首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4079篇
  免费   2214篇
  国内免费   64篇
  2024年   3篇
  2023年   34篇
  2022年   27篇
  2021年   159篇
  2020年   186篇
  2019年   614篇
  2018年   503篇
  2017年   618篇
  2016年   590篇
  2015年   487篇
  2014年   418篇
  2013年   558篇
  2012年   287篇
  2011年   255篇
  2010年   195篇
  2009年   172篇
  2008年   118篇
  2007年   155篇
  2006年   147篇
  2005年   127篇
  2004年   102篇
  2003年   107篇
  2002年   99篇
  2001年   91篇
  2000年   71篇
  1999年   42篇
  1998年   11篇
  1997年   10篇
  1996年   11篇
  1995年   19篇
  1994年   5篇
  1993年   11篇
  1992年   7篇
  1991年   7篇
  1990年   6篇
  1989年   12篇
  1988年   11篇
  1987年   5篇
  1986年   5篇
  1985年   4篇
  1984年   3篇
  1983年   6篇
  1982年   6篇
  1981年   4篇
  1980年   4篇
  1979年   15篇
  1978年   9篇
  1977年   9篇
  1976年   7篇
  1974年   2篇
排序方式: 共有6357条查询结果,搜索用时 15 毫秒
141.
In a laboratory simulation, a single-subject design was used to examine the effects of two types of social influence on children's eyewitness testimony, which has not been the subject of systematic behavioral analyses. This study replicates and extends findings from group-comparison studies, and shows that a topic of pressing social importance is amenable to analysis at the individual level, and therefore, potentially, to a behavioral analysis.  相似文献   
142.
Over the past decade, behavior analysts have increasingly used the term establishing operation (EO) to refer to environmental events that influence the behavioral effects of operant consequences. Nonetheless, some elements of current terminology regarding EOs may interfere with applied behavior analysts' efforts to predict, control, describe, and understand behavior. The present paper (a) describes how the current conceptualization of the EO is in need of revision, (b) suggests alternative terms, including the generic term motivating operation (MO), and (c) provides examples of MOs and their behavioral effects using articles from the applied behavior analysis literature.  相似文献   
143.
Competing theories regarding the effects of delivering periodic response-independent reinforcement (more accurately, response-independent points exchanged for money) on a baseline rate of behavior were evaluated in human subjects. Contiguity theory holds that these events decrease target responding because incompatible behavior is adventitiously strengthened when the point deliveries follow target behavior closely in time. Matching theory holds that response-independent points, like any other alternative reinforcer, should reduce target responding. On this view, temporal contiguity between target responding and response-independent point delivery is unimportant. In our experiment, four different responses (moving a joystick in four different directions) were reinforced with points exchangeable for money according to four independent variable-interval schedules. Different schedules of point delivery were then superimposed on these baselines. When all superimposed point deliveries occurred immediately after one of the four responses (the target response), time allocated to target responding increased. When the superimposed point deliveries could be delivered at any time, time allocated to target responding declined and other behavior increased. When superimposed points could never immediately follow target responses, time allocated to target responding decreased further and other behavior or pausing predominated. The findings underscore the contribution of temporal contiguity in the effects of response-independent deliveries of food, money, points, etc.  相似文献   
144.
Tucker3 hierarchical classes analysis   总被引:1,自引:0,他引:1  
This paper presents a new model for binary three-way three-mode data, called Tucker3 hierarchical classes model (Tucker3-HICLAS). This new model generalizes Leenen, Van Mechelen, De Boeck, and Rosenberg's (1999) individual differences hierarchical classes model (INDCLAS). Like the INDCLAS model, the Tucker3-HICLAS model includes a hierarchical classification of the elements of each mode, and a linking structure among the three hierarchies. Unlike INDCLAS, Tucker3-HICLAS (a) does not restrict the hierarchical classifications of the three modes to have the same rank, and (b) allows for more complex linking structures among the three hierarchies. An algorithm to fit the Tucker3-HICLAS model is described and evaluated in an extensive simulation study. An application of the model to hostility data is discussed.The first author is a Research Assistant of the Fund for Scientific Research-Flanders (Belgium). The research reported in this paper was partially supported by the Research Council of K.U. Leuven (GOA/2000/02). We are grateful to Kristof Vansteelandt for providing us with an interesting data set.  相似文献   
145.
This paper informally summarizes a two-day symposium held at the U.S. National Academy of Sciences in Washington, D.C., September 5–6, 2002. The issue was to what extent the progress of science and societal capacity for continued technological innovation are threatened by excessive protection of intellectual property. Excessive protection creates disadvantages not only for scientists and inventors but also for educators/students and for librarians/clientele. Speakers from a variety of disciplines and institutions agreed unanimously that scientific and technological progress is, indeed, under serious threat. Various opinions were expressed about the degree of threat, currently and prospectively, as well as what counter-measures are best suited to resist undue restrictions on creative uses of scientific and technical data and information. This summary is based entirely on the author’s notes from the symposium, and the commentary offered is his alone. My apologies to the speakers if this paper does not accurately reflect the primary intent of their presentations. The “Suggested Readings” offered at the end are not specific to the speakers’ statements but rather are offered as a general resource to aid further research. The definitive record of the symposium is planned to be available from the National Academies Press as a Proceedings publication in the summer of 2003. John Gardenier is an independent researcher, ethicist and science writer.  相似文献   
146.
Using an arbitrary response, we evaluated fixed-time (FT) schedules that were either similar or dissimilar to a baseline (response-dependent) reinforcement schedule and extinction. Results suggested that both FT schedules and extinction resulted in decreased responding. However, FT schedules were more effective in reducing response rates if the FT reinforcer rate was dissimilar to baseline reinforcer rates. Possible reasons for this difference were evaluated with data analysis methods designed to identify adventitious response-reinforcer relations.  相似文献   
147.
Pigeons' key pecks produced food under second-order schedules of token reinforcement, with light-emitting diodes serving as token reinforcers. In Experiment 1, tokens were earned according to a fixed-ratio 50 schedule and were exchanged for food according to either fixed-ratio or variable-ratio exchange schedules, with schedule type varied across conditions. In Experiment 2, schedule type was varied within sessions using a multiple schedule. In one component, tokens were earned according to a fixed-ratio 50 schedule and exchanged according to a variable-ratio schedule. In the other component, tokens were earned according to a variable-ratio 50 schedule and exchanged according to a fixed-ratio schedule. In both experiments, the number of responses per exchange was varied parametrically across conditions, ranging from 50 to 400 responses. Response rates decreased systematically with increases in the fixed-ratio exchange schedules, but were much less affected by changes in the variable-ratio exchange schedules. Response rates were consistently higher under variable-ratio exchange schedules than tinder comparable fixed-ratio exchange schedules, especially at higher exchange ratios. These response-rate differences were due both to greater pre-ratio pausing and to lower local rates tinder the fixed-ratio exchange schedules. Local response rates increased with proximity to food under the higher fixed-ratio exchange schedules, indicative of discriminative control by the tokens.  相似文献   
148.
The effects of manipulations of response requirement, intertrial interval (ITI), and psychoactive drugs (ethanol, phencyclidine, and d-amphetamine) on lever choice under concurrent fixed-ratio schedules were investigated in rats. Responding on the "certain' lever produced three 45-mg pellets, whereas responding on the "risky" lever produced either 15 pellets (p = .33) or no pellets (p .67). Rats earned all food during the session, which ended after 12 forced trials and 93 choice trials or 90 min, whichever occurred first. When the response requirement was increased from 1 to 16 and the ITI was 20 s, percentage of risky choice was inversely related to fixed-ratio value. When only a single response was required but the ITI was manipulated between 20 and 120 s (with maximum session duration held constant), percentage of risky choice was directly related to length of the ITI. The effects of the drugs were investigated first at an ITI of 20 s, when risky choice was low for most rats, and then at an ITI of 80 s, when risky choice was higher for most rats. Ethanol usually decreased risky choice. Phencyclidine did not usually affect risky choice when the ITI was 20 s but decreased it in half the rats when the ITI was 80 s. For d-amphetamine, the effects appeared to he related to baseline probability of risky choice; that is, low probabilities were increased and high probabilities were decreased. Although increase in risky choice as a function of the ITI is at variance with previous ITI data, it is consistent with foraging data showing that risk aversion decreases as food availability decreases. The pharmacological manipulations showed that drug effects on risky choice may be influenced by the baseline probability of risky choice, just as drug effects can be a function of baseline response rate.  相似文献   
149.
In this paper, the constrained maximum likelihood estimation of a two-level covariance structure model with unbalanced designs is considered. The two-level model is reformulated as a single-level model by treating the group level latent random vectors as hypothetical missing-data. Then, the popular EM algorithm is extended to obtain the constrained maximum likelihood estimates. For general nonlinear constraints, the multiplier method is used at theM-step to find the constrained minimum of the conditional expectation. An accelerated EM gradient procedure is derived to handle linear constraints. The empirical performance of the proposed EM type algorithms is illustrated by some artifical and real examples.This research was supported by a Hong Kong UCG Earmarked Grant, CUHK 4026/97H. We are greatly indebted to D.E. Morisky and J.A. Stein for the use of their AIDS data in our example. We also thank the Editor, two anonymous reviewers, W.Y. Poon and H.T. Zhu for constructive suggestions and comments in improving the paper. The assistance of Michael K.H. Leung and Esther L.S. Tam is gratefully acknowledged.  相似文献   
150.

