全文获取类型
收费全文 | 2819篇 |
免费 | 52篇 |
国内免费 | 83篇 |
专业分类
教育 | 1648篇 |
科学研究 | 684篇 |
各国文化 | 3篇 |
体育 | 99篇 |
综合类 | 114篇 |
文化理论 | 3篇 |
信息传播 | 403篇 |
出版年
2024年 | 2篇 |
2023年 | 29篇 |
2022年 | 26篇 |
2021年 | 32篇 |
2020年 | 66篇 |
2019年 | 71篇 |
2018年 | 76篇 |
2017年 | 86篇 |
2016年 | 61篇 |
2015年 | 62篇 |
2014年 | 149篇 |
2013年 | 394篇 |
2012年 | 189篇 |
2011年 | 168篇 |
2010年 | 144篇 |
2009年 | 155篇 |
2008年 | 139篇 |
2007年 | 188篇 |
2006年 | 163篇 |
2005年 | 148篇 |
2004年 | 127篇 |
2003年 | 99篇 |
2002年 | 82篇 |
2001年 | 76篇 |
2000年 | 47篇 |
1999年 | 29篇 |
1998年 | 28篇 |
1997年 | 33篇 |
1996年 | 22篇 |
1995年 | 10篇 |
1994年 | 8篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 10篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1985年 | 1篇 |
排序方式: 共有2954条查询结果,搜索用时 15 毫秒
151.
企业在决策本地化信息系统转换为云模式的软件即服务时面临着技术市场发展、云化收益、决策者风险偏好等诸多不确定性。针对该决策,引入前景理论考虑了维持现状偏好、追求管理时尚等心理行为,依据交易成本理论和技术组织环境理论提取了决策指标,以未来不同的软件即服务市场成熟度作为前景状态,计算各备选信息系统云化迁移的综合前景值,形成不确定性条件下企业信息系统的云化决策方法。同时,应用该方法实例分析了一家企业,并与基于期望值的灰色随机多准则决策方法进行了比较,说明了该方法的可行性和合理性。 相似文献
152.
基于多目标优化的协同谈判决策支持研究 总被引:5,自引:0,他引:5
针对电子商务的协同性和注重良好客户关系的特点,提出了一种新的谈判机制——协同谈判。在基于约束的问题空间描述方法基础上,本文提出了协同谈判多目标优化决策模型和相应的求解方法,该方法不受限于约束和变量类型,可随时增加或删除约束条件,具有功态性和容易实现等特点,并能找到多目标优化的非劣解前沿,从而达到提高谈判有效性的目的。 相似文献
153.
This work is devoted to the study of symmetric control systems. It establishes a relation between internal symmetry and external one for a linear invariant control system having n real simple poles. The symmetric stabilization problem is studied using a symmetric feedback gain such that the output control stabilizes the closed-loop system. A necessary and sufficient condition is given to solve this stabilization problem for a symmetric control system (A,B,C) and a generalized symmetric control system (E,A,B,C). 相似文献
154.
对国内外电压稳定问题研究的现状进行了概述。特别介绍了对电压失稳机理的认识以及当前广泛采用的几种电压稳定性的分析方法,而且还介绍了电压稳定研究进一步发展的方向。 相似文献
155.
156.
程金城 《科学.经济.社会》2006,24(2):55-57,61
20世纪中国文学,形成了以肩负历史和民族责任、追求文学参与历史过程因而突出文学对国民群体的精神重建的文学价值系统,与以追求个体的生命价值和个性自由因而追求文学超越意义的文学价值系统。这两大文学价值系统与传统文学观和文化精神有着深层的关联。文章较系统地论述了其在各个时期的具体特征,特别指出一些作家重蹈传统“自我中心主义”覆辙的价值取向。 相似文献
157.
E. Burton Swanson 《The Information Society》2020,36(2):109-123
AbstractOver some seven decades, a rather mundane transition that in its thoroughness and consequences has gone largely unacknowledged, has taken place, namely the revolution in modern information systems (IS) that guide organizations in their actions. Today, it is fair to say that IS have come to rule the world. They do this literally, by the rules they embody, which dictate how much of everyday life, as it relates to individuals and organizations and the transactions they engage in, takes place around the globe. In essence, IS have become important social and economic infrastructure. Seeking an understanding of how this has come about, I review historical developments in IS, focusing in particular on accounting systems, enterprise systems, retail automation, and electronic commerce. I argue that it is transactions and their facilitation that lie at the heart of IS and its development as a field of practice. I reflect on why this has gone mostly overlooked as such. I consider where we have now arrived with transaction facilitation as infrastructure and its importance in the light of current issues. I suggest how future studies might contribute to our learning more about where we should want to be with our transaction facilitation infrastructure. 相似文献
158.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
159.
This paper is an attempt to present disclosive ethics as a framework for computer and information ethics – in line with the
suggestions by Brey, but also in quite a different manner. The potential of such an approach is demonstrated through a disclosive
analysis of facial recognition systems. The paper argues that the politics of information technology is a particularly powerful
politics since information technology is an opaque technology – i.e. relatively closed to scrutiny. It presents the design
of technology as a process of closure in which design and use decisions become black-boxed and progressively enclosed in increasingly
complex socio-technical networks. It further argues for a disclosive ethics that aims to disclose the nondisclosure of politics
by claiming a place for ethics in every actual operation of power – as manifested in actual design and use decisions and practices.
It also proposes that disclosive ethics would aim to trace and disclose the intentional and emerging enclosure of politics
from the very minute technical detail through to social practices and complex social-technical networks. The paper then proceeds
to do a disclosive analysis of facial recognition systems. This analysis discloses that seemingly trivial biases in recognition
rates of FRSs can emerge as very significant political acts when these systems become used in practice.
Paper prepared for the Technology and Ethics Workshop at Twente 相似文献
160.
从生态学视角出发,提出了高新区系统健康概念,并通过对其生态学特征的分析,建立了高新区健康评价的概念模型,阐述了高新区健康评价范畴及其评价体系。 相似文献