首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1809篇
  免费   11篇
  国内免费   11篇
教育   1278篇
科学研究   125篇
各国文化   36篇
体育   152篇
综合类   10篇
文化理论   31篇
信息传播   199篇
  2023年   3篇
  2022年   13篇
  2021年   45篇
  2020年   54篇
  2019年   89篇
  2018年   144篇
  2017年   125篇
  2016年   139篇
  2015年   75篇
  2014年   75篇
  2013年   328篇
  2012年   95篇
  2011年   58篇
  2010年   48篇
  2009年   54篇
  2008年   58篇
  2007年   38篇
  2006年   43篇
  2005年   52篇
  2004年   19篇
  2003年   17篇
  2002年   19篇
  2001年   18篇
  2000年   19篇
  1999年   16篇
  1998年   11篇
  1997年   9篇
  1996年   8篇
  1995年   9篇
  1994年   8篇
  1993年   11篇
  1992年   8篇
  1991年   6篇
  1990年   9篇
  1989年   11篇
  1988年   10篇
  1987年   6篇
  1986年   8篇
  1985年   12篇
  1984年   5篇
  1983年   8篇
  1982年   6篇
  1981年   6篇
  1980年   6篇
  1979年   6篇
  1977年   4篇
  1973年   4篇
  1969年   2篇
  1965年   2篇
  1964年   2篇
排序方式: 共有1831条查询结果,搜索用时 15 毫秒
1.
In this paper, the authors discuss their grounded research carried out with teachers about the wellbeing of teachers. They explore the importance of making the concept of wellbeing more intimate and consider hedonic and eudaimonic ways of looking at wellbeing. They present a model of layered reflection which illuminates key factors that have an impact on the wellbeing of teachers.  相似文献   
2.
Moral minds     
Steve Clarke 《Minerva》2008,46(1):147-150
  相似文献   
3.
We theorize about the strategic alignment of computing with organizational mission, using the Commonwealth of Pennsylvania's efforts to pursue digital government initiatives as evidence. To do this we draw on a decade (1995–2004) of changes in Pennsylvania to characterize how a state government shifts from an organizational to an enterprise perspective regarding computing. We document and analyze the strategic and operational aspects of a series of information and communications technology (ICT) planning efforts to highlight the nature and roles of strategic alignment used to achieve this transition. Findings from this analysis mark the importance of combining several approaches to strategic planning regarding the adoption and application of ICT.  相似文献   
4.
5.
The digital shift has provided easy access to academic library users, and yet, the usage of archival collections continues to be low. At the same time, the need for innovation in library services for cultural heritage scholarship and its advancement is emerging. This paper outlines a library-led service-learning program that connects students with lighthouse artifacts, archival collections, scholars in global academia, and wider communities. Student engagement cases are provided to illustrate the way in which the librarian utilizes the Framework of Information Literacy for Higher Education by ACRL to work closely with students. These cases also demonstrate how students can contribute to knowledge creation and preservation efforts for a specific cultural heritage topic that is not static, but which keeps receiving new contributions or additions to the depository. Thus, this paper is an answer to the ACRL's call for pilot projects to be assessed and shared with the wider community of academic librarians and support staff. It also builds on emerging roles for academic libraries like engaged learning. Librarians must move beyond simply seeing themselves as partners. Instead, librarians should see themselves as prime facilitators that co-create and co-develop cultural heritage research and historical projects by connecting actors and resources more effectively than any single actor can do alone.  相似文献   
6.
This study investigates the convergence of two bibliometric approaches to the measurement of interdisciplinary research: one based on analyzing disciplinary diversity in the reference list of publications, the other based on the disciplinary diversity of authors of publications. In particular we measure the variety, balance, disparity and integrated diversity index of, respectively, single-author, multi-author single-field, and multi-author multi-field publications. We find that, in general, the diversity of the reference list grows with the number of fields reflected in a paper’s authors’ list and, to a lesser extent, with the number of authors being equal the number of fields. Further, we find that when fields belonging to different disciplines are reflected in the authors’ list, the disparity in the reference list is higher than in the case of fields belonging to the same discipline. However, this general tendency varies across disciplines, and noticeable exceptions are found at individual paper level.  相似文献   
7.
赋权少数族裔学生:一个干预框架   总被引:1,自引:0,他引:1  
吉姆康明斯提出了一个理论框架来分析少数族裔学生学业失败的原因,以及之前曾尝试过的,诸如补偿教育和双语教育这样的教育改革相对缺乏成功的原因。这些尝试之所以没有成功是因为教育者和少数族裔学生之间的关系以及学校和少数族裔社区的关系都没有得到显著的改变。研究旨在为教育者提供一些改变这些关系,从而赋权学生,使得学生在学业上取得成功的方法。  相似文献   
8.
In collaborative problem solving, children produce and evaluate arguments for proposals. We investigated whether 3- and 5-year-olds (N = 192) can produce and evaluate arguments against those arguments (i.e., counter-arguments). In Study 1, each child within a peer dyad was privately given a reason to prefer one over another solution to a task. One child, however, was given further information that would refute the reasoning of their partner. Five-year-olds, but not 3-year-olds, identified and produced valid and relevant counter-arguments. In Study 2, 3-year-olds were given discourse training (discourse that contrasted valid and invalid counter-arguments) and then given the same problem-solving tasks. After training, 3-year-olds could also identify and produce valid and relevant counter-arguments. Thus, participating in discourse about reasons facilitates children’s counter-argumentation.  相似文献   
9.
Test security is not an end in itself; it is important because we want to be able to make valid interpretations from test scores. In this article, I propose a framework for comprehensive test security systems: prevention, detection, investigation, and resolution. The article discusses threats to test security, roles and responsibilities, rigorous training for everyone involved in testing, and an evaluation of current practices in test security. I call on everyone responsible for testing programs—the Association of Test Publishers, Council of Chief State School Officers, National Council on Measurement in Education, U.S. Department of Education, and state assessment program managers, their vendors, and the research community—to collaborate on guidelines and practices for security violation prevention, detection, investigation, and resolution.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号