分析了社会搜索和社会性人物搜索的相关研究,提出这类搜索产生的原因,给出了人物搜索和社会性人物搜索的定义、特点及一般流程,通过利用社会网络进行社会性人物搜索的实例说明信息分析在社会性搜索中的重要性,对近年的社会性人物搜索的热点事件分析,给出个体角色特征四元组{SD,A,IDD , ITV}来表示社会搜索过程的参与和传播,并提出角色将发生以下动作SearchInfo、SendInfo、ReceiveInfo、Infoupdate、Infofusion、DemandUpdate、AttitudeUpdate、IDDUpdate,对每个动作和四元组关系做了分析,基于上述研究,进一步给出社会搜索的过程框架和工具软件,并完成了第一阶段的软件开发,发布了ROST系列社会性人物搜索工具。 相似文献