首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   102篇
  免费   10篇
  2024年   1篇
  2023年   2篇
  2021年   4篇
  2019年   2篇
  2018年   4篇
  2017年   8篇
  2016年   1篇
  2015年   4篇
  2014年   4篇
  2013年   18篇
  2012年   10篇
  2011年   6篇
  2010年   7篇
  2009年   4篇
  2008年   7篇
  2007年   1篇
  2006年   1篇
  2005年   3篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1996年   1篇
  1993年   1篇
  1989年   1篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1980年   2篇
  1978年   1篇
  1975年   2篇
  1973年   2篇
  1972年   1篇
  1969年   1篇
  1963年   1篇
  1961年   1篇
排序方式: 共有112条查询结果,搜索用时 62 毫秒
31.
This article studies the origin and continuity of the identity of the entities inscribed in a distributed ledger. Specifically, it focuses on the differences between the identities of the entities that exist in a distributed ledger and those of the entities that exist outside the ledger but must be represented in the ledger in order to interact with it. It suggests that a distributed ledger that contains representations of entities that exist outside the ledger can yield a continuum of interconnected existing and past identities that is constantly redefined to represent new conceptual entities. This continuum can be understood as a metasortal—or a sortal of sortals—that resembles the mathematical structure of a set of sets. Further, the article presents the dilemma that arises when representing the identities of entities in a distributed ledger, and it draws an analogy between this dilemma and Russell's Paradox.  相似文献   
32.
Using the convoy model (R. L. Kahn & T. C. Antonucci, 1980), this study examined the differential impact of relocation, depending on the distance moved, on the size of 3 types of role networks. A total of 890 Dutch nonmovers and 445 movers (aged 55–86 years) were selected from the Longitudinal Aging Study Amsterdam. Results of analyses of variance showed that the neighbor networks changed most after relocation. Long‐distance movers discontinued the largest number of relationships with fellow club members. As expected, moving did not affect coworker networks. The findings show that, consistent with the convoy model, role networks proved to be unstable. Older adults, however, restored their partial networks at the second observation by starting new relationships.  相似文献   
33.
34.
35.
Adults with developmental disabilities frequently have both deficits in appropriate social skills and excesses in inappropriate social behavior (Matson, LeBlanc, & Weinheimer, 1999). Typically, published treatment studies have focused on social skills training procedures that teach and promote the use of new social behaviors. However, only a few studies have focused on management of existing social behaviors that are problematic because they occur excessively or in an inappropriate context (Wright, Herzog, & Seymour, 1992). The current study focuses on management of three types of inappropriate social behavior in a 26‐year‐old male with moderate mental retardation: inappropriate social interactions, inappropriate sexual behavior, and verbal aggression. A token economy with response cost procedure was implemented using a DRO interval as the basis for earning tokens. Using a multiple‐baseline design across behaviors, each of the three types of inappropriate social behavior was successfully treated. After demonstrating the success of the procedure, the DRO interval was increased while maintaining the reductions in inappropriate social behaviors. Appropriate behaviors such as initiating conversation, shaking hands, etc maintained throughout the intervention. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   
36.
37.
We conducted functional analyses of the pica of 3 participants. The pica of 1 participant appeared to be maintained by automatic reinforcement; that of the other 2 participants appeared to be multiply controlled by social and automatic reinforcement. Subsequent preference and treatment analyses were used to identify stimuli that would compete with the automatic function of pica for the 3 participants. These analyses also identified the specific aspect of oral stimulation that served as automatic reinforcement for 2 of the participants. In addition, functional analysis-based treatments were used to address the socially motivated components of 2 of the participants' pica. Results are discussed in terms of (a) the importance of using the results of functional analyses to develop treatments for pica and (b) the advantages of developing indirect analyses to identify specific sources of reinforcement for automatically reinforced behavior.  相似文献   
38.
Two Turbo Pascal (versions 3.0 and 4.0) software timers for the IBM microcomputer family are described: one with a 55-msec resolution and another with a 1-msec resolution. Both can be implemented without additional hardware requirements. The 55-msec timer makes use of the system-time-of-day clock; the 1-msec timer is a Turbo Pascal translation of the timer described by Bührer, Sparrer, and Weitkunat (1987). The logic of each timer is shown by a short demonstration program.  相似文献   
39.
This paper describes the development and validation of a deontic justice scale (DJS). Study 1 (n = 124) was conducted to test the initial 36‐item version of the scale. It resulted in the reduction of the initial scale to 18 items, including 3 dimensions: moral obligation (8 items), moral accountability (6 items), and moral outrage (4 items). Study 2 (n = 101) was conducted to examine the construct validity and confirm the factor structure of the DJS. Findings from both studies showed evidence of the scale's construct validity. They also showed that deontic justice is a multidimensional construct encompassing moral obligation, moral accountability, and moral outrage. The scale's implications for use as an adequate research instrument are discussed.  相似文献   
40.
I deal here with one of Boghossian’s arguments against content externalism, related to our inferential rationality (to use his term). According to his reasoning, the apriority of our logical abilities is inconsistent with certain externalist assumptions. Nevertheless, the problem constitutes an important challenge for any theory of content, not just for externalism. Furthermore, when we examine what internalists may propose to solve the problem, we see that externalists have at their disposal a more promising repertoire of possible replies than internalists. In that sense, insofar as Boghossian’s scenario is relevant to the debate externalism/internalism, it can be seen (against Boghossian’s original intention) as providing additional evidence for content externalism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号