首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6186篇
  免费   281篇
  国内免费   1篇
  6468篇
  2021年   66篇
  2020年   121篇
  2019年   131篇
  2018年   217篇
  2017年   203篇
  2016年   186篇
  2015年   133篇
  2014年   165篇
  2013年   624篇
  2012年   255篇
  2011年   262篇
  2010年   159篇
  2009年   170篇
  2008年   203篇
  2007年   206篇
  2006年   166篇
  2005年   164篇
  2004年   172篇
  2003年   131篇
  2002年   123篇
  2001年   154篇
  2000年   115篇
  1999年   106篇
  1997年   53篇
  1996年   70篇
  1995年   49篇
  1994年   52篇
  1993年   58篇
  1992年   71篇
  1991年   78篇
  1990年   65篇
  1989年   66篇
  1988年   69篇
  1987年   65篇
  1986年   55篇
  1985年   67篇
  1984年   73篇
  1983年   50篇
  1982年   59篇
  1979年   66篇
  1978年   65篇
  1977年   55篇
  1976年   48篇
  1975年   73篇
  1974年   62篇
  1973年   61篇
  1972年   53篇
  1971年   55篇
  1968年   49篇
  1967年   60篇
排序方式: 共有6468条查询结果,搜索用时 15 毫秒
991.
Journal of Religion and Health - Stillbirth is recognized as one of the most challenging experiences of bereavement raising significant spiritual and theological questions. Semi-structured...  相似文献   
992.
This study aimed to examine the construct validity of the Minnesota Multiphasic Personality Inventory–2 Restructured Form (MMPI–2–RF) interpersonal functioning scales (Ben-Porath &; Tellegen, 2008/2011 Ben-Porath, Y. S., &; Tellegen, A. (2011). MMPI2RF (Minnesota Multiphasic Personality Inventory2 Restructured Form) manual for administration, scoring, and interpretation. Minneapolis: University of Minnesota Press. (Original work published 2008) [Google Scholar]) using as a criterion measure the Computerized Adaptive Test of Personality Disorder–Static Form (CAT–PD–SF; Simms et al., 2011 Simms, L. J., Goldberg, L. R., Roberts, J. E., Watson, D., Welte, J., &; Rotterman, J. H. (2011). Computerized adaptive assessment of personality disorder: Introducing the CAT–PD project. Journal of Personality Assessment, 93, 380389.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]). Participants were college students (n = 98) recruited through the university subject pool. A series of a priori hypotheses were developed for each of the 6 interpersonal functioning scales of the MMPI–2–RF, expressed as predicted correlations with construct-relevant CAT–PD–SF scales. Of the 27 specific predictions, 21 were supported by substantial (≥ |.30|) correlations. The MMPI–2–RF Family Problems scale (FML) demonstrated the strongest correlations with CAT–PD–SF scales Anhedonia and Mistrust; Cynicism (RC3) was most highly correlated with Mistrust and Norm Violation; Interpersonal Passivity (IPP) was most highly correlated with Domineering and Rudeness; Social Avoidance (SAV) was most highly correlated with Social Withdrawal and Anhedonia; Shyness (SHY) was most highly correlated with Social Withdrawal and Anxioiusness; and Disaffiliativeness (DSF) was most highly correlated with Emotional Detachment and Mistrust. Results are largely consistent with hypotheses suggesting support for both models of constructs relevant to interpersonal functioning. Future research designed to more precisely differentiate Social Avoidance (SAV) and Shyness (SHY) is suggested.  相似文献   
993.
Historically, effort has been viewed as aversive. Most supporting evidence comes from studies demonstrating increased force/effort requirements reduce operant responding. Changes in force/effort requirements, however, are often accompanied by changes in response definition when mechanical devices are used to define the response. As a consequence, responses measured at one point in a study may go unmeasured at other points. In an alternative approach, we used a continuous measurement strategy that provided a means to fix the threshold force defining the response class and simultaneously allowed independent manipulation of the force criteria required to produce reinforcement. Rats pressed a force transducer according to a fixed‐ratio 5 schedule of food delivery. The criterion force was systematically increased and decreased; the threshold for response detection was constant. When response rates included only criterion responses, overall rate decreased when force requirements increased. By contrast, when all responses, both those meeting force criteria and those that did not (above the threshold but below the criteria for reinforcement) were included in the rate calculation, increases in force increased response rate. Increases in force criteria also increased the maximum force (g) and time‐integral of force (g‐s) of operant behavior. Control conditions showed increases in responding could be explained by the emergence of subcriterion responses, irrespective of force. We conclude that prior results showing effort decreases response rates are due to an artifact arising from inadvertent changes in response definitions. Increases in effort may better be understood as changes in the response:reinforcer payoff owing to the emergence of a subcriterion response class.  相似文献   
994.
