首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   865篇
  免费   17篇
教育   658篇
科学研究   24篇
各国文化   10篇
体育   94篇
文化理论   5篇
信息传播   91篇
  2023年   6篇
  2022年   8篇
  2021年   8篇
  2020年   25篇
  2019年   36篇
  2018年   32篇
  2017年   49篇
  2016年   27篇
  2015年   18篇
  2014年   25篇
  2013年   204篇
  2012年   18篇
  2011年   28篇
  2010年   22篇
  2009年   15篇
  2008年   22篇
  2007年   26篇
  2006年   18篇
  2005年   11篇
  2004年   17篇
  2003年   20篇
  2002年   12篇
  2001年   12篇
  2000年   15篇
  1999年   14篇
  1998年   5篇
  1997年   10篇
  1996年   7篇
  1995年   11篇
  1994年   5篇
  1993年   6篇
  1991年   9篇
  1990年   7篇
  1989年   10篇
  1988年   8篇
  1987年   7篇
  1985年   11篇
  1984年   8篇
  1983年   5篇
  1981年   11篇
  1980年   6篇
  1979年   5篇
  1978年   6篇
  1977年   4篇
  1976年   6篇
  1975年   6篇
  1974年   4篇
  1973年   6篇
  1971年   3篇
  1970年   4篇
排序方式: 共有882条查询结果,搜索用时 15 毫秒
1.
Our argument in this paper is that the model of literary progression which Bakhtin (1981, 1986) expounds in his writing on the chronotope can generate insight into the processes through which pupils improve their writing. We suggest more generally that there are concepts and clues in Bakhtin's historical model of the development of the European novel and in his theory of dialogue which can be helpful in both the evaluation and teaching of classroom writing.  相似文献   
2.
3.
4.
Information access is central to library and information science, yet explorations of its conceptual nature have been limited. Given the importance of information access to the discipline, there is a need for research to create a better understanding of the concept and its many roles in all activities and behaviors related to information. Drawing on the theoretical work of Elfreda Chatman, this article proposes that the study of information access can be facilitated through the recognition and examination of the physical, intellectual, and social aspects of information access. These types of access are examined through three case studies in terms of different information behaviors and contexts, with a particular focus on the importance of social access. The article also discusses the future roles that considerations of social access can play in research and theory.  相似文献   
5.
6.
The National Institutes of Health (NIH) library instruction program provides training services to staff, clinicians, and researchers across NIH and several Department of Health and Human Services (HHS) operating divisions. The audience, training needs, and training topics are diverse and constantly changing. The NIH library has developed several new services and class topics to meet the needs of its NIH and HHS communities. Context, strategies, and future directions for the NIH library instruction program are described.  相似文献   
7.
Automatic detection of source code plagiarism is an important research field for both the commercial software industry and within the research community. Existing methods of plagiarism detection primarily involve exhaustive pairwise document comparison, which does not scale well for large software collections. To achieve scalability, we approach the problem from an information retrieval (IR) perspective. We retrieve a ranked list of candidate documents in response to a pseudo-query representation constructed from each source code document in the collection. The challenge in source code document retrieval is that the standard bag-of-words (BoW) representation model for such documents is likely to result in many false positives being retrieved, because of the use of identical programming language specific constructs and keywords. To address this problem, we make use of an abstract syntax tree (AST) representation of the source code documents. While the IR approach is efficient, it is essentially unsupervised in nature. To further improve its effectiveness, we apply a supervised classifier (pre-trained with features extracted from sample plagiarized source code pairs) on the top ranked retrieved documents. We report experiments on the SOCO-2014 dataset comprising 12K Java source files with almost 1M lines of code. Our experiments confirm that the AST based approach produces significantly better retrieval effectiveness than a standard BoW representation, i.e., the AST based approach is able to identify a higher number of plagiarized source code documents at top ranks in response to a query source code document. The supervised classifier, trained on features extracted from sample plagiarized source code pairs, is shown to effectively filter and thus further improve the ranked list of retrieved candidate plagiarized documents.  相似文献   
8.
9.
10.
The construction of a history curriculum for England and for Wales under the terms of the 1988 Education Reform Act occasioned more debate in the media than any other subject in the National Curriculum. The links between the content of a history syllabus and perceptions within both nations of the part this plays in moulding national spirit made this inevitable. The disparity of view between the two groups charged with devising the syllabus and the government, particularly the Prime Minister, heightened the tension. This article explores the way in which consequent political, professional and public discussion was covered in the whole range of national newspapers. It is argued that the failure of the London press to comprehend the situation in Wales reduced significantly its appreciation of the processes involved in the making of the history curriculum.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号