首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3943篇
  免费   2244篇
  国内免费   28篇
  6215篇
  2024年   5篇
  2023年   12篇
  2022年   6篇
  2021年   135篇
  2020年   164篇
  2019年   586篇
  2018年   489篇
  2017年   594篇
  2016年   569篇
  2015年   487篇
  2014年   423篇
  2013年   548篇
  2012年   287篇
  2011年   255篇
  2010年   211篇
  2009年   172篇
  2008年   138篇
  2007年   175篇
  2006年   160篇
  2005年   134篇
  2004年   107篇
  2003年   113篇
  2002年   102篇
  2001年   104篇
  2000年   71篇
  1999年   38篇
  1998年   16篇
  1997年   9篇
  1996年   16篇
  1995年   10篇
  1994年   4篇
  1993年   4篇
  1992年   11篇
  1991年   11篇
  1990年   8篇
  1989年   5篇
  1987年   1篇
  1986年   2篇
  1985年   3篇
  1984年   2篇
  1983年   4篇
  1982年   1篇
  1981年   1篇
  1980年   4篇
  1979年   3篇
  1978年   3篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
  1974年   1篇
排序方式: 共有6215条查询结果,搜索用时 0 毫秒
11.
A peer-delivered incidental-teaching procedure was used to instruct appropriate requesting in adults with moderate to severe mental retardation or autism. Three pairs of group-home residents participated in an incidental-teaching procedure to increase appropriate requesting, prompting, and responding of residents during lunch-preparation sessions. An increase in the number of incidental-teaching episodes during dinner was obtained, and remained high when lunch-making training sessions were withdrawn. In addition, during the incidental-teaching phase, an increase in appropriate requests and overall verbalizations occurred for the peer learners. Changes in appropriate requesting and overall verbalizations also remained higher than baseline when training was withdrawn.  相似文献   
12.
Computer assisted instruction (CAI) was used for improving the efficiency of simple addition (single-digit without carrying) computation in three children with mental retardation. The training program, conducted on a portable personal computer, consisted of demonstrations and repetitive practices on simple addition presented in a vertical format. A number of behavioral instruction techniques such as direct feedback, corrective demonstration, verbal association, and token reinforcement were also included. To evaluate the effects of the CAI package, a multiple-baseline across subjects design with followup was employed. Results showed that performances of children improved with training and were maintained at 1-week, 4-week, and 12-week followups. Generalization of the learned skills was evident when children were assessed on a paper-and-pencil addition test in a vertical format. The skills were also transferable, with initial prompting, to a computerized addition test in a horizontal format. These findings reaffirmed the applicability of CAI and behavioral techniques for teaching math skills to children with mental retardation.  相似文献   
13.
Students with special needs must have the opportunity to learn in inclusive classrooms. However, this requires that classroom teachers believe that (a) students can learn in spite of any negative environmental influences in their lives, and (b) they personally have the ability to reach any student. Securing this teaching efficacy for teachers in inclusive classroom settings requires paradigm shifts in preservice and inservice teacher development programs with the precept that all students can learn and that we can assist them. The authors, one a regular and the other a special education teacher educator, collaborate to explore the issue of how best to provide and maintain a positive personal teaching efficacy among regular teacher education candidates who are faced with the challenges of having students with varying levels of ability and behavioral responses in their classrooms.  相似文献   
14.
Introduction and overview: Global information ethics   总被引:2,自引:0,他引:2  
This is an introduction to a set of papers on Computer Ethics from the conference ETHICOMP95. Taken as a whole, the collection of papers provides arguments and concepts to launch a new development in computer ethics: ‘Global Information Ethics’. A rationale for globalization is provided, as well as some early efforts which move in that direction. ETHICOMP95, an international conference on Computer Ethics, was held 28–30 March 1995 at De Montfort University, Leicester, UK. Co-directors were Terrell Ward Bynum and Simon Rogerson.  相似文献   
15.
Several context-specific social and political factors in Eastern and Central Europe are described — factors that must be considered while developing strategies to introduce Computer Ethics. Poland is used as a primary example. GNP per capita, the cost of hardware and software, uneven and scant distribution of computing resources, and attitudes toward work and authority are discussed. Such “geographical factors” must be taken into account as the new field of Computer Ethics develops.  相似文献   
16.
A method for simulating non-normal distributions   总被引:11,自引:0,他引:11  
A method of introducing a controlled degree of skew and kurtosis for Monte Carlo studies was derived. The form of such a transformation on normal deviates [X N(0, 1)] isY =a +bX +cX 2 +dX 3. Analytic and empirical validation of the method is demonstrated.This work was done while the author was at the University of Illinois at Champaign-Urbana.  相似文献   
17.
We assume that a judge's task is to categorize each ofN subjects into one ofr known classes. The design of primary interest is employed if the judge is presented withs groups, each containingr subjects, such that each group of sizer consists of exactly one subject of each of ther types. The probability distribution for the total number of correct choices is developed and used to test the null hypothesis that the judge is guessing in favor of the alternative that he or she is operating at a better than chance level. The power of the procedure is shown to be superior to two other procedures which appear in the literature.The authors are grateful for the suggestions of the referees and for computer funding provided by the Northeast Regional Data Center at the University of Florida.  相似文献   
18.
A BASIC program to generate values for variable-interval (VI) schedules of reinforcement is presented. A VI schedule should provide access to reinforcement with a constant probability over a time horizon. If the values in a VI schedule are calculated from an arithmetic progression, the probability of reinforcement is positively correlated with the time since the last reinforcer was delivered. Fleshler and Hoffman (1962) developed an iterative equation to calculate VI schedule values so that the probability of reinforcement remains constant. This easy-to-use program generates VI schedule values according to the Fleshler and Hoffman equation, randomizes the values, and saves the values in ASCII to a disk file.  相似文献   
19.
The frequency of social initiations and satisfaction with interactions in three dyads, each consisting of 1 student with disabilities and 1 nondisabled peer, were assessed under two alternating conditions: Condition 1 assessed the interactions around a set of four trained computer games, and Condition 2 assessed interactions when students were playing a set of four untrained computer games. Training was conducted with a multiple baseline design across participants and was followed by social interaction probes using an alternating treatments design. The results indicated greater frequencies of social initiations by 5 of 6 participants, higher degrees of game satisfaction by all participants, and equal or higher degrees of peer satisfaction by 5 of 6 participants when playing trained games in comparison to untrained games.  相似文献   
20.
Does the cultivation of liberty undermine communities of practice? The answer depends significantly on what is meant by the cultivation of liberty and on what is meant by a community of practice. On the question of community, the work of Rawls and Sandel serves as a starting point. I examine three conceptions — the instrumental, the sentimental and the constitutive — and attempt to illustrate them with examples of communities of practice. I argue that Sandel's criterion for distinguishing between the sentimental and constitutive conceptions of community does not do the work required of it. On the question of liberty undermining community, I argue that if liberty is taken as license then it is a threat both to communities and to practices, whereas if it is taken as independence then it threatens neither. Two conceptions of independence can be distinguished. One, which is central to liberal political theory, does not presuppose an account of the good; the other, which I argue is central to the flourishing of a community of practice, does. It presupposes that account of the good which is implicit in the end or telos of the practice concerned.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号