全文获取类型
收费全文 | 3540篇 |
免费 | 32篇 |
国内免费 | 65篇 |
专业分类
教育 | 2475篇 |
科学研究 | 598篇 |
体育 | 76篇 |
综合类 | 171篇 |
文化理论 | 3篇 |
信息传播 | 314篇 |
出版年
2023年 | 2篇 |
2022年 | 17篇 |
2021年 | 43篇 |
2020年 | 64篇 |
2019年 | 57篇 |
2018年 | 27篇 |
2017年 | 27篇 |
2016年 | 25篇 |
2015年 | 60篇 |
2014年 | 202篇 |
2013年 | 275篇 |
2012年 | 288篇 |
2011年 | 291篇 |
2010年 | 201篇 |
2009年 | 184篇 |
2008年 | 194篇 |
2007年 | 305篇 |
2006年 | 282篇 |
2005年 | 250篇 |
2004年 | 223篇 |
2003年 | 189篇 |
2002年 | 151篇 |
2001年 | 104篇 |
2000年 | 78篇 |
1999年 | 32篇 |
1998年 | 13篇 |
1997年 | 18篇 |
1996年 | 13篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
排序方式: 共有3637条查询结果,搜索用时 15 毫秒
111.
Windows环境上机考试自动评分算法的研究 总被引:1,自引:0,他引:1
针对Windows平台上机操作考试,阐述了通过面向对象、OLE自动化技术和VBA嵌入式编程实现计算机自动评分的策略,及各种常见操作类型的自动评分算法实例。 相似文献
112.
Kari Gwen Coleman 《Ethics and Information Technology》2001,3(4):247-265
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents. 相似文献
113.
Linus Dahlander 《Research Policy》2006,35(8):1243-1259
Since Teece's seminal paper explaining who were the gainers from technological innovation, increased globalization and the information and communication technology revolution have brought new ways for firms to organize and appropriate from innovation. A new more open model of innovation suggests that firms can benefit from sources of innovation that stem from outside the firm. The central theme of this paper is how firms try to unlock communities as complementary assets. These communities exist outside firm boundaries beyond ownership or hierarchical control. Because of practices developed by communities to protect their work, firms need to assign individuals to work in these communities in order to gain access to developments and, to an extent, influence the direction of the community. Using network analysis we show that some software firms sponsor individuals to act strategically within a free and open source software (FOSS) community. Firm sponsored individuals interact with more individuals than interact with them, and also they seek to interact with central individuals in the community. However, we can see differences in how individuals interact, depending on whether their affiliation is with a dedicated FOSS firm or an incumbent in the software industry. Apparently, some firm managers believe they need ‘a man on the inside’ to be able to gain access to communities. 相似文献
114.
115.
以浙江软件产业为研究对象,介绍企业创新动力、创新能力和企业持续技术创新传导机制的现状,以及浙江软件产业发展和软件企业创新能力现状,在此基础上,建立浙江软件企业自主创新能力构建路径模型,从自主研发创新和引进创新两个角度提出传导路径,探寻浙江软件企业创新能力提升的方法,得出浙江软件企业自主创新应以消化吸收再创新为主的结论。 相似文献
116.
软件产权法律保护"度"的经济学分析 总被引:1,自引:0,他引:1
软件产权保护是知识产权保护研究中最炽热的领域之一,也是争论最多的领域之一,原因是软件产权保护在“创新”与“垄断”之间存在两难选择。本文首先分析了软件产权主要法律保护手段的成本与效益,对其成效做出扼要评价,在此基础上分析软件产权保护“度”的均衡,得出软件产权在强调复制权、专利权等知识产权傈护的同时,应限制好软件产权的保护性垄断。 相似文献
117.
以长江某段设计水位和整治线宽度的确定和冲淤等值线图的绘制为例,介绍了MATLAB软件的特点及在航道整治工程中的应用。 相似文献
118.
Sameer Hinduja 《Ethics and Information Technology》2007,9(3):187-204
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior
on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical
framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining
the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students
in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software
piracy; other elements which appear more salient are suggested and discussed in conclusion. 相似文献
119.
Shahron Williams van Rooij 《Education and Information Technologies》2007,12(4):191-209
As institutions of Higher Education try to balance limited resources with the rising costs of technology, some institutions
are turning to Open Source software for campus-wide applications such as course management systems and portals. The assumption
is that Open Source will provide the flexibility to build pedagogically sound learning environments while increasing technology
efficiencies. This paper outlines the current state of Open Source software deployment in US Higher Education based on a survey
of 772 Chief Academic Officers and Chief Information Officers conducted in 2006. The results indicate that Carnegie classification
is a critical differentiator of awareness, adoption, and perceptions of Open Source software applications, with perceived
cost of ownership being the key driver of Open Source adoption. Moreover, the study shows that institutions have made little
progress in the development of polices and procedures for Open Source regulatory compliance and security. The study serves
as a baseline for future research into the conditions for successful use of Open Source for supporting integrated learning
environments that deliver campus-wide efficiencies.
Shahron Williams van Rooij is Assistant Professor of Instructional Technology at George Mason University with a focus on the university’s e-Learning Certificate Program. She holds a Ph.D. in Quantitative Methods in the Social Sciences from the City University of New York and has just completed a second doctorate in Instructional Technology and Software Information Systems at George Mason University. As a Certified Distance Education Professional (C.D.E.P.) credentialed by Texas A&M University, she is a frequent speaker on the development of Web-based education and has published in a variety of journals such as the WebNet Journal, the Journal of Interactive Learning Research, the Journal of Modern Business, the Marketing Research Review and the Journal of Research on Technology in Education. Prior to joining GMU, she was the Director of Marketing at Datatel, Inc., in Fairfax, VA, where she facilitated the engineering of new e-learning technology solutions. 相似文献
Shahron Williams van RooijEmail: |
Shahron Williams van Rooij is Assistant Professor of Instructional Technology at George Mason University with a focus on the university’s e-Learning Certificate Program. She holds a Ph.D. in Quantitative Methods in the Social Sciences from the City University of New York and has just completed a second doctorate in Instructional Technology and Software Information Systems at George Mason University. As a Certified Distance Education Professional (C.D.E.P.) credentialed by Texas A&M University, she is a frequent speaker on the development of Web-based education and has published in a variety of journals such as the WebNet Journal, the Journal of Interactive Learning Research, the Journal of Modern Business, the Marketing Research Review and the Journal of Research on Technology in Education. Prior to joining GMU, she was the Director of Marketing at Datatel, Inc., in Fairfax, VA, where she facilitated the engineering of new e-learning technology solutions. 相似文献
120.