首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   557篇
  免费   32篇
  589篇
  2021年   4篇
  2020年   17篇
  2019年   18篇
  2018年   18篇
  2017年   22篇
  2016年   22篇
  2015年   16篇
  2014年   10篇
  2013年   68篇
  2012年   29篇
  2011年   30篇
  2010年   16篇
  2009年   25篇
  2008年   34篇
  2007年   27篇
  2006年   22篇
  2005年   16篇
  2004年   23篇
  2003年   20篇
  2002年   23篇
  2001年   8篇
  2000年   6篇
  1999年   8篇
  1998年   6篇
  1997年   9篇
  1996年   5篇
  1995年   4篇
  1994年   3篇
  1993年   2篇
  1992年   5篇
  1991年   4篇
  1990年   2篇
  1989年   5篇
  1988年   4篇
  1987年   5篇
  1986年   2篇
  1985年   2篇
  1982年   2篇
  1981年   2篇
  1980年   4篇
  1979年   5篇
  1978年   2篇
  1977年   2篇
  1976年   7篇
  1975年   2篇
  1973年   2篇
  1971年   3篇
  1970年   2篇
  1967年   5篇
  1966年   4篇
排序方式: 共有589条查询结果,搜索用时 15 毫秒
411.
412.
Four experiments compared the rates of forgetting following acquisition of a conditioned aversion and following a reactivation treatment given long after conditioning had been completed. The “reactivation treatment” consisted of a single presentation of the unconditioned stimulus, a procedure known to reinstate, following substantial forgetting, the behavior seen immediately after conditioning. It was first determined that the decrement in performance 1, 3, or 7 days later tended to be more rapid just after original conditioning than following a reactivation treatment given 27 days after conditioning. Subsequent experiments confirmed that the forgetting seen 3 or 7 days after original conditioning was in fact greater than forgetting 3 or 7 days after the reactivation treatment that had followed conditioning by 27 days; also, tests permitted rejection of the hypothesis that this effect could be attributed to nonassociative (systemic) consequences of the conditioning situation. Finally, tests indicated that retention 24 hr after a reactivation treatment was significantly better if the reactivation treatment followed conditioning by 27 days than if it were given just 3 min or 24 hr after conditioning. The central observation emerging from this study, that forgetting is more rapid following original learning than following a temporally remote reactivation treatment, was discussed in terms of potential interactions between the age (or accessibility) of a memory and processes that might be instigated by a reactivation treatment.  相似文献   
413.
Conclusion I have taken the traditional problem of the seeming interdependence of identity concepts and essentialistic concepts and the attendant difficulties with circularity as a starting point in my consideration of recent attempts to provide accounts ofde re essences. Having distinguished between theories of individual and generic essences, I have shown how a linguistic device based upon a new approach to referring expressions has, perhaps, provided some advance in the understanding of individualde re essences. I have argued that, however efficacious these linguistic devices may be in dealing with individual essences, they are of no help in dealing with generic essences. I considered, therefore, one of the recent attempts to use science as the arbiter ofde re essences and concluded that such attempts will not, ultimately, solve the traditional problem of circularity. That problem remains, arising in different forms to thwart different attempts to account forde re generic essences.  相似文献   
414.
415.
In the Reicher-Wheeler paradigm, fluent readers can identify letters better when they appear in a word than when they appear in either a pronounceable pseudoword (a lexicality effect) or a single letter (a word-letter effect). It was predicted that if both of these effects involve a lexical factor, then adult acquired dyslexic subjects whose deficit prevents access to visual word form should show disruptions of the normal effects on the Reicher-Wheeler task. The results were that dyslexic subjects as well as matched control subjects showed a lexicality effect; however, while the control subjects showed a normal word-letter effect, the dyslexic subjects showed a reverse letter-superiority effect. Both effects, however, showed a systematic variation: As performance on lexical decision improved, the subjects' performance on words in the Reicher-Wheeler task was better than that for all the other conditions. These subject correlations were replicated by using data from a second lexical decision experiment, which utilized the same words and pseudowords that were used in the Reicher-Wheeler task. In addition, an item analysis showed that the words that the subjects had discriminated correctly in lexical decision showed a significant advantage over those that they had not, as well as an improvement relative to the other conditions. These results suggest that there is a lexical factor underlying the lexicality and word-letter effects, and it is proposed that the abnormal letter-superiority effect can be accounted for as the manifestation of other competing factors.  相似文献   
416.
The Scanning Visual Vigilance Test is a variable-length detection test designed to assess the ability of individuals to maintain visual alertness for sustained periods of time. The test was designed to be sensitive to changes in vigilance produced by subtle variations in performance, such as those produced by low doses of centrally acting food constituents, drugs, or environmental stress. The test has been shown to be sensitive to the effects of stimulants and sedatives, as well as cold stress and sleep loss. It requires the subject to continuously scan a video monitor to detect the occurrence of infrequent stimuli that are difficult to detect. The number of stimuli correctly detected, false alarms, and reaction times are recorded. The stimulus is a small rectangle displayed for 2 sec at random locations on a darker region of a video monitor at random or pseudo-random times. The brightness of the stimulus can be adjusted for each subject individually on an automated threshold detection test. Training and test session length are defined by the experimenter. Hardware requirements are an IBM-compatible personal computer (286 or higher) with a color or grayscale VGA monitor.  相似文献   
417.
418.
Encouraging reflection on one's existing knowledge in a group setting increases shared understanding, makes information available for problem solving, and makes it easier for members to show and to be shown the merit of others' preferences. However, it is also possible that attempting to constrain the process by which problem solvers manage this reflection process may prevent them from effectively tailoring their approach to different problems. The current research focuses on how the nature of different knowledge transfer strategies impacts problem solving processes and outcomes by examining manipulations of, or constraints to, problem solvers' approach to knowledge transfer. Participants were directed to generate associated knowledge in preparation for answering a series of estimation items, either in a group or individually. We found that groups using a shared reflection process (as opposed to reflecting at an individual member level) were able to give more weight to the inputs of their more expert members and that groups outperformed individuals. We discuss the process of promoting knowledge transfer in a group context relative to an individual context and relate this to the concept of task demonstrability. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   
419.
This article examines the nature and legality of FUD, which—as will be seen—is a timely subject. IBM may have been FUD’s originator but its greatest practitioner is allegedly none other than Microsoft, which (according to the firm’s critics) has repeatedly exercised FUD tactics in order to acquire and maintain its operating system monopoly. In particular, this article compares Amdahl’s experience with IBM to the emerging contours of Microsoft’s battle against a surprisingly able competitor, the open source operating system called Linux. A major contention of this essay is that attorneys, judges, and legal scholars tend to pay insufficient attention to the unique characteristics of technology enterprises, and thus cannot distinguish meaningfully between practices that are plainly legal under U. S. antitrust law, and those which are not. A perspective drawn from the history and sociology of technology (namely, Thomas P. Hughes’ concept of technological systems) is used to elucidate what is predatory, and what is not, in a dominant market player’s use of FUD and associated marketing tactics. where his scholarly and teaching interests include cyberlaw, intellectual property in high-tech industries, and the social issues posed by advanced information technology. He is also the author of several best-selling trade and textbook titles, including Webster’s New World Dictionary of Computer Terms, 9th ed. (Hungry Minds) and Computers in Your Future, 4th ed. (Prentice-Hall). He lives in Charlottesville, Virginia.  相似文献   
420.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号