首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   464篇
  免费   18篇
  国内免费   3篇
  2021年   3篇
  2020年   5篇
  2019年   7篇
  2018年   7篇
  2017年   12篇
  2016年   16篇
  2015年   5篇
  2014年   17篇
  2013年   63篇
  2012年   22篇
  2011年   29篇
  2010年   14篇
  2009年   18篇
  2008年   24篇
  2007年   33篇
  2006年   23篇
  2005年   19篇
  2004年   20篇
  2003年   15篇
  2002年   22篇
  2001年   5篇
  2000年   6篇
  1999年   7篇
  1998年   4篇
  1997年   4篇
  1996年   2篇
  1995年   5篇
  1994年   9篇
  1993年   4篇
  1992年   6篇
  1991年   7篇
  1990年   3篇
  1988年   7篇
  1987年   3篇
  1986年   5篇
  1985年   4篇
  1984年   3篇
  1983年   3篇
  1982年   1篇
  1981年   5篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
  1973年   2篇
  1972年   1篇
  1968年   2篇
  1965年   1篇
  1964年   1篇
排序方式: 共有485条查询结果,搜索用时 31 毫秒
151.
The term attentional blink (AB) refers to a failure in identifying the second of two targets, separated by less than 500?ms, embedded in a rapid succession of nontargets. To examine whether the expectation of the onset of the first target affects the AB, we compared the magnitudes of the AB deficit when participants triggered the appearance of the first target and when the target was presented automatically at some time point, as in traditional AB studies. In Experiment 1, the first target appeared immediately after a participant's voluntary keypress, revealing that the accuracy for identifying the first target increased and that the AB deficit was attenuated. In Experiment 2, the temporal delay between a voluntary keypress and the first-target presentation was manipulated. The results showed that both targets could be reported accurately only when the first target was presented within 300?ms after the action. In Experiment 3, we ruled out an alternative explanation that would attribute the facilitation effect to mere physical movement, by examining the accuracy of target identification when participants voluntarily pressed a key but that action was unrelated to the onset of the first target. Taken together, the results suggest that voluntary action to trigger the onset of a visual target facilitates processing and reduces the subsequent AB deficit when the target appears within 300?ms of the action.  相似文献   
152.
153.
Salesforce control systems tend to focus on outcomes rather than behaviors. The use and effectiveness of behavior-based control systems is limited, particularly with industrial sales-people, who generally operate in the field much of the time where their behavior cannot be closely observed or supervised by management. The authors propose Behavioral Self-Management (BSM) as a means of controlling the methods salespeople use to achieve results. Specific BSM techniques applicable to selling and strategies for encouraging salespeople to engage in self- management are reviewed.  相似文献   
154.
Although very little visual information is explicitly retained across views, some continuity of processing is afforded by implicit visual memory traces of previous views. These memory traces interact with attentional mechanisms to guide eye movements, cognition, and action. Two different memory mechanisms are described here. First, the deployments of focal attention and eye movements are facilitated towards recently attended features and locations (priming of popout). Second, attention is guided by implicit memory traces of specific visual contexts experienced in the past (contextual cueing). Compared to the visual memory tapped by change blindness tasks, the implicit memory mechanisms of priming of popout and contextual cueing do not require conscious intervention and may exhibit greater memory capacity, longer durability, and higher discriminability. Thus, these implicit traces of past views guide attention and eye movements to allow for effective access (indexing) to a scene's details, hence providing context and continuity to ongoing interactions with the perceptual world.  相似文献   
155.
156.
Abstract

It is widely accepted that effective implementation of new technology into work organizations needs an integrative approach in which developments in both technical and social systems are considered. Furthermore, success depends upon the effective participation of significant stakeholders in this process. This article reviews the methods available for this purpose and concludes that a particular weakness is the methods that can be used to generate and review socio-technical system opportunities early in the development process. Whilst methods exist to support stakeholder participation at this stage, they need to represent future socio-technical opportunities if they are to make an effective contribution. This article presents the ORDIT (Organizational Requirements Definition for Information Technology Systems) methodology, which uses responsibility modelling as a basis for constructing socio-technical systems opportunities. The application of telemedicine in health care is presented as a case study to demonstrate how this method can be used to construct and evaluate socio-technical scenarios.  相似文献   
157.
The relational reach and psychotherapeutic action of comedy are examined in the opening phase of treatment with a man who had an early history of neglect and consequent neurotic isolation. Through the examination of a series of comedic enactments that cracked into the beginning phase of this treatment, comedy's animating force to defy neurotic gravity and aid in the reanimation of primal density is considered. The ways in which laughter opened into a maternal erotic transference—countertransference is further detailed, in conjunction with reflection aimed at the aggression of this comedic bond, including countertransference hate.  相似文献   
158.
This paper details the diagnostic discourse that has accumulated around feminine boys, including the traditional presuppositions of Gender Identity Disorder (GID). The GID discourse is examined for the ways in which it is built upon unquestioned beliefs about masculinity. Distinct from most modern considerations of gender, no effort has been made to critically theorize gender when thinking about feminine boys; masculinity is as masculinity was. Consequently, we are left with modes of diagnosis and treatment that are out of synch with modern social life, and a set of ideas that do not proceed from an adequate understanding of the range that is masculinity. New sustaining ideals are in play, and in accord with these ideals an argument is made for a new mode of psychotherapeutic address. The traditional individual trauma explanation for GID is questioned. Particular emphasis is given to the ways in which this traditional GID discourse fails to reckon with how masculinity is held in place by the strong arm of regulatory anxiety. A new position that incorporates a greater appreciation for the role of social trauma and melancholia is offered. It is argued that a theory that offers insight into the workings of melancholia as it builds the feminine boy affords a more robust set of ideas through which to contemplate the boy. In turn, we come upon a better avenue of psychotherapeutic action—one that does not employ behavioral strategies that reinforce social exclusion.  相似文献   
159.
Methods of sample size planning are developed from the accuracy in parameter approach in the multiple regression context in order to obtain a sufficiently narrow confidence interval for the population squared multiple correlation coefficient when regressors are random. Approximate and exact methods are developed that provide necessary sample size so that the expected width of the confidence interval will be sufficiently narrow. Modifications of these methods are then developed so that necessary sample size will lead to sufficiently narrow confidence intervals with no less than some desired degree of assurance. Computer routines have been developed and are included within the MBESS R package so that the methods discussed in the article can be implemented. The methods and computer routines are demonstrated using an empirical example linking innovation in the health services industry with previous innovation, personality factors, and group climate characteristics.  相似文献   
160.
The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution paradigm (Study 1), scores on the Children’s Rejection-Sensitivity Questionnaire (Study 2), and visual attention to socially rejecting stimuli (Study 3). The participants were 185 children (11 years-7 months to 12 years-6 months), 248 children (9 years-4 months to 11 years-8 months) and 140 children (8 years-10 months to 12 years-10 months) in the three studies, respectively. Regression analyses showed that, with depressive symptoms covaried, there were quadratic relations between loneliness and these different measures of hypervigilance to social threat. As hypothesized, only children in the upper range of loneliness demonstrated elevated hostility to ambiguously motivated social exclusion, higher scores on the rejection sensitivity questionnaire, and disengagement difficulties when viewing socially rejecting stimuli. We found that very lonely children are hypersensitive to social threat.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号