全文获取类型
收费全文 | 5921篇 |
免费 | 73篇 |
国内免费 | 173篇 |
专业分类
教育 | 2655篇 |
科学研究 | 1194篇 |
各国文化 | 143篇 |
体育 | 292篇 |
综合类 | 189篇 |
文化理论 | 12篇 |
信息传播 | 1682篇 |
出版年
2024年 | 1篇 |
2023年 | 66篇 |
2022年 | 81篇 |
2021年 | 150篇 |
2020年 | 229篇 |
2019年 | 210篇 |
2018年 | 197篇 |
2017年 | 187篇 |
2016年 | 157篇 |
2015年 | 151篇 |
2014年 | 360篇 |
2013年 | 723篇 |
2012年 | 455篇 |
2011年 | 460篇 |
2010年 | 320篇 |
2009年 | 355篇 |
2008年 | 383篇 |
2007年 | 358篇 |
2006年 | 302篇 |
2005年 | 244篇 |
2004年 | 181篇 |
2003年 | 150篇 |
2002年 | 146篇 |
2001年 | 111篇 |
2000年 | 72篇 |
1999年 | 22篇 |
1998年 | 14篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 11篇 |
1991年 | 7篇 |
1989年 | 4篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1957年 | 2篇 |
排序方式: 共有6167条查询结果,搜索用时 15 毫秒
171.
嵌入班级网络中的大学生在交往中形成不同的小群体,这些小群体间的学业成就是否具有显著性差异?研究者将社会网络分析方法中的整体网分析与元分析(Meta分析)相结合,在对大学生班级内小群体的学业成就差异进行多项独立研究的基础上,运用元分析技术将29项研究(N=1076)的结果予以综合分析,得到如下结论:(1)每个班级的大学生都在互动过程中形成了不同数量的小群体,且每个小群体中的学生数量不同;(2)大学生学业成就存在着“人以群分”现象,即同一班级的大学生在互动中产生的小群体在学业成就上存在显著性差异。因此,大学生应加强与高学业成就水平的小群体之间的互动以提高学业成就;而高校管理者也应采用科学的方法识别班级中的不同小群体,从而采取相应的学业成就提升策略。 相似文献
172.
Bruce Fuller Gretchen Caspary Sharon Lynn Kagan Christiane Gauthier Danny Shih-Cheng Huang Judith Carroll Jan McCarthy 《Early childhood research quarterly》2002,17(4):240
Various initiatives over the past 40 years have aimed to strengthen children’s early learning and social development. One policy theory—manifest in recent welfare reforms—postulates that requiring single mothers to work more outside the home will advance children’s well-being. We first examine whether young children’s social development is related to maternal employment among 405 women who entered welfare-to-work programs in 1998. For girls, age 24–42 months, we found that their mother’s recent employment duration was significantly associated with a lower incidence of aggressive behavior and inattentiveness, measured by two scales from the Child Behavior Checklist (CBCL 2/3). Yet these relationships with employment were weaker than more robust associations observed for proximal child-rearing practices, including the frequency of reading with the child, enforcing a regular bedtime, the propensity to spank the child, as well as levels of maternal depression. We then assess whether broader measures of the mother’s economic security help to predict these proximal determinants of development. We observed that food security and indicators of job quality consistently predicted the proximal factors. Structural equation models (SEM) provided additional evidence that these broader indicators of economic security, but not recent employment per se, operated through parenting practices and maternal depression to influence girls’ and boys’ social development. These results are consistent with recent findings from random-assignment experiments, showing that employment gains rarely affect child outcomes unless mothers’ income and broader economic security also improve. 相似文献
173.
对科技奖励作用于社会创新的机理加以研究,认为承认是科技奖励的本质特征,科技奖励以“动机+资源+环境”的模式推动社会创新进程和成果转化:通过承认机制激发科研人员的需求;通过激励机制强化科研人员的创新动机;通过导向机制引导优势资源向重点发展技术领域、产业方向聚集;通过竞争机制筛选优秀科研成果和人才,营造良好的社会创新环境。而在这种模式下取得的经济效益又用于加大科技奖励投入,循环往复地推动社会创新不断发展。以广东省科学技术奖为例研究其对社会创新的作用机制,认为其主要通过控制奖励数量、提高奖金额度、调整奖项结构、提升奖励质量等方式发挥科技奖励的承认、激励导向和竞争作用。在此基础上分析广东省科技奖励体系存在的问题,提出发挥民间力量设奖、规范奖后派生待遇、提高个人奖项权重、加大对青年科学家支持力度等对策建议。 相似文献
174.