Background

Therapist self‐disclosure (TSD) usage varies greatly among different psychotherapy orientations. Anecdotal evidence seems to suggest that there are reasons for its judicious use, and a small number of researchers have proposed guidelines for how TSD should be used to help therapists across psychotherapy models make decisions around disclosure. However, there is almost no literature specifically exploring how cognitive behaviour therapy (CBT) practitioners make decisions around employing TSD within the CBT framework.

Objective

This study aimed to explore how experienced CBT practitioners make decisions around TSD.

Method

In‐depth qualitative interviews were conducted with six clinical psychologists who were trained and experienced in CBT, and the interviews were analysed thematically.

Results

There were two overarching themes in terms of how they made decisions to self‐disclose: (A) the rules for TSD use, which included sub‐themes (a) it must have a clear purpose, (b) it must fit, (c) the therapist must maintain boundaries, and (d) the therapist must always reflect on his/her use of TSD; and (B) how they use TSD, which included subthemes of (a) using it as a tool for change and (b) using it to manage the therapeutic relationship.

Conclusion

Participants’ decisions on whether or not to self‐disclose were strongly influenced by the CBT model, and this process went beyond what is suggested in the transtheoretical literature. Understanding this process may lead to the development of CBT‐specific guidelines for making TSD‐related decisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号