首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2353篇
  免费   45篇
  国内免费   196篇
教育   1010篇
科学研究   885篇
各国文化   3篇
体育   40篇
综合类   48篇
文化理论   9篇
信息传播   599篇
  2024年   1篇
  2023年   22篇
  2022年   51篇
  2021年   90篇
  2020年   108篇
  2019年   72篇
  2018年   67篇
  2017年   70篇
  2016年   46篇
  2015年   79篇
  2014年   165篇
  2013年   158篇
  2012年   135篇
  2011年   172篇
  2010年   129篇
  2009年   188篇
  2008年   155篇
  2007年   182篇
  2006年   146篇
  2005年   157篇
  2004年   129篇
  2003年   92篇
  2002年   67篇
  2001年   40篇
  2000年   25篇
  1999年   16篇
  1998年   8篇
  1997年   5篇
  1996年   3篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1989年   3篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
排序方式: 共有2594条查询结果,搜索用时 16 毫秒
1.
孙宁 《档案管理》2020,(3):12-13
在大数据视域下,以档案管理理论和信息系统安全理论为基础,参考国家相关法规及标准,结合档案管理工作实务,研究当下档案管理工作中的风险,在此基础上初步构建起档案安全管理体系,并对可引入该体系的实用技术进行分析。  相似文献   
2.
3.
4.
In the context of social media, users usually post relevant information corresponding to the contents of events mentioned in a Web document. This information posses two important values in that (i) it reflects the content of an event and (ii) it shares hidden topics with sentences in the main document. In this paper, we present a novel model to capture the nature of relationships between document sentences and post information (comments or tweets) in sharing hidden topics for summarization of Web documents by utilizing relevant post information. Unlike previous methods which are usually based on hand-crafted features, our approach ranks document sentences and user posts based on their importance to the topics. The sentence-user-post relation is formulated in a share topic matrix, which presents their mutual reinforcement support. Our proposed matrix co-factorization algorithm computes the score of each document sentence and user post and extracts the top ranked document sentences and comments (or tweets) as a summary. We apply the model to the task of summarization on three datasets in two languages, English and Vietnamese, of social context summarization and also on DUC 2004 (a standard corpus of the traditional summarization task). According to the experimental results, our model significantly outperforms the basic matrix factorization and achieves competitive ROUGE-scores with state-of-the-art methods.  相似文献   
5.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   
6.
Abstract

This article discusses the use of R programing language for executing a sentiment analysis of tweets pertaining to library topics. This discussion is situated within the literature of marketing and management sciences, which is employing methods of machine learning and business intelligence to make informed decision-making, and library administration, which has expressed great interest in social media engagement within its literature but has yet to adopt these types of analysis. Presented in this article is a sample code with instructions on how users may execute it within R to retrieve and analyze tweets relevant to library services. Two examples created using the code (analysis of top librarians’ tweets and analysis of posts about major book publishers) are used to demonstrate the functionality of the code. The code presented in this article may be used by libraries to analyze tweets about their library and library-related topics, which, in turn, may inform management and marketing design.  相似文献   
7.
Abstract

The Program for Cooperative Cataloging (PCC) has formal relationships with the Library of Congress (LC), Share-VDE, and Linked Data for Production Phase 2 (LD4P2) for work on Bibliographic Framework (BIBFRAME), and PCC institutions have been very active in the exploration of MARC to BIBFRAME conversion processes. This article will review the involvement of PCC in the development of BIBFRAME and examine the work of LC, Share-VDE, and LD4P2 on MARC to BIBFRAME conversion. It will conclude with a discussion of areas for further exploration by the PCC leading up to the creation of PCC conversion specifications and PCC BIBFRAME data.  相似文献   
8.
彭斌 《科技广场》2007,(1):114-116
介绍了一种新的网络安全技术---入侵检测系统,它是一种以攻为守的主动式防御措施,而且是针对网络内部攻击进行防御。本文涉及了入侵检测系统的诸多方面,为进行入侵检测系统的研究提供相应的理论依据。  相似文献   
9.
基于数据仓库的CRM应用研究   总被引:1,自引:0,他引:1  
吴华 《中国科技信息》2007,(16):103-105
客户关系管理(CRM)逐渐成为企业的焦点,也是数据仓库技术的重要应用领域,本文介绍了客户信息管理以及数据仓库技术,分析了数据仓库技术在CRM中的应用;阐述了目前数据仓库应用面临的困境;并从应用及技术的层面,分析了成功实现基于数据仓库的CRM的关键点.  相似文献   
10.
This paper applies the production framework associated with the data envelopment analysis (DEA) method to evaluate the relative efficiency of R&D activities across countries. R&D capital stocks and manpower are treated as inputs while patents and academic publications are considered as outputs. A three-stage approach, which involves using DEA for evaluating efficiency and using Tobit regressions for controlling the external environment, is applied to 30 countries in recent years. The results show that less than one-half of the countries are fully efficient in R&D activities and that more than two-thirds are at the stage of increasing returns to scale. Most countries have a more significant advantage in producing SCI cum EI publications than in generating patents.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号