The concept of reinforcement value summarizes the effect of different variables, such as reinforcement delay, reinforcement magnitude, and deprivation level, on behavior. In the present set of experiments, we evaluated the effect of reinforcement devaluation on performance under FI schedules. The literature on timing and reinforcement value suggests that devaluation generates longer expected times to reinforcement than the same intervals trained under control conditions. We devalued reinforcement with delay in Experiments 1A, 1B, and 2, and diminished deprivation in Experiments 3A and 3B. Devaluation reduced response rates, increased the number of one‐response intervals, and lengthened postreinforcement pauses, but had inconsistent effects on other timing measures such as quarter life and breakpoint. The results of delayed reinforcement and diminished deprivation manipulations are well summarized as reinforcement devaluation effects. These results suggest that devaluation may reduce stimulus control. In addition, we argue that the process by which delayed reinforcement affects behavior might also explain some effects observed in other devaluation procedures through the concept of reinforcement value.  相似文献   
995.
In computer security parlance, a hacker is an individual who actively seeks and takes advantage of flaws and weaknesses of a computer network or system. In recent years, one has seen the rise of hacking, often as a form of protest and retaliation for reasons ranging from political to social, but the question remains as to what really motivates an individual to hack a computer network? Using the Q-method, the study aimed to develop a classification of the motivation of computer hackers. This was done with the use of 43 participants who were subjected to preliminary interviews and the sorting method. The statements from the interviews were categorized that resulted in seven conceptual themes, namely social-positive, social-negative, intellectual gain, self-satisfaction, economic rewards, technological-positive and technological-negative. From these themes, three distinct profiles emerged and were used to describe the motivation of hackers.  相似文献   
996.
The current study explored the persistence of event model organizations and how this influences the experience of interference during retrieval. People in this study memorized lists of sentences about objects in locations, such as “The potted palm is in the hotel.” Previous work has shown that such information can either be stored in separate event models, thereby producing retrieval interference, or integrated into common event models, thereby eliminating retrieval interference. Unlike prior studies, the current work explored the impact of forgetting up to 2 weeks later on this pattern of performance. We explored three possible outcomes across the various retention intervals. First, consistent with research showing that longer delays reduce proactive and retroactive interference, any retrieval interference effects of competing event models could be reduced over time. Second, the binding of information into events models may weaken over time, causing interference effects to emerge when they had previously been absent. Third, and finally, the organization of information into event models could remain stable over long periods of time. The results reported here are most consistent with the last outcome. While there were some minor variations across the various retention intervals, the basic pattern of event model organization remained preserved over the two-week retention period.  相似文献   
997.
We present the Credibility of Science Scale (CoSS), an efficient 6-item scale demonstrating excellent reliability and validity. CoSS scores exhibit criterion validity in predicting beliefs across a host of contemporary science topics, over and above previously documented predictors (Study 2). Further, we present evidence for the convergent and discriminant validity of the instrument, which correlates as expected with several variables previously implicated in scientific belief (e.g., political ideology, religious identity, conspiracist thinking; Study 2) and also with measures of cognitive ability (Study 3). Finally, we discuss possible uses of the CoSS as a tool for understanding science-related beliefs, behavior, and communication.  相似文献   
998.
Black Mountain College is remembered as an artistic utopian alternative to institutional learning. Its faculty and students included some of the most important creative thinkers of the 20th century. Its foundation was built on the philosophy of “learning by doing.” But what made Black Mountain such a dynamic educational environment? Today, the financial burden of higher education places a lasting strain on students that inhibits creative growth. Does the educational structure of the college system impede our learning? Black Mountain was a legendary educational experiment, which offers a model for contemporary art education.  相似文献   
999.
Making recognition decisions often requires us to reference the contents of working memory, the information available for ongoing cognitive processing. As such, understanding how recognition decisions are made when based on the contents of working memory is of critical importance. In this work we examine whether recognition decisions based on the contents of visual working memory follow a continuous decision process of graded information about the correct choice or a discrete decision process reflecting only knowing and guessing. We find a clear pattern in favor of a continuous latent strength model of visual working memory–based decision making, supporting the notion that visual recognition decision processes are impacted by the degree of matching between the contents of working memory and the choices given. Relation to relevant findings and the implications for human information processing more generally are discussed.  相似文献   
1000.
Many philosophers have been attracted to the view that reasons are premises of good reasoning – that reasons to φ are premises of good reasoning towards φ‐ing. However, while this reasoning view is indeed attractive, it faces a problem accommodating outweighed reasons. In this article, I argue that the standard solution to this problem is unsuccessful and propose an alternative, which draws on the idea that good patterns of reasoning can be defeasible. I conclude by drawing out implications for the debate over pragmatic reasons for belief and other attitudes and for one influential form of reductionism about the normative.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号