首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3720篇
  免费   1018篇
  国内免费   32篇
  2019年   58篇
  2018年   47篇
  2017年   50篇
  2016年   53篇
  2014年   47篇
  2013年   370篇
  2012年   98篇
  2011年   110篇
  2010年   133篇
  2009年   223篇
  2008年   132篇
  2007年   133篇
  2006年   90篇
  2005年   109篇
  2004年   124篇
  2003年   120篇
  2002年   93篇
  2001年   140篇
  2000年   77篇
  1999年   108篇
  1998年   86篇
  1997年   62篇
  1996年   104篇
  1995年   81篇
  1994年   87篇
  1993年   86篇
  1992年   107篇
  1991年   105篇
  1990年   90篇
  1989年   91篇
  1988年   78篇
  1987年   62篇
  1986年   53篇
  1985年   44篇
  1984年   49篇
  1982年   57篇
  1981年   45篇
  1980年   45篇
  1979年   43篇
  1973年   49篇
  1972年   55篇
  1971年   51篇
  1968年   62篇
  1967年   45篇
  1966年   62篇
  1965年   44篇
  1964年   81篇
  1963年   79篇
  1962年   50篇
  1961年   44篇
排序方式: 共有4770条查询结果,搜索用时 15 毫秒
21.
List of publications: Husserliana (also translations) and Phaenomenologica  相似文献   
22.
23.
A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature, mechanisms, and preventive measures for personal-computer viruses are reviewed. Different procedures are recommended to protect research laboratories, instructional laboratories, and software lending libraries. Tradeoffs between providing adequate protection and not having the security become too burdensome are considered.  相似文献   
24.
Enhancements to the Micro Experimental Laboratory (MEL) and the ways in which they facilitate development of psychological experiments are discussed in this paper. New procedures are described for (1) presenting and manipulating pictorial graphics, (2) inputting response box, voice key, joystick, digitized speech, and mouse responses, (3) outputting lights, speech, and tone stimuli, (4) editing and analyzing digitized speech, and (5) implementing multitask processing. Methods for extending the language, developing test batteries, sequencing subjects, and managing and analyzing data are described.  相似文献   
25.
Using bar code technology to automate data collection provides a rapid and reliable alternative to paper-and-pencil tracking or keyboard entry into pocket or laptop computer. An array of bar code symbols is printed on a data menu, with a unique symbol corresponding to each possible observation. Bar code symbols are scanned using hand-held readers, which record the event, log the observation time, and store data for transfer to a personal computer. Advantages of the bar code monitoring system include: (1) ease of use by staff with minimal technical training, (2) reduced data entry errors and increased entry speed, (3) reliable portable operation, and (4) low-cost hardware. While the bar code system described here is used for behavioral monitoring in a residential treatment setting for the developmentally disabled, with minimal modification this system can be adapted for use in a wide variety of research and clinical applications.  相似文献   
26.
27.
28.
Two cebus monkeys, with many years of experience matching a variety of static visual stimuli (forms and colors) within a standard matching-to-sample paradigm, were trained to press a left lever when a pair of displayed static stimuli were the same and to press a right lever when they were different. After learning the same/different task, the monkeys were tested for transfer to dynamic visual stimuli (flashing versus steady green disks), with which they had no previous experience. Both failed to transfer to the dynamic stimuli. A third monkey, also with massive past experience matching static visual stimuli, was tested for transfer to the dynamic stimuli within our standard matching paradigm, and it, too, failed. All 3 subjects were unable to reach a moderate acquisition criterion despite as many as 52 sessions of training with the dynamic stimuli. These results provide further evidence that, in monkeys, the matching (or identity) concept has a very limited reach; they consequently do not support the view held by some theorists that an abstract matching concept based on physical similarity is a general endowment of animals.  相似文献   
29.
30.
Three pigeons pecked at letters of the alphabet and at the symbol "?" displayed on a computer-driven cathode ray screen. A 4 by 4 matrix of infrared emitting and detecting diodes and associated circuitry identified the location of a pigeon''s responses to the screen. Responses at the target letter T were probabilistically reinforced with food whenever T appeared in a string of three letters in the middle of the screen. Responses at the symbol "?" appearing below this string were probabilistically reinforced whenever T did not appear. The letter F anywhere in the three-character string either strongly predicted the occurrence of the target letter T, in two conditions, or predicted its nonoccurrence, in a third. This manipulation of the frequency with which the familiar letter F predicted T was shown to change the function relating probability of a correct peck at the symbol "?" to the number of Fs in the string. This effect may be interpreted as an instance of the phenomenon where an organism''s acquired knowledge changes what it sees.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号