首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8978篇
  免费   324篇
  国内免费   4篇
  2021年   82篇
  2020年   100篇
  2019年   159篇
  2018年   231篇
  2017年   213篇
  2016年   223篇
  2015年   170篇
  2014年   170篇
  2013年   800篇
  2012年   359篇
  2011年   343篇
  2010年   189篇
  2009年   184篇
  2008年   274篇
  2007年   276篇
  2006年   221篇
  2005年   253篇
  2004年   240篇
  2003年   213篇
  2002年   195篇
  2001年   264篇
  2000年   258篇
  1999年   178篇
  1998年   84篇
  1997年   71篇
  1996年   83篇
  1993年   76篇
  1992年   140篇
  1991年   147篇
  1990年   147篇
  1989年   117篇
  1988年   114篇
  1987年   117篇
  1986年   132篇
  1985年   125篇
  1984年   117篇
  1983年   100篇
  1979年   106篇
  1978年   82篇
  1977年   75篇
  1975年   71篇
  1974年   100篇
  1973年   107篇
  1972年   75篇
  1971年   76篇
  1970年   78篇
  1969年   79篇
  1968年   111篇
  1967年   87篇
  1966年   97篇
排序方式: 共有9306条查询结果,搜索用时 125 毫秒
1.
2.
Abstract: One claim about I , regularly made and almost universally endorsed, is that uses of the term are logically guaranteed to refer successfully (if they refer at all). The claim is only rarely formulated perspicuously or argued for. Such obscurity helps disguise the fact that those who profess to advance the claim actually turn out to support not a logical guarantee at all but merely high security through fortunate coincidence. This is not surprising. For we have no good reason to accept the claim – granted, any use of I is apt to refer successfully; but that can be explained by pragmatic features of its use. And we have some reason to reject the claim – it is notoriously difficult to see how genuine reference and guaranteed success do not exclude each other when considered as properties of the logic of any term.  相似文献   
3.
4.
5.
6.
7.
8.
9.
Although it is currently popular to model human associative learning using connectionist networks, the mechanism by which their output activations are converted to probabilities of response has received relatively little attention. Several possible models of this decision process are considered here, including a simple ratio rule, a simple difference rule, their exponential versions, and a winner-take-all network. Two categorization experiments that attempt to dissociate these models are reported. Analogues of the experiments were presented to a single-layer, feed-forward, delta-rule network. Only the exponential ratio rule and the winner-take-all architecture, acting on the networks' output activations that corresponded to responses available on test, were capable of fully predicting the mean response results. In addition, unlike the exponential ratio rule, the winner-take-all model has the potential to predict latencies. Further studies will be required to determine whether latencies produced under more stringent conditions conform to the model's predictions.  相似文献   
10.
It was predicted that trained observers would detect deception more accurately than untrained observers. More specifically, it was predicted that the highest deception detection accuracy would be found among trained observers judging the veracity of low self-monitors and unrehearsed liars, whereas the lowest detection accuracy would be found among untrained observers judging the veracity of high self-monitors and rehearsed deceivers. It also was hypothesized that the discrepancy between observers‘actual ability to detect deception and their certainty in the accuracy of their judgments would be smaller for trained observers than for untrained observers. Observers trained to detect deception used six behavioral cues based on research by deTurck and Miller (1985): (a) message duration, (b) response latency, (c) adaptors, (d) pauses, (e) nonfluencies, and (f) hand gestures. Results confirmed both hypotheses.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号