首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3540篇
  免费   32篇
  国内免费   65篇
教育   2475篇
科学研究   598篇
体育   76篇
综合类   171篇
文化理论   3篇
信息传播   314篇
  2023年   2篇
  2022年   17篇
  2021年   43篇
  2020年   64篇
  2019年   57篇
  2018年   27篇
  2017年   27篇
  2016年   25篇
  2015年   60篇
  2014年   202篇
  2013年   275篇
  2012年   288篇
  2011年   291篇
  2010年   201篇
  2009年   184篇
  2008年   194篇
  2007年   305篇
  2006年   282篇
  2005年   250篇
  2004年   223篇
  2003年   189篇
  2002年   151篇
  2001年   104篇
  2000年   78篇
  1999年   32篇
  1998年   13篇
  1997年   18篇
  1996年   13篇
  1995年   6篇
  1994年   2篇
  1993年   3篇
  1992年   5篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
排序方式: 共有3637条查询结果,搜索用时 15 毫秒
111.
Windows环境上机考试自动评分算法的研究   总被引:1,自引:0,他引:1  
针对Windows平台上机操作考试,阐述了通过面向对象、OLE自动化技术和VBA嵌入式编程实现计算机自动评分的策略,及各种常见操作类型的自动评分算法实例。  相似文献   
112.
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents.  相似文献   
113.
Since Teece's seminal paper explaining who were the gainers from technological innovation, increased globalization and the information and communication technology revolution have brought new ways for firms to organize and appropriate from innovation. A new more open model of innovation suggests that firms can benefit from sources of innovation that stem from outside the firm. The central theme of this paper is how firms try to unlock communities as complementary assets. These communities exist outside firm boundaries beyond ownership or hierarchical control. Because of practices developed by communities to protect their work, firms need to assign individuals to work in these communities in order to gain access to developments and, to an extent, influence the direction of the community. Using network analysis we show that some software firms sponsor individuals to act strategically within a free and open source software (FOSS) community. Firm sponsored individuals interact with more individuals than interact with them, and also they seek to interact with central individuals in the community. However, we can see differences in how individuals interact, depending on whether their affiliation is with a dedicated FOSS firm or an incumbent in the software industry. Apparently, some firm managers believe they need ‘a man on the inside’ to be able to gain access to communities.  相似文献   
114.
本文基于海量数据和网络打印速度之间的矛盾问题,通过几种报表实施方案的对比,提出了利用操纵Excel引擎方式解决网络打印海量数据报表问题的方法。以某煤矿企业考勤综合管理系统的考勤报表为应用背景,研究了基于B/S模式的海量数据报表的实现过程,讨论了客户端与服务器端的设置方式。应用证明该方法切实可行,可以有效地解决网络打印海量数据报表效率低的问题。  相似文献   
115.
许媛  李靖华 《科学学研究》2007,25(A01):114-119
以浙江软件产业为研究对象,介绍企业创新动力、创新能力和企业持续技术创新传导机制的现状,以及浙江软件产业发展和软件企业创新能力现状,在此基础上,建立浙江软件企业自主创新能力构建路径模型,从自主研发创新和引进创新两个角度提出传导路径,探寻浙江软件企业创新能力提升的方法,得出浙江软件企业自主创新应以消化吸收再创新为主的结论。  相似文献   
116.
软件产权法律保护"度"的经济学分析   总被引:1,自引:0,他引:1  
软件产权保护是知识产权保护研究中最炽热的领域之一,也是争论最多的领域之一,原因是软件产权保护在“创新”与“垄断”之间存在两难选择。本文首先分析了软件产权主要法律保护手段的成本与效益,对其成效做出扼要评价,在此基础上分析软件产权保护“度”的均衡,得出软件产权在强调复制权、专利权等知识产权傈护的同时,应限制好软件产权的保护性垄断。  相似文献   
117.
以长江某段设计水位和整治线宽度的确定和冲淤等值线图的绘制为例,介绍了MATLAB软件的特点及在航道整治工程中的应用。  相似文献   
118.
Neutralization theory and online software piracy: An empirical analysis   总被引:1,自引:0,他引:1  
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software piracy; other elements which appear more salient are suggested and discussed in conclusion.  相似文献   
119.
As institutions of Higher Education try to balance limited resources with the rising costs of technology, some institutions are turning to Open Source software for campus-wide applications such as course management systems and portals. The assumption is that Open Source will provide the flexibility to build pedagogically sound learning environments while increasing technology efficiencies. This paper outlines the current state of Open Source software deployment in US Higher Education based on a survey of 772 Chief Academic Officers and Chief Information Officers conducted in 2006. The results indicate that Carnegie classification is a critical differentiator of awareness, adoption, and perceptions of Open Source software applications, with perceived cost of ownership being the key driver of Open Source adoption. Moreover, the study shows that institutions have made little progress in the development of polices and procedures for Open Source regulatory compliance and security. The study serves as a baseline for future research into the conditions for successful use of Open Source for supporting integrated learning environments that deliver campus-wide efficiencies.
Shahron Williams van RooijEmail:

Shahron Williams van Rooij   is Assistant Professor of Instructional Technology at George Mason University with a focus on the university’s e-Learning Certificate Program. She holds a Ph.D. in Quantitative Methods in the Social Sciences from the City University of New York and has just completed a second doctorate in Instructional Technology and Software Information Systems at George Mason University. As a Certified Distance Education Professional (C.D.E.P.) credentialed by Texas A&M University, she is a frequent speaker on the development of Web-based education and has published in a variety of journals such as the WebNet Journal, the Journal of Interactive Learning Research, the Journal of Modern Business, the Marketing Research Review and the Journal of Research on Technology in Education. Prior to joining GMU, she was the Director of Marketing at Datatel, Inc., in Fairfax, VA, where she facilitated the engineering of new e-learning technology solutions.  相似文献   
120.
介绍了模拟量输入系统的基本过程,完成了模拟量转换成数字量输入系统的硬件接口设计和程序设计.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号