首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   280篇
  免费   3篇
教育   213篇
科学研究   24篇
各国文化   1篇
体育   23篇
文化理论   1篇
信息传播   21篇
  2021年   3篇
  2020年   5篇
  2019年   11篇
  2018年   6篇
  2017年   16篇
  2016年   6篇
  2015年   11篇
  2014年   3篇
  2013年   63篇
  2012年   4篇
  2011年   9篇
  2010年   5篇
  2009年   4篇
  2008年   5篇
  2007年   6篇
  2006年   5篇
  2005年   5篇
  2004年   9篇
  2003年   4篇
  2002年   6篇
  2000年   5篇
  1999年   7篇
  1998年   3篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   3篇
  1993年   3篇
  1992年   4篇
  1990年   3篇
  1989年   2篇
  1988年   5篇
  1987年   4篇
  1986年   3篇
  1985年   3篇
  1984年   3篇
  1982年   3篇
  1981年   5篇
  1980年   6篇
  1979年   8篇
  1978年   3篇
  1977年   1篇
  1976年   2篇
  1970年   2篇
  1969年   1篇
  1968年   1篇
  1967年   1篇
  1966年   1篇
  1942年   1篇
  1866年   1篇
排序方式: 共有283条查询结果,搜索用时 15 毫秒
1.
2.
3.
Not all child abuse is preventable. Society faces an ongoing need to support programs that treat the members of families in which abuse occurs. There is little systeamatically generated knowledge on the most efficient and effective ways to assist parents and children faced with abuse. The purpose of our 40-month study of eleven child abuse and neglect demonstration service programs in the United States was to expand the knowledge base in this area by determining, through evaluative research, the essential elements of successful treatment programs. This paper highlights our findings that pertain to more effective delivery of services to abusive and neglectful parents.  相似文献   
4.
There is now widespread recognition that digital technologies, particularly portable hand held devices capable of Internet connection, present opportunities and challenges to the way in which student learning is organized in schools, colleges and institutions of higher education in the 21st Century. Traxler, Journal of the Research Centre for Educational Technology, 6(1), 3–15 (2010) suggests such devices are pervasive and ubiquitous, conspicuous and unobtrusive, noteworthy and taken-for-granted with everyone typically owning one, using one and often having more than one. As a consequence it has been argued that the availability of such devices, controlled mainly by the student and not the teacher, has the potential to change the traditional dynamics and pedagogical patterns of the learning environment (Burden et al. 2012). Education institutions, however, typically remain organized around spatial and temporal considerations such as buildings, timetables, calendars and internal structures which are designed to classify and manage students. In the case study reported here students and faculty teaching staff from the College of Education in the Kuwait University were surveyed in order to assess their access to such technologies, their capability to use them effectively in support of achieving planned learning outcomes and the implications for change that could emanate from such findings.  相似文献   
5.
Cohn and Farrington’s work in citation analysis has examined scholarly influence within criminological research for over 25 years. The current analysis tracks the ten most-cited scholars and each scholar’s most-cited works in four international criminology journals and six American criminology and criminal justice journals over twenty-five years and five time periods—1986–1990, 1991–1995, 1996–2000, 2001–2005, and 2006–2010. This approach extends the traditional approach to citation analysis by documenting increases and decreases in individual citation careers as well as in the most-cited scholarly contributions of the most-cited scholars during a period of significant growth in criminology. The most-cited works mostly fall within the areas of developmental and life-course criminology and criminal careers, reflecting the importance of these topics in criminology.  相似文献   
6.
A sampling problem is described which was given to the general public to illustrate the problems of bias and the need for randomisation when sampling.  相似文献   
7.
8.
Tree-structured vector quantization (VQ) is a technique designed to represent a codebook that simplifies encoding as well as vector quantizer design. Most design algorithms for tree-structured VQ used in the past are based on heuristics that successively partition the input space. Recently, Chou, Lookabaugh and Gray proposed a tree-pruning heuristic in which a given initial tree is pruned backwards according to certain optimization criterion. We define the notion of an optimal pruned tree subject to a cost constraint and study the computational complexity of finding such an optimal tree for various cost functions. Under the assumption that all trees are equally probable, we show that, on the average, the number of pruned trees in a given tree is exponential in the number of leaves. Furthermore, we prove that finding an optimal pruned tree subject to constraints such as entropy or the expected-depth is NP-hard. However, we show that when the constraint is the number of leaves, the problem can be solved in polynomial time. We develop an algorithm to find the optimal pruned tree in O(nk) time, where n is the size of the initial tree and kis the constraint size.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号