首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   179篇
  免费   5篇
  2024年   1篇
  2023年   2篇
  2021年   2篇
  2020年   6篇
  2019年   1篇
  2018年   4篇
  2017年   3篇
  2016年   3篇
  2015年   2篇
  2014年   4篇
  2013年   17篇
  2012年   5篇
  2011年   3篇
  2010年   4篇
  2009年   19篇
  2008年   7篇
  2007年   11篇
  2006年   3篇
  2005年   3篇
  2004年   6篇
  2003年   11篇
  2002年   14篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1997年   3篇
  1996年   7篇
  1994年   5篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   2篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1981年   2篇
  1977年   1篇
  1976年   2篇
  1975年   3篇
  1974年   3篇
  1973年   1篇
  1972年   2篇
  1959年   1篇
  1955年   1篇
排序方式: 共有184条查询结果,搜索用时 15 毫秒
151.
152.
Moses, the leader and lawgiver to the people of Israel, went through a metamorphosis during his stay in the Sinai Desert, which can be explained as a near-death or near-death-like experience. Moses saw and heard God in the burning bush and yet survived. Following his revelation, he reached a higher level of consciousness, which enabled personality changes to occur. From being a simple shepherd of his father-in-law's flock, he turned into a prophet and charismatic leader of his people.  相似文献   
153.
The issue of representing access control requirements continues to demand significant attention. The focus of researchers has traditionally been on developing particular access control models and policy specification languages for particular applications. However, this approach has resulted in an unnecessary surfeit of models and languages. In contrast, we describe a general access control model and a logic-based specification language from which both existing and novel access control models may be derived as particular cases and from which several approaches can be developed for domain-specific applications. We will argue that our general framework has a number of specific attractions and an implication of our work is to encourage a methodological shift from a study of the particulars of access control to its generalities.  相似文献   
154.
Dov M. Gabbay 《Studia Logica》2009,93(2-3):181-198
Given an argumentation network we associate with it a modal formula representing the ‘logical content’ of the network. We show a one-to-one correspondence between all possible complete Caminada labellings of the network and all possible models of the formula.  相似文献   
155.
We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in order to express well-known properties like ‘speaks-for’ or ‘hand-off’, defined in terms of says, we do not need second-order logic (unlike previous approaches) but a decidable fragment of first-order logic suffices. We propose a model-driven study of the says axiomatization by constraining the Kripke models in order to respect desirable security properties, we study how existing access control logics can be translated into FSL and we give completeness for the logic.  相似文献   
156.
We used a memory paradigm to test whether the nature of representations of the self within long-term memory differed as a function of cultural background. In Western samples words encoded in relation to the self are typically remembered better, and Euro-Canadian participants here showed this standard self-reference effect. However, Asian-Canadian participants were slower to recognize personal traits (as opposed to collective traits) when these traits had been encoded in reference to the self, suggesting a more elaborate representation of the collective self than the personal self in long-term memory. Further, memory was actually inhibited for Asian-Canadians when personal traits were encoded in reference to the self (vs. encoded with other referents). Differences in long-term memory trace strength for self-related data may emerge even as differences in the working self do not, and implications of this difference are discussed.  相似文献   
157.
The present study examined the manner in which both hemispheres utilize prior semantic context and relative meaning frequency during the processing of homographs. Participants read sentences biased toward the dominant or the subordinate meaning of their final homograph, or unbiased neutral sentences, and performed a lexical decision task on lateralized targets presented 250ms after the onset of the sentence-final ambiguous prime. Targets were either related to the dominant or the subordinate meaning of the preceding homograph, or unrelated to it. Performance asymmetry was found in the absence of a biasing context: dominant-related targets were exclusively facilitated in the RVF/LH, whereas both dominant- and subordinate-related targets were facilitated in the LVF/RH. Performance symmetry was found in the presence of a biasing context: dominant-related targets were exclusively activated in dominant-biasing contexts, whereas both dominant- and subordinate-related targets were facilitated in subordinate-biasing contexts. The implications of the results for both general and hemispheric models of word processing are discussed.  相似文献   
158.
This study assessed the role of individualism and collectivism in the shaping of personal values of Canadians, Israelis, and Palestinians. Based on Sagie and Elizur's (1996) multifaceted approach, we distinguished personal values that are individual centered (i.e., associated with one's home, family, or work) from collective-centered values (i.e., associated with the religion, sports, or politics). The magnitude of the difference between both value types differs according to cultural orientation. As compared with Palestinians, we predicted that Canadians and Israelis would rank individual-centered values higher and collective-centered values lower. Data obtained from samples of Palestinians, Israelis, and Canadians supported this hypothesis.  相似文献   
159.
In order to test the social mechanisms through which organizational climate emerges, this article introduces a model that combines transformational leadership and social interaction as antecedents of climate strength (i.e., the degree of within-unit agreement about climate perceptions). Despite their longstanding status as primary variables, both antecedents have received limited empirical research. The sample consisted of 45 platoons of infantry soldiers from 5 different brigades, using safety climate as the exemplar. Results indicate a partially mediated model between transformational leadership and climate strength, with density of group communication network as the mediating variable. In addition, the results showed independent effects for group centralization of the communication and friendship networks, which exerted incremental effects on climate strength over transformational leadership. Whereas centralization of the communication network was found to be negatively related to climate strength, centralization of the friendship network was positively related to it. Theoretical and practical implications are discussed.  相似文献   
160.
Second-order quantifier elimination in the context of classical logic emerged as a powerful technique in many applications, including the correspondence theory, relational databases, deductive and knowledge databases, knowledge representation, commonsense reasoning and approximate reasoning. In the current paper we first generalize the result of Nonnengart and Szałas [17] by allowing second-order variables to appear within higher-order contexts. Then we focus on a semantical analysis of conditionals, using the introduced technique and Gabbay’s semantics provided in [10] and substantially using a third-order accessibility relation. The analysis is done via finding correspondences between axioms involving conditionals and properties of the underlying third-order relation. Presented by Wojciech Buszkowski  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号