首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2118篇
  免费   42篇
  国内免费   193篇
教育   865篇
科学研究   827篇
各国文化   3篇
体育   42篇
综合类   39篇
文化理论   9篇
信息传播   568篇
  2024年   1篇
  2023年   22篇
  2022年   51篇
  2021年   88篇
  2020年   107篇
  2019年   66篇
  2018年   66篇
  2017年   68篇
  2016年   43篇
  2015年   79篇
  2014年   158篇
  2013年   150篇
  2012年   125篇
  2011年   150篇
  2010年   117篇
  2009年   170篇
  2008年   138篇
  2007年   156篇
  2006年   113篇
  2005年   130篇
  2004年   114篇
  2003年   81篇
  2002年   60篇
  2001年   35篇
  2000年   20篇
  1999年   14篇
  1998年   7篇
  1997年   5篇
  1996年   4篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
排序方式: 共有2353条查询结果,搜索用时 15 毫秒
991.
本文介绍了一种对网络搜索引擎的搜索结果进行数据抓取来构建试题资源库的方法。通过这些方法使得构建题库的效率得到提高,成本得以降低,基于XML的试题存储格式也使得题库具有很强的兼容性。  相似文献   
992.
黄勤 《科技广场》2012,(8):70-72
ICMP协议是一种重要的网络层协议。本文通过对ICMP协议的基本概念、主要功能、数据包结构的解析,使程序开发者掌握网络环境下主机扫描程序的设计方法。  相似文献   
993.
网络地址转换(NAT)可以实现透明代理、端口重定向和负载平衡等功能,iptables具有NAT功能,本文叙述了NAT的工作原理,然后介绍了如何利用iptables的nat功能实现数据转发功能。  相似文献   
994.
Master data management (MDM) is a topic of increasing prominence both in the scientific and in the practitioners’ information systems (IS) community. As a prerequisite for meeting strategic business requirements, such as compliance with regulations, business integration, or integrated customer management, MDM comprises numerous activities. One of the central activities is designing and maintaining the master data architecture. Interestingly, though, the scientific community has remained almost silent with regard to the question as to how companies should proceed when designing the master data architecture. In order to shed light on this unexplored topic, the paper at hand presents the findings of a case study at Bosch Group. The case study shows that designing the master data architecture is a multidimensional task which requires balancing the interests of various organizational stakeholders, managing an array of technical opportunities, and meeting requirements of numerous master data classes. Also, the case study suggests that taking advantage of architectural design patterns may be an appropriate way to adequately address the complexity of the task.  相似文献   
995.
As the Internet has grown in popularity, the opportunity it provides for conducting research has also become too large for researchers to ignore. Thus many have flocked to put surveys, experiments, and other data collection measures online in an attempt to gather empirical evidence in a variety of fields. While some choose a commercial provider to host surveys or experiments, others require the additional flexibility that comes with creating and maintaining a custom server. Herein lies a crucial problem: Most researchers lack the skills necessary to design, implement, and manage a server end-to-end. To overcome this limitation, they often hire programmers and administrators, who while usually competent, are not ultimately accountable to granting agencies funding research or Institutional Review Boards overseeing the research. This puts the researcher in a position of accountability in data security, confidentiality, and privacy concerns. The goal of the present paper is to outline a typical server setup, and highlight issues pertaining to data security in language accessible to researcher. This paper also presents data collected and analyzed from an anonymous distributed survey asking researchers questions assessing their management of research data. Our findings from the responses confirmed the legitimacy of our concerns by demonstrating the evident need for stricter security measures in research settings. By reading this paper, we hope that researchers will be cognizant of the optimal security practices which can be equipped to avoid the extreme consequences of data security breaches and gain a deeper understanding of the software they use to collect research data.  相似文献   
996.
This paper proposes an efficient and effective solution to the problem of choosing the queries to suggest to web search engine users in order to help them in rapidly satisfying their information needs. By exploiting a weak function for assessing the similarity between the current query and the knowledge base built from historical users’ sessions, we re-conduct the suggestion generation phase to the processing of a full-text query over an inverted index. The resulting query recommendation technique is very efficient and scalable, and is less affected by the data-sparsity problem than most state-of-the-art proposals. Thus, it is particularly effective in generating suggestions for rare queries occurring in the long tail of the query popularity distribution. The quality of suggestions generated is assessed by evaluating the effectiveness in forecasting the users’ behavior recorded in historical query logs, and on the basis of the results of a reproducible user study conducted on publicly-available, human-assessed data. The experimental evaluation conducted shows that our proposal remarkably outperforms two other state-of-the-art solutions, and that it can generate useful suggestions even for rare and never seen queries.  相似文献   
997.
《普罗米修斯》2012,30(2):143-158

Using data from two surveys of science and technology academics in major Australian research universities, an assessment is made of researcher involvement in industry-research partnerships, the outputs and personal benefits that result, and the occurrence of delaying publications and withholding data and materials from colleagues. An estimated 40% of academics currently have industry research funding, with many also having other sources of funding. Some 60% of respondents with industry funding have attracted individually, or within a research group, funding of more than $250,000 over the past three years. About 35% of principal investigators with industry funding have total annual research budgets of over $101,000. While about 20% of academics have produced research results of commercial value, most of these have been less successful in increasing their personal incomes through research commercialisation and consulting, and equity in companies. Almost 40% with industry funding report having conducted research where the results are the property of a sponsor and cannot be published for a period without consent. Almost 20% of academics in 1997 and just over 20% in 2000 admitted having delayed publications for more than six months. However, safeguarding the researcher's self-interest appears to be as common a motive for delaying publication or failing to share research results or materials with scientific colleagues as protecting the property of a sponsor.  相似文献   
998.
基于web环境下开放与协作的理念,提出了图书馆应用多源数据开展集成服务的思路,并以清华大学新版期刊导航为例着重介绍了多源数据的选择、抽取、加工以及集成应用的具体方案。  相似文献   
999.
A fundamental principle of public policymaking should be that public policy must be made with publicly available data. This article develops this position and applies it to an assessment of the current state of communications policymaking, a policy area in which controversies surrounding the transparency of policy research and the accessibility of policy-relevant data have been both common and extremely contentious in recent years. This article provides a detailed assessment of the challenges confronting greater transparency and accessibility of communications policy-relevant data, as well as a detailed set of proposals for improving the current situation, in an effort to build towards an environment in which public policy is made with publicly available data.  相似文献   
1000.
在对目前异构数据集成研究成果进行比较研究的基础上,引入语义处理与控制技术,对国防专利情报系统异构数据集成语义控制以及专利系统数据模式转换与结构冲突消解方法进行研究,提出消除专利数据命名冲突和实现专利数据语义映射的机制,实现国防专利情报系统之间的信息交互和共享.国防专利情报系统对其他特殊类型的图书馆专利文献系统具有一定的借鉴意义.参考文献12.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号