首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3013篇
  免费   28篇
  国内免费   62篇
教育   2114篇
科学研究   484篇
体育   68篇
综合类   150篇
文化理论   2篇
信息传播   285篇
  2023年   1篇
  2022年   15篇
  2021年   40篇
  2020年   60篇
  2019年   54篇
  2018年   26篇
  2017年   26篇
  2016年   22篇
  2015年   56篇
  2014年   185篇
  2013年   262篇
  2012年   273篇
  2011年   242篇
  2010年   141篇
  2009年   127篇
  2008年   150篇
  2007年   249篇
  2006年   220篇
  2005年   220篇
  2004年   187篇
  2003年   167篇
  2002年   119篇
  2001年   92篇
  2000年   72篇
  1999年   31篇
  1998年   13篇
  1997年   18篇
  1996年   13篇
  1995年   6篇
  1994年   2篇
  1993年   3篇
  1992年   5篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
排序方式: 共有3103条查询结果,搜索用时 203 毫秒
91.
Traditional approaches to computer ethics regard computers as tools, andfocus, therefore, on the ethics of their use. Alternatively, computer ethicsmight instead be understood as a study of the ethics of computationalagents, exploring, for example, the different characteristics and behaviorsthat might benefit such an agent in accomplishing its goals. In this paper,I identify a list of characteristics of computational agents that facilitatetheir pursuit of their end, and claim that these characteristics can beunderstood as virtues within a framework of virtue ethics. This frameworkincludes four broad categories – agentive, social, environmental, and moral– each of which can be understood as a spectrum of virtues rangingbetween two extreme subcategories. Although the use of a virtue frameworkis metaphorical rather than literal, I argue that by providing a frameworkfor identifying and critiquing assumptions about what a `good' computer is,a study of android arete provides focus and direction to the developmentof future computational agents.  相似文献   
92.
Since Teece's seminal paper explaining who were the gainers from technological innovation, increased globalization and the information and communication technology revolution have brought new ways for firms to organize and appropriate from innovation. A new more open model of innovation suggests that firms can benefit from sources of innovation that stem from outside the firm. The central theme of this paper is how firms try to unlock communities as complementary assets. These communities exist outside firm boundaries beyond ownership or hierarchical control. Because of practices developed by communities to protect their work, firms need to assign individuals to work in these communities in order to gain access to developments and, to an extent, influence the direction of the community. Using network analysis we show that some software firms sponsor individuals to act strategically within a free and open source software (FOSS) community. Firm sponsored individuals interact with more individuals than interact with them, and also they seek to interact with central individuals in the community. However, we can see differences in how individuals interact, depending on whether their affiliation is with a dedicated FOSS firm or an incumbent in the software industry. Apparently, some firm managers believe they need ‘a man on the inside’ to be able to gain access to communities.  相似文献   
93.
许媛  李靖华 《科学学研究》2007,25(A01):114-119
以浙江软件产业为研究对象,介绍企业创新动力、创新能力和企业持续技术创新传导机制的现状,以及浙江软件产业发展和软件企业创新能力现状,在此基础上,建立浙江软件企业自主创新能力构建路径模型,从自主研发创新和引进创新两个角度提出传导路径,探寻浙江软件企业创新能力提升的方法,得出浙江软件企业自主创新应以消化吸收再创新为主的结论。  相似文献   
94.
软件产权法律保护"度"的经济学分析   总被引:1,自引:0,他引:1  
软件产权保护是知识产权保护研究中最炽热的领域之一,也是争论最多的领域之一,原因是软件产权保护在“创新”与“垄断”之间存在两难选择。本文首先分析了软件产权主要法律保护手段的成本与效益,对其成效做出扼要评价,在此基础上分析软件产权保护“度”的均衡,得出软件产权在强调复制权、专利权等知识产权傈护的同时,应限制好软件产权的保护性垄断。  相似文献   
95.
以长江某段设计水位和整治线宽度的确定和冲淤等值线图的绘制为例,介绍了MATLAB软件的特点及在航道整治工程中的应用。  相似文献   
96.
Neutralization theory and online software piracy: An empirical analysis   总被引:1,自引:0,他引:1  
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software piracy; other elements which appear more salient are suggested and discussed in conclusion.  相似文献   
97.
健全修复人员的绩效评价指标体系和评价制度是当前档案与古籍文献保护人才培养的重要工作之一。依据职业标准《文献修复师》的基本原则,从基本要求、相关知识和实践技能三个层面构建了档案与古籍文献修复人员职业素养评价指标体系,并通过Yaahp软件采用模糊层次分析法建立指标权重集,对国家古籍保护中心2007年至2015年古籍修复技术与保护相关培训班的课程内容进行实证分析和模糊综合评价,以期为档案和古籍文献保护评价体系的构建提供思考。  相似文献   
98.
As institutions of Higher Education try to balance limited resources with the rising costs of technology, some institutions are turning to Open Source software for campus-wide applications such as course management systems and portals. The assumption is that Open Source will provide the flexibility to build pedagogically sound learning environments while increasing technology efficiencies. This paper outlines the current state of Open Source software deployment in US Higher Education based on a survey of 772 Chief Academic Officers and Chief Information Officers conducted in 2006. The results indicate that Carnegie classification is a critical differentiator of awareness, adoption, and perceptions of Open Source software applications, with perceived cost of ownership being the key driver of Open Source adoption. Moreover, the study shows that institutions have made little progress in the development of polices and procedures for Open Source regulatory compliance and security. The study serves as a baseline for future research into the conditions for successful use of Open Source for supporting integrated learning environments that deliver campus-wide efficiencies.
Shahron Williams van RooijEmail:

Shahron Williams van Rooij   is Assistant Professor of Instructional Technology at George Mason University with a focus on the university’s e-Learning Certificate Program. She holds a Ph.D. in Quantitative Methods in the Social Sciences from the City University of New York and has just completed a second doctorate in Instructional Technology and Software Information Systems at George Mason University. As a Certified Distance Education Professional (C.D.E.P.) credentialed by Texas A&M University, she is a frequent speaker on the development of Web-based education and has published in a variety of journals such as the WebNet Journal, the Journal of Interactive Learning Research, the Journal of Modern Business, the Marketing Research Review and the Journal of Research on Technology in Education. Prior to joining GMU, she was the Director of Marketing at Datatel, Inc., in Fairfax, VA, where she facilitated the engineering of new e-learning technology solutions.  相似文献   
99.
介绍了模拟量输入系统的基本过程,完成了模拟量转换成数字量输入系统的硬件接口设计和程序设计.  相似文献   
100.
基于对2011年增设的软件工程一级学科和《高等学校软件工程专业规范》的深入解读,结合SWEBOK、CCSE2004以及2011全国软件工程年会的最新成果,根据贵州省、黔南州和黔南民族师范学院的实际情况,围绕软件工程技术、软件服务工程两个方向进行理论课程和实践课程体系的构建与实现,实践证明该方案是切实可行并具有一定特色的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号