首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2819篇
  免费   52篇
  国内免费   83篇
教育   1648篇
科学研究   684篇
各国文化   3篇
体育   99篇
综合类   114篇
文化理论   3篇
信息传播   403篇
  2024年   2篇
  2023年   29篇
  2022年   26篇
  2021年   32篇
  2020年   66篇
  2019年   71篇
  2018年   76篇
  2017年   86篇
  2016年   61篇
  2015年   62篇
  2014年   149篇
  2013年   394篇
  2012年   189篇
  2011年   168篇
  2010年   144篇
  2009年   155篇
  2008年   139篇
  2007年   188篇
  2006年   163篇
  2005年   148篇
  2004年   127篇
  2003年   99篇
  2002年   82篇
  2001年   76篇
  2000年   47篇
  1999年   29篇
  1998年   28篇
  1997年   33篇
  1996年   22篇
  1995年   10篇
  1994年   8篇
  1993年   12篇
  1992年   7篇
  1991年   6篇
  1990年   10篇
  1989年   3篇
  1988年   6篇
  1985年   1篇
排序方式: 共有2954条查询结果,搜索用时 15 毫秒
151.
企业在决策本地化信息系统转换为云模式的软件即服务时面临着技术市场发展、云化收益、决策者风险偏好等诸多不确定性。针对该决策,引入前景理论考虑了维持现状偏好、追求管理时尚等心理行为,依据交易成本理论和技术组织环境理论提取了决策指标,以未来不同的软件即服务市场成熟度作为前景状态,计算各备选信息系统云化迁移的综合前景值,形成不确定性条件下企业信息系统的云化决策方法。同时,应用该方法实例分析了一家企业,并与基于期望值的灰色随机多准则决策方法进行了比较,说明了该方法的可行性和合理性。  相似文献   
152.
基于多目标优化的协同谈判决策支持研究   总被引:5,自引:0,他引:5  
曹荣增  李一军 《预测》2003,22(3):31-33,20
针对电子商务的协同性和注重良好客户关系的特点,提出了一种新的谈判机制——协同谈判。在基于约束的问题空间描述方法基础上,本文提出了协同谈判多目标优化决策模型和相应的求解方法,该方法不受限于约束和变量类型,可随时增加或删除约束条件,具有功态性和容易实现等特点,并能找到多目标优化的非劣解前沿,从而达到提高谈判有效性的目的。  相似文献   
153.
This work is devoted to the study of symmetric control systems. It establishes a relation between internal symmetry and external one for a linear invariant control system having n real simple poles. The symmetric stabilization problem is studied using a symmetric feedback gain such that the output control stabilizes the closed-loop system. A necessary and sufficient condition is given to solve this stabilization problem for a symmetric control system (A,B,C) and a generalized symmetric control system (E,A,B,C).  相似文献   
154.
对国内外电压稳定问题研究的现状进行了概述。特别介绍了对电压失稳机理的认识以及当前广泛采用的几种电压稳定性的分析方法,而且还介绍了电压稳定研究进一步发展的方向。  相似文献   
155.
156.
20世纪中国文学,形成了以肩负历史和民族责任、追求文学参与历史过程因而突出文学对国民群体的精神重建的文学价值系统,与以追求个体的生命价值和个性自由因而追求文学超越意义的文学价值系统。这两大文学价值系统与传统文学观和文化精神有着深层的关联。文章较系统地论述了其在各个时期的具体特征,特别指出一些作家重蹈传统“自我中心主义”覆辙的价值取向。  相似文献   
157.
Abstract

Over some seven decades, a rather mundane transition that in its thoroughness and consequences has gone largely unacknowledged, has taken place, namely the revolution in modern information systems (IS) that guide organizations in their actions. Today, it is fair to say that IS have come to rule the world. They do this literally, by the rules they embody, which dictate how much of everyday life, as it relates to individuals and organizations and the transactions they engage in, takes place around the globe. In essence, IS have become important social and economic infrastructure. Seeking an understanding of how this has come about, I review historical developments in IS, focusing in particular on accounting systems, enterprise systems, retail automation, and electronic commerce. I argue that it is transactions and their facilitation that lie at the heart of IS and its development as a field of practice. I reflect on why this has gone mostly overlooked as such. I consider where we have now arrived with transaction facilitation as infrastructure and its importance in the light of current issues. I suggest how future studies might contribute to our learning more about where we should want to be with our transaction facilitation infrastructure.  相似文献   
158.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
159.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices. It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition rates of FRSs can emerge as very significant political acts when these systems become used in practice. Paper prepared for the Technology and Ethics Workshop at Twente  相似文献   
160.
从生态学视角出发,提出了高新区系统健康概念,并通过对其生态学特征的分析,建立了高新区健康评价的概念模型,阐述了高新区健康评价范畴及其评价体系。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号