Blog--图书馆发展的新契机 总被引:24,自引:1,他引:24
本文从介绍网络上一种的信息载体Blog入手.阐述Blog产生的背景和功能特点,分析其巨大的应用潜能和社会影响,探究Blog在图书馆的应用及其对图书馆发展的促进作用.为新技术在图书馆的应用开启新的思路。 相似文献
175.
论我国企业实施知识管理的问题与策略 总被引:5,自引:0,他引:5
本文在研究企业知识管理模式及其在国外实施的成功经验基础上,从企业组织结构重组、网络基础设施建设和社会经济文化环境建设等方面,分析了我国企业在实施知识管理中存在的主要问题,并探讨了解决问题的主要策略。 相似文献
176.
Linus Dahlander 《Research Policy》2006,35(8):1243-1259
Since Teece's seminal paper explaining who were the gainers from technological innovation, increased globalization and the information and communication technology revolution have brought new ways for firms to organize and appropriate from innovation. A new more open model of innovation suggests that firms can benefit from sources of innovation that stem from outside the firm. The central theme of this paper is how firms try to unlock communities as complementary assets. These communities exist outside firm boundaries beyond ownership or hierarchical control. Because of practices developed by communities to protect their work, firms need to assign individuals to work in these communities in order to gain access to developments and, to an extent, influence the direction of the community. Using network analysis we show that some software firms sponsor individuals to act strategically within a free and open source software (FOSS) community. Firm sponsored individuals interact with more individuals than interact with them, and also they seek to interact with central individuals in the community. However, we can see differences in how individuals interact, depending on whether their affiliation is with a dedicated FOSS firm or an incumbent in the software industry. Apparently, some firm managers believe they need ‘a man on the inside’ to be able to gain access to communities. 相似文献
177.
通过对高校科技查新优化变革的动力基础分析,从宏观、微观、产品等层面挖掘其发展的新动力,构建其优化变革发展的动力系统,并从管理制度化、机制灵活化、方法多元化、行业监督、市场运行、品牌化运作等方面提出保障措施,以期促进高校科技查新转型发展。 相似文献
178.
网络检索工具的发展与应用 总被引:2,自引:0,他引:2
阐述了网络检索工具的发展概况及各种网络检索工具的一般特点,以及如何有效利用这些网络检索工具获取网络信息。 相似文献
179.
化学工业搜索引擎ChemIndustry.com 总被引:1,自引:0,他引:1
本文简要介绍了ChemIndustry.com的概况,及其检索方法,以及其与Yahoo、Altaviata和Google的异同。 相似文献
180.
Richard A. Spinello 《Ethics and Information Technology》2002,4(1):23-30
The web creates manyopportunities for encroachment on intellectualproperty including trademarks. Our principaltask in this paper is an investigation into anunusual form of such encroachment: theimproper use of metatags. A metatag is a pieceof HTML code that provides summary informationabout a web page. If used in an appropriatemanner, these metatags can play a legitimaterole in helping consumers locate information. But the ``keyword'' metatag is particularlysusceptible to manipulation. These tags can beeasily abused by web site creators anxious tobait search engines and bring scores ofvisitors to their sites. The law aboutmetatags is far from settled and many legalscholars are uncomfortable with the conclusionthat the unauthorized use of a trademark in ametatag represents infringement. How should weassess this practice known as ``spamdexing'' froma normative perspective? Is it commercial fairplay or something more sinister? We make thecase here that there are salient moral problemswith spamdexing since it exploits thereputational goodwill of trademark owners andconfuses consumers. It violates basic moralduties and it flouts the golden rule principle. Hence unauthorized use of a competitor'strademark in a metatag is not morallyacceptable. 相似文献