首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10953篇
  免费   24篇
管理学   1536篇
民族学   101篇
人口学   2439篇
理论方法论   577篇
综合类   289篇
社会学   4816篇
统计学   1219篇
  2023年   5篇
  2021年   6篇
  2020年   16篇
  2019年   21篇
  2018年   1670篇
  2017年   1671篇
  2016年   1084篇
  2015年   49篇
  2014年   62篇
  2013年   153篇
  2012年   338篇
  2011年   1155篇
  2010年   1054篇
  2009年   794篇
  2008年   841篇
  2007年   1011篇
  2006年   17篇
  2005年   244篇
  2004年   275篇
  2003年   220篇
  2002年   99篇
  2001年   13篇
  2000年   18篇
  1999年   11篇
  1998年   14篇
  1997年   11篇
  1996年   34篇
  1995年   5篇
  1994年   3篇
  1993年   5篇
  1992年   3篇
  1991年   7篇
  1990年   6篇
  1989年   3篇
  1988年   10篇
  1987年   4篇
  1986年   2篇
  1985年   6篇
  1984年   7篇
  1983年   3篇
  1981年   6篇
  1980年   5篇
  1979年   3篇
  1977年   1篇
  1976年   2篇
  1972年   1篇
  1971年   2篇
  1970年   2篇
  1968年   2篇
  1966年   1篇
排序方式: 共有10000条查询结果,搜索用时 484 毫秒
101.
This paper investigates how individuals evaluate delayed outcomes with risky realization times. Under the discounted expected utility (DEU) model, such evaluations depend only on intertemporal preferences. We obtain several testable hypotheses using the DEU model as a benchmark and test these hypotheses in three experiments. In general, our results show that the DEU model is a poor predictor of intertemporal choice behavior under timing risk. We found that individuals are averse to timing risk and that they evaluate timing lotteries in a rank-dependent fashion. The main driver of timing risk aversion is nothing but probabilistic risk aversion that stems from the nonlinear treatment of probabilities.  相似文献   
102.
Unfortunately many of the numerous algorithms for computing the comulative distribution function (cdf) and noncentrality parameter of the noncentral F and beta distributions can produce completely incorrect results as demonstrated in the paper by examples. Existing algorithms are scrutinized and those parts that involve numerical difficulties are identified. As a result, a pseudo code is presented in which all the known numerical problems are resolved. This pseudo code can be easily implemented in programming language C or FORTRAN without understanding the complicated mathematical background. Symbolic evaluation of a finite and closed formula is proposed to compute exact cdf values. This approach makes it possible to check quickly and reliably the values returned by professional statistical packages over an extraordinarily wide parameter range without any programming knowledge. This research was motivated by the fact that a very useful table for calculating the size of detectable effects for ANOVA tables contains suspect values in the region of large noncentrality parameter values compared to the values obtained by Patnaik’s 2-moment central-F approximation. The cause is identified and the corrected form of the table for ANOVA purposes is given. The accuracy of the approximations to the noncentral-F distribution is also discussed. The authors wish to thank Mr. Richárd Király for his preliminary work. The authors are grateful to the Editor and Associate Editor of STCO and the unknown reviewers for their helpful suggestions.  相似文献   
103.
104.
Supporting processes of belonging in supervision and coachingThe contemporary employee has to cope with frequent changes. Not only does he lose his familiar environment, he also has to find ways to familiarize himself with new places and to develop a fresh sense of belonging. This process can be understood and facilitated by interpreting the German concept of “Heimat“ as something we have to create ourselves. First experiences demonstrate the usefulness of this approach in coaching processes.  相似文献   
105.
In this paper, the task of determining expected values of sample moments, where the sample members have been selected based on noisy information, is considered. This task is a recurring problem in the theory of evolution strategies. Exact expressions for expected values of sums of products of concomitants of selected order statistics are derived. Then, using Edgeworth and Cornish-Fisher approximations, explicit results that depend on coefficients that can be determined numerically are obtained. While the results are exact only for normal populations, it is shown experimentally that including skewness and kurtosis in the calculations can yield greatly improved results for other distributions.  相似文献   
106.
107.
Author of the highly acclaimed Borrowed Time: An AIDS Memoir (1988) and winner of the 1992 National Book Award for his autobiography Becoming a Man: Half a Life Story, Paul Monette died of complications from AIDS in Los Angeles on February 12, 1995. His most recent work, Last Watch of the Night: Essays Too Personal and Otherwise (1994), is his third volume in a trilogy of autobiographical writing on growing up gay, coming-out, and living with AIDS. A graduate of Phillips Academy and Yale University, Monette received a number of awards for his writing and his work as an outspoken voice in the battle against AIDS, including the National Book Award, three Lambda Literary awards, the PEN Center West Freedom to Write Award, and three honorary doctorate degrees, from Wesleyan University, the City University of New York, and the State University of New York at Oswego. A memorial service was held for Monette on Sunday, February 19, 1995, at the Directors Guild of America on Sunset Boulevard in Los Angeles. Paul Monette was 49.  相似文献   
108.
Conclusion In this paper, I have briefly discussed multiple family group therapy as an approach used with state-hospitalized adolecents and their parents. This approach was considered as best meeting the therapeutic needs of the seriously disturbed adolescent and his hard-to-reach family. Parents and adolescents were receptive to and cooperative with the multiple family group approach. This approach was one amendable to an understaffed, underbudgeted state hospital unit and is looked upon as an appropriate, a possible, and a successful treatment method. In addition, this approach was appropriate and successful with two groups which, culturally speaking, were diametrically opposed. I have outlined briefly some of the operating differences within the two groups. The overwhelming similarities in the approaches with these groups, however, illustrates the approach's general applicability.  相似文献   
109.
In the binary single constraint Knapsack Problem, denoted KP, we are given a knapsack of fixed capacity c and a set of n items. Each item j, j = 1,...,n, has an associated size or weight wj and a profit pj. The goal is to determine whether or not item j, j = 1,...,n, should be included in the knapsack. The objective is to maximize the total profit without exceeding the capacity c of the knapsack. In this paper, we study the sensitivity of the optimum of the KP to perturbations of either the profit or the weight of an item. We give approximate and exact interval limits for both cases (profit and weight) and propose several polynomial time algorithms able to reach these interval limits. The performance of the proposed algorithms are evaluated on a large number of problem instances.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号