全文获取类型
收费全文 | 557篇 |
免费 | 32篇 |
专业分类
589篇 |
出版年
2021年 | 4篇 |
2020年 | 17篇 |
2019年 | 18篇 |
2018年 | 18篇 |
2017年 | 22篇 |
2016年 | 22篇 |
2015年 | 16篇 |
2014年 | 10篇 |
2013年 | 68篇 |
2012年 | 29篇 |
2011年 | 30篇 |
2010年 | 16篇 |
2009年 | 25篇 |
2008年 | 34篇 |
2007年 | 27篇 |
2006年 | 22篇 |
2005年 | 16篇 |
2004年 | 23篇 |
2003年 | 20篇 |
2002年 | 23篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 8篇 |
1998年 | 6篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1971年 | 3篇 |
1970年 | 2篇 |
1967年 | 5篇 |
1966年 | 4篇 |
排序方式: 共有589条查询结果,搜索用时 15 毫秒
411.
412.
Four experiments compared the rates of forgetting following acquisition of a conditioned aversion and following a reactivation treatment given long after conditioning had been completed. The “reactivation treatment” consisted of a single presentation of the unconditioned stimulus, a procedure known to reinstate, following substantial forgetting, the behavior seen immediately after conditioning. It was first determined that the decrement in performance 1, 3, or 7 days later tended to be more rapid just after original conditioning than following a reactivation treatment given 27 days after conditioning. Subsequent experiments confirmed that the forgetting seen 3 or 7 days after original conditioning was in fact greater than forgetting 3 or 7 days after the reactivation treatment that had followed conditioning by 27 days; also, tests permitted rejection of the hypothesis that this effect could be attributed to nonassociative (systemic) consequences of the conditioning situation. Finally, tests indicated that retention 24 hr after a reactivation treatment was significantly better if the reactivation treatment followed conditioning by 27 days than if it were given just 3 min or 24 hr after conditioning. The central observation emerging from this study, that forgetting is more rapid following original learning than following a temporally remote reactivation treatment, was discussed in terms of potential interactions between the age (or accessibility) of a memory and processes that might be instigated by a reactivation treatment. 相似文献
413.
Bryan G. Norton 《Philosophia》1980,9(2):167-186
Conclusion I have taken the traditional problem of the seeming interdependence of identity concepts and essentialistic concepts and the
attendant difficulties with circularity as a starting point in my consideration of recent attempts to provide accounts ofde re essences. Having distinguished between theories of individual and generic essences, I have shown how a linguistic device
based upon a new approach to referring expressions has, perhaps, provided some advance in the understanding of individualde re essences. I have argued that, however efficacious these linguistic devices may be in dealing with individual essences, they
are of no help in dealing with generic essences. I considered, therefore, one of the recent attempts to use science as the
arbiter ofde re essences and concluded that such attempts will not, ultimately, solve the traditional problem of circularity. That problem
remains, arising in different forms to thwart different attempts to account forde re generic essences. 相似文献
414.
415.
In the Reicher-Wheeler paradigm, fluent readers can identify letters better when they appear in a word than when they appear in either a pronounceable pseudoword (a lexicality effect) or a single letter (a word-letter effect). It was predicted that if both of these effects involve a lexical factor, then adult acquired dyslexic subjects whose deficit prevents access to visual word form should show disruptions of the normal effects on the Reicher-Wheeler task. The results were that dyslexic subjects as well as matched control subjects showed a lexicality effect; however, while the control subjects showed a normal word-letter effect, the dyslexic subjects showed a reverse letter-superiority effect. Both effects, however, showed a systematic variation: As performance on lexical decision improved, the subjects' performance on words in the Reicher-Wheeler task was better than that for all the other conditions. These subject correlations were replicated by using data from a second lexical decision experiment, which utilized the same words and pseudowords that were used in the Reicher-Wheeler task. In addition, an item analysis showed that the words that the subjects had discriminated correctly in lexical decision showed a significant advantage over those that they had not, as well as an improvement relative to the other conditions. These results suggest that there is a lexical factor underlying the lexicality and word-letter effects, and it is proposed that the abnormal letter-superiority effect can be accounted for as the manifestation of other competing factors. 相似文献
416.
The Scanning Visual Vigilance Test is a variable-length detection test designed to assess the ability of individuals to maintain visual alertness for sustained periods of time. The test was designed to be sensitive to changes in vigilance produced by subtle variations in performance, such as those produced by low doses of centrally acting food constituents, drugs, or environmental stress. The test has been shown to be sensitive to the effects of stimulants and sedatives, as well as cold stress and sleep loss. It requires the subject to continuously scan a video monitor to detect the occurrence of infrequent stimuli that are difficult to detect. The number of stimuli correctly detected, false alarms, and reaction times are recorded. The stimulus is a small rectangle displayed for 2 sec at random locations on a darker region of a video monitor at random or pseudo-random times. The brightness of the stimulus can be adjusted for each subject individually on an automated threshold detection test. Training and test session length are defined by the experimenter. Hardware requirements are an IBM-compatible personal computer (286 or higher) with a color or grayscale VGA monitor. 相似文献
417.
Models and helping: naturalistic studies in aiding behavior 总被引:3,自引:0,他引:3
418.
The Effects of Differing Knowledge Transfer Strategies on Group Decision Making and Performance 下载免费PDF全文
Encouraging reflection on one's existing knowledge in a group setting increases shared understanding, makes information available for problem solving, and makes it easier for members to show and to be shown the merit of others' preferences. However, it is also possible that attempting to constrain the process by which problem solvers manage this reflection process may prevent them from effectively tailoring their approach to different problems. The current research focuses on how the nature of different knowledge transfer strategies impacts problem solving processes and outcomes by examining manipulations of, or constraints to, problem solvers' approach to knowledge transfer. Participants were directed to generate associated knowledge in preparation for answering a series of estimation items, either in a group or individually. We found that groups using a shared reflection process (as opposed to reflecting at an individual member level) were able to give more weight to the inputs of their more expert members and that groups outperformed individuals. We discuss the process of promoting knowledge transfer in a group context relative to an individual context and relate this to the concept of task demonstrability. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
419.
Bryan Pfaffenberger 《Knowledge, Technology, and Policy》2000,13(3):78-92
This article examines the nature and legality of FUD, which—as will be seen—is a timely subject. IBM may have been FUD’s originator
but its greatest practitioner is allegedly none other than Microsoft, which (according to the firm’s critics) has repeatedly
exercised FUD tactics in order to acquire and maintain its operating system monopoly. In particular, this article compares
Amdahl’s experience with IBM to the emerging contours of Microsoft’s battle against a surprisingly able competitor, the open
source operating system called Linux. A major contention of this essay is that attorneys, judges, and legal scholars tend
to pay insufficient attention to the unique characteristics of technology enterprises, and thus cannot distinguish meaningfully
between practices that are plainly legal under U. S. antitrust law, and those which are not. A perspective drawn from the
history and sociology of technology (namely, Thomas P. Hughes’ concept of technological systems) is used to elucidate what is predatory, and what is not, in a dominant market player’s use of FUD and associated marketing
tactics.
where his scholarly and teaching interests include cyberlaw, intellectual property in high-tech industries, and the social
issues posed by advanced information technology. He is also the author of several best-selling trade and textbook titles,
including Webster’s New World Dictionary of Computer Terms, 9th ed. (Hungry Minds) and Computers in Your Future, 4th ed. (Prentice-Hall). He lives in Charlottesville, Virginia. 相似文献
420.