首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4471篇
  免费   131篇
  国内免费   64篇
教育   2686篇
科学研究   1155篇
各国文化   1篇
体育   160篇
综合类   236篇
文化理论   14篇
信息传播   414篇
  2024年   2篇
  2023年   13篇
  2022年   38篇
  2021年   53篇
  2020年   63篇
  2019年   60篇
  2018年   50篇
  2017年   38篇
  2016年   84篇
  2015年   87篇
  2014年   217篇
  2013年   182篇
  2012年   303篇
  2011年   311篇
  2010年   287篇
  2009年   246篇
  2008年   315篇
  2007年   403篇
  2006年   354篇
  2005年   340篇
  2004年   325篇
  2003年   261篇
  2002年   234篇
  2001年   158篇
  2000年   95篇
  1999年   29篇
  1998年   32篇
  1997年   24篇
  1996年   20篇
  1995年   16篇
  1994年   7篇
  1993年   5篇
  1992年   8篇
  1991年   1篇
  1990年   1篇
  1989年   3篇
  1957年   1篇
排序方式: 共有4666条查询结果,搜索用时 15 毫秒
121.
迟爱敏 《预测》2001,20(3):55-59
本文在对市场经济环境下企业伦理的产生及其含义进行阐释的基础上,着重探讨了社会主义市场经济应该确立的企业伦理行为规范,并预见性地指出:产权界定、激励机制、思想教育、民主管理等措施,是实现企业伦理规范要求的基础和条件,这是当前对企业人才本管理讨论的热点,也是推动社会得以全面、和谐、有序发展所必须解决的重要问题。  相似文献   
122.
Guggulsterone, a mixture of cis (E) and trans (Z) isomers (7∶3 w/w) was synthesized from 16-DPA. The isomers were separated by column chromatography and evaluated for cardioprotective and antioxidant activities. Myocardial necrosis induced by isoproterenol in rats caused marked increase in serum creatine phosphokinase and glutamate pyruvate transaminase. Simultaneously in ischemic heart, phospholipase, xanthine oxidase and lipid peroxides were enhanced following depletion of glycogen, phospholipids and cholesterol. Treatment with guggulsterone and its both isomers at the dose of 50 mg/kg po., significantly protected cardiac damage as assessed by the reversal of blood and heart biochemical parameters in ischemic rats. The cardioprotective activity of guggulsterone and of both the isomers were compared with that of gemfibrozil at the same doses. Guggulsterone and both the isomers at tested concentrations (5–20mM) inhibited oxidative degradation of lipids in human low-density lipoprotein and rat liver microsomes induced by metal ionsin vitro. The drug counteracted against the generation of superoxide anions (O2) and hydroxyl radicals (OH) in non-enzymic test systems. It is suggested that cardioprotective and antioxidant activities of synthetic guggulsterone and guggulsterone obtained from gum resinCommiphora mukul that contains isomers E & Z in the ratio of 46∶54w/w are the same.  相似文献   
123.
对数字作品著作权保护的思考   总被引:8,自引:0,他引:8  
The emergence of digital works has brought new problems to the existing intellectual property system.As the traditional copyright law system lags behind the rapid development of network economy,the copyright systems in many countries are being improved,so are the relevant international pacts.This paper mainly discusses the digitalization right of traditional works,the copyright and copyright ownership of digital works,the copyright processing in the development of digital works and the countermeasures for the copyright protection in the network environment.  相似文献   
124.
为应对经济发展需求,美国不断在全球推行高标准、宽范围、强制约的知识产权保护制度,引发了现代知识产权国际保护规则的新一轮变迁。BIT作为知识产权国际保护的一种重要形式,在投资争端解决机制、技术化本地措施、政府竞争中立等方面都对知识产权予以强保护。通过对2012年BIT范本中知识产权保护新议题的研究,探讨知识产权保护规则的未来趋势,为我国在调整争议解决机制、待遇适用标准和政府管制范围等方面提供建议,以应对美国知识产权保护新规则带来的挑战。  相似文献   
125.
The web creates manyopportunities for encroachment on intellectualproperty including trademarks. Our principaltask in this paper is an investigation into anunusual form of such encroachment: theimproper use of metatags. A metatag is a pieceof HTML code that provides summary informationabout a web page. If used in an appropriatemanner, these metatags can play a legitimaterole in helping consumers locate information. But the ``keyword'' metatag is particularlysusceptible to manipulation. These tags can beeasily abused by web site creators anxious tobait search engines and bring scores ofvisitors to their sites. The law aboutmetatags is far from settled and many legalscholars are uncomfortable with the conclusionthat the unauthorized use of a trademark in ametatag represents infringement. How should weassess this practice known as ``spamdexing'' froma normative perspective? Is it commercial fairplay or something more sinister? We make thecase here that there are salient moral problemswith spamdexing since it exploits thereputational goodwill of trademark owners andconfuses consumers. It violates basic moralduties and it flouts the golden rule principle. Hence unauthorized use of a competitor'strademark in a metatag is not morallyacceptable.  相似文献   
126.
软件产权法律保护"度"的经济学分析   总被引:1,自引:0,他引:1  
软件产权保护是知识产权保护研究中最炽热的领域之一,也是争论最多的领域之一,原因是软件产权保护在“创新”与“垄断”之间存在两难选择。本文首先分析了软件产权主要法律保护手段的成本与效益,对其成效做出扼要评价,在此基础上分析软件产权保护“度”的均衡,得出软件产权在强调复制权、专利权等知识产权傈护的同时,应限制好软件产权的保护性垄断。  相似文献   
127.
图书馆在电子文献信息开发利用中的版权保护对策探讨   总被引:2,自引:0,他引:2  
祝亚明  秦珂 《情报科学》2002,20(7):710-712,716
文章对图书馆在电子文献信息开发利用中遇到的主要版权问题作了阐述,从完善版权法,图书馆工作者更新观念,提高图书馆保护版权的自律性,建立图书馆知识产权联盟,加强电子版权管理机制建设等五个方面提出了对策和建议。  相似文献   
128.
论电子商务的知识产权保护及对策   总被引:2,自引:0,他引:2  
胡翠华 《情报科学》2001,19(5):540-544
电子商务是因特网发展到高级阶段的产物,是世界经济新的增长点,但同时也存在一系列法律问题,本文拟从知识产权的角度分析电子商务所涉及到的法律问题,并就我国实际情况提出了5条建议,期盼我国早日制定一部既与国际电子商务相互衔接又能反映中国特色的中国电子商务知识产权法规。  相似文献   
129.
Neutralization theory and online software piracy: An empirical analysis   总被引:1,自引:0,他引:1  
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software piracy; other elements which appear more salient are suggested and discussed in conclusion.  相似文献   
130.
Paul B. de Laat   《Research Policy》2005,34(10):1511-1532
Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued that copyright is put to novel use here: claiming their rights, authors write ‘open source licenses’ that allow public usage of the code, while at the same time regulating the inclusion of users. A ‘regulated commons’ is created. The analysis focuses successively on the most important open source licenses to emerge, the problem of possible incompatibility between them (especially as far as the dominant General Public License is concerned), and the fragmentation into several user communities that may result.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号