首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   71篇
  免费   1篇
  国内免费   6篇
教育   53篇
科学研究   13篇
综合类   5篇
信息传播   7篇
  2022年   1篇
  2021年   1篇
  2019年   3篇
  2018年   1篇
  2017年   3篇
  2015年   3篇
  2014年   3篇
  2013年   10篇
  2012年   6篇
  2011年   3篇
  2010年   4篇
  2009年   4篇
  2008年   5篇
  2007年   4篇
  2006年   6篇
  2005年   4篇
  2004年   2篇
  2003年   4篇
  2002年   10篇
  1998年   1篇
排序方式: 共有78条查询结果,搜索用时 46 毫秒
1.
We investigate the strategies used by 64 advanced secondary mathematics students to identify whether a given pair of polynomial representations (graphs, tables, or equations) corresponded to the same function on an assessment of coordinating representations. Participants also completed assessments of domain-related knowledge and background skills. Cluster analysis of strategies by representation pair revealed patterns in the participants' strategy use. Two clusters were identifiable on tasks that required matching equations to graphs and graphs to tables. We identified overlap between these two clusters, suggesting that while the representation pair influenced strategy choice, there was also a general distinction between students who used more and less sophisticated strategies. However, students who used more sophisticated coordination strategies were similar to the others on measures of domain-specific knowledge or background skills. We consider implications for future investigations testing interventions to promote coordinating representations.  相似文献   
2.
为π演算建立具有安全级别的简单类型系统,并证明该类型系统在规约语义下的类型可靠性.此类型系统使得π演算成为安全系统、安全协议分析与规范的普适形式化工具.  相似文献   
3.
设计基于跨层机制的通信协议,以达到优化网络性能、有效分配网络资源的目的,是无线传感器网络研究中的一项关键技术.对现有的基于跨层设计的网络通信协议进行综述和分析,并以跨层通信协议设计的目的性为着眼点,对跨层通信协议划分为3类:提高互操作性和增强网络适应性为目的的跨层设计,提高某些性能标准为目的的跨层设计和无分层模型设计.该分类方式有助于网络设计人员进行更具有针对性和实用性跨层设计.  相似文献   
4.
不同VANET应用对网络属性的要求和各自的特性影响路由协议的选择和使用。选择合适的路由协议将实现更好的网络性能,提供更高效的服务。通过分析VANET的5类应用的特点和对网络的要求,结合不同种类路由协议的特性,主要针对单播和多播情况下路由协议选择原因进行阐述,并给出单播协议中GPSR+AGF和CAR这两种路由协议的构造方式。  相似文献   
5.
This paper demonstrates and discusses the use of think aloud protocols (TAPs) as an approach for examining and confirming sources of differential item functioning (DIF). The TAPs are used to investigate to what extent surface characteristics of the items that are identified by expert reviews as sources of DIF are supported by empirical evidence from examinee thinking processes in the English and French versions of a Canadian national assessment. In this research, the TAPs confirmed sources of DIF identified by expert reviews for 10 out of 20 DIF items. The moderate agreement between TAPs and expert reviews indicates that evidence from expert reviews cannot be considered sufficient in deciding whether DIF items are biased and such judgments need to include evidence from examinee thinking processes.  相似文献   
6.
基于单向陷门函数的TMN协议的改进   总被引:1,自引:0,他引:1  
提出了一种利用陷门单向函数的性质对TMN协议进行改进的一般形式,利用串空间理论证明了它的安全性,并给出了几个具体的实现形式.  相似文献   
7.
Many user-centred studies of electronic information resources include a think-aloud element – where users are asked to verbalise their thoughts, interface actions and sometimes their feelings whilst using these resources to help them complete one or more information tasks. These studies are usually conducted with the purpose of identifying usability issues related to the resource(s) used or understanding aspects of users’ information behaviour. However, few of these studies present detailed accounts of how their think-aloud data was collected and analysed or provide detailed reflection on methodological decisions made. In this article, we discuss and reflect on the methodology used when planning and conducting a think-aloud study of lawyers’ interactive information behaviour. Our discussion is framed by Blandford et al.’s PRET A Rapporter (‘ready to report’) framework – a framework that can be used to plan, conduct and describe user-centred studies of electronic information resource use from an information work perspective.  相似文献   
8.
阐述了安全电子商务协议的安全属性,介绍了重要的安全电子商务协议,总结了近年来安全电子商务协议形式化分析方法的研究进展情况。文章最后对该领域主要的研究方向进行了展望。  相似文献   
9.
A think-aloud study investigated 7th graders’ (N?=?30) information processing and seeking of feedback while reading four multiple partly contradictory texts. An extreme-case analysis shows that a highly-skilled reader uses deeper strategies, such as elaboration, evaluation, and paraphrasing of less contradictory information, than a less-skilled reader. Elaboration strategies are frequently used by the less-skilled reader, but often consist of irrelevant elaboration strategies, which seem to preclude comprehension and deeper learning. The highly-skilled reader seeks internal feedback on task-, process-, and self levels, while the less-skilled reader seeks feedback related to task- and self levels. The results provide useful knowledge regarding pupils’ trajectories into deeper learning and self-regulation processes in information-processing tasks.  相似文献   
10.
给出了应用于不同系统的不变式的概述,分析了彼此之间的关系,进行了分类,并探讨了其未来发展趋势.密码协议的形式化分析日渐引起人们的广泛关注.这导致了不变式生成与描述技术的发展.不变式是对入侵者可知和不可知消息的定义,可用于协议认证和秘密性的证明,从而成为许多协议形式化分析工具和技术的核心  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号