首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   175篇
  免费   6篇
  2021年   2篇
  2019年   3篇
  2018年   2篇
  2017年   3篇
  2016年   4篇
  2015年   4篇
  2014年   4篇
  2013年   13篇
  2012年   5篇
  2011年   9篇
  2010年   2篇
  2009年   6篇
  2008年   7篇
  2007年   6篇
  2006年   9篇
  2005年   3篇
  2003年   2篇
  2002年   5篇
  2001年   8篇
  2000年   2篇
  1999年   7篇
  1998年   3篇
  1997年   2篇
  1996年   3篇
  1995年   5篇
  1994年   7篇
  1992年   1篇
  1991年   3篇
  1990年   5篇
  1989年   6篇
  1988年   7篇
  1987年   1篇
  1985年   2篇
  1984年   2篇
  1983年   2篇
  1982年   2篇
  1981年   3篇
  1980年   3篇
  1979年   2篇
  1978年   2篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
  1966年   1篇
  1965年   1篇
  1961年   1篇
排序方式: 共有181条查询结果,搜索用时 15 毫秒
61.
OBJECTIVE: Research suggests that subtyping adults with binge eating disorders by dietary restraint and negative affect predicts comorbid psychopathology, binge eating severity, and treatment outcome. Little research has explored the validity and clinical utility of subtyping youth along these dimensions. METHOD: Children (aged 8-18 years) reporting loss of control eating (n=159) were characterized based upon measures of dietary restraint and negative affect using cluster analysis, and then compared regarding disordered eating attitudes and behaviors, and parent-reported behavior problems. RESULTS: Robust subtypes characterized by dietary restraint (n=114; 71.7%) and dietary restraint/high negative affect (n=45; 28.3%) emerged. Compared to the former group, the dietary restraint/high negative affect subtype evidenced increased shape and weight concerns, more frequent binge eating episodes, and higher rates of parent-reported problems (all ps<0.05). CONCLUSION: Similar to findings from the adult literature, the presence of negative affect may mark a more severe variant of loss of control eating in youth. Future research should explore the impact of dietary restraint/negative affect subtypes on psychiatric functioning, body weight, and treatment outcome.  相似文献   
62.
Usher M  Davelaar EJ  Haarmann HJ  Goshen-Gottstein Y 《Psychological review》2008,115(4):1108-18; discussion 1119-26
P. B. Sederberg, M. W. Howard, and M. J. Kahana have proposed an updated version of the temporal-context model (TCM-A). In doing so, they accepted the challenge of developing a single-store model to account for the dissociations between short- and long-term recency effects that were reviewed by E. J. Davelaar, Y. Goshen-Gottstein, A. Ashkenazi, H. J. Haarmann, and M. Usher (2005). In this commentary, the authors argue that the success of TCM-A in addressing the dissociations is dependent not only on an episodic encoding matrix but--critically--also on its implicit use of a short-term memory store--albeit exponential rather than buffer-like. The authors also highlight some difficulties of TCM-A in accounting for these dissociations, and they argue that TCM-A fails to account for critical data--the presentation-rate effect--that dissociates exponential and buffer-like models.  相似文献   
63.
64.
In this paper, we examine Adam Feltz and Edward Cokely’s recent claim that “the personality trait extraversion predicts people’s intuitions about the relationship of determinism to free will and moral responsibility” (INSERT REFERENCE). We will first present some criticisms of their work before briefly examining the results of a recent study of our own. We argue that while Feltz and Cokely have their finger on the pulse of an interesting and important issue, they have not established a robust and stable connection between extraversion and compatibilist-friendly intuitions.  相似文献   
65.
Violent rhetoric online is becoming increasingly relevant to the practice of forensic mental health assessment as examinee's virtual lives may transform into real-world acts of violence. With the rise of a diverse subculture of violent online communities, the aim of the present study was to inform how concerns with online sources of collateral data and racial/ethnic biases may influence determinations of violence potential. Using an experimental design, jury-eligible participants (N = 278) and forensic mental health experts (N = 78) were presented with mock Twitter (now referred to as X) posts that varied by data source (i.e., how information was accessed) and the examinee's race/ethnicity. Results showed no differences in participants' ratings of data credibility, how much weight they would place on the posts in a threat assessment, or how likely the examinee was to act violently against his intended target. Implications regarding the interpretation of social media evidence, relevant limitations, and future research are discussed.  相似文献   
66.
67.
This paper presents a family systems model for considering the interactive events that occur when a child and parent move towards closing their relationship and separating. This process typically involves the child being 'received into care' and is identified as developmental closure . Different stages of this process are exemplified clinically and the therapeutic principles that guide work with families struggling with such difficulties are outlined.  相似文献   
68.
69.
This paper provides an update of research into the training of family therapists. Issues from the overarching contexts of adult learning, professional training and current themes in the practice of family therapy are briefly outlined. The early organization of the training research field is seen as being programme orientated, lacking a multi-perspective approach (particularly that of the trainee) and not making use of qualitative research methods. The more recent empirical research is reviewed with these issues to the fore. The paper concludes by providing a new set of research questions, many of which can be addressed by qualitative methodologies and by calling for the research process to be an essential ingredient of training for family therapists aided by the development of the trainer/researcher role.  相似文献   
70.
This paper critiques a set of software (i.e., SAS, BMDP, LSP) that contain a Fourier analysis program. In addition, this paper discusses both general-purpose software that runs a Fourier analysis and special Fourier analysis hardware. Some examples of the efficacy of commercially available software and hardware are given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号