全文获取类型
收费全文 | 7661篇 |
免费 | 359篇 |
国内免费 | 126篇 |
专业分类
管理学 | 817篇 |
民族学 | 14篇 |
人才学 | 1篇 |
人口学 | 109篇 |
丛书文集 | 263篇 |
理论方法论 | 130篇 |
综合类 | 2085篇 |
社会学 | 330篇 |
统计学 | 4397篇 |
出版年
2024年 | 12篇 |
2023年 | 88篇 |
2022年 | 107篇 |
2021年 | 155篇 |
2020年 | 196篇 |
2019年 | 311篇 |
2018年 | 356篇 |
2017年 | 482篇 |
2016年 | 328篇 |
2015年 | 272篇 |
2014年 | 367篇 |
2013年 | 1288篇 |
2012年 | 514篇 |
2011年 | 340篇 |
2010年 | 296篇 |
2009年 | 284篇 |
2008年 | 329篇 |
2007年 | 337篇 |
2006年 | 300篇 |
2005年 | 294篇 |
2004年 | 261篇 |
2003年 | 198篇 |
2002年 | 148篇 |
2001年 | 155篇 |
2000年 | 148篇 |
1999年 | 109篇 |
1998年 | 99篇 |
1997年 | 66篇 |
1996年 | 55篇 |
1995年 | 52篇 |
1994年 | 40篇 |
1993年 | 23篇 |
1992年 | 37篇 |
1991年 | 17篇 |
1990年 | 16篇 |
1989年 | 15篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 5篇 |
1981年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有8146条查询结果,搜索用时 31 毫秒
41.
Philip L. H. Yu K. F. Lam S. M. Lo 《Journal of the Royal Statistical Society. Series A, (Statistics in Society)》2005,168(3):583-597
Summary. Factor analysis is a powerful tool to identify the common characteristics among a set of variables that are measured on a continuous scale. In the context of factor analysis for non-continuous-type data, most applications are restricted to item response data only. We extend the factor model to accommodate ranked data. The Monte Carlo expectation–maximization algorithm is used for parameter estimation at which the E-step is implemented via the Gibbs sampler. An analysis based on both complete and incomplete ranked data (e.g. rank the top q out of k items) is considered. Estimation of the factor scores is also discussed. The method proposed is applied to analyse a set of incomplete ranked data that were obtained from a survey that was carried out in GuangZhou, a major city in mainland China, to investigate the factors affecting people's attitude towards choosing jobs. 相似文献
42.
李刚俊 《电子科技大学学报(社会科学版)》2005,(6)
在考虑了操作机的关节极限、自碰撞和静态障碍物的情况下,从给定的初始位形出发,发现一条到末端效应器目标位置和姿态的相连可到达路径。方法给出了机器人操作机点到点逆运动学问题求解算法,利用碰撞算法实现了冗余度机器人运动规划,仿真验证了该方法的有效性,并表明了该方法具有较大的实用价值。 相似文献
43.
44.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。 相似文献
45.
Longitudinal data often contain missing observations, and it is in general difficult to justify particular missing data mechanisms, whether random or not, that may be hard to distinguish. The authors describe a likelihood‐based approach to estimating both the mean response and association parameters for longitudinal binary data with drop‐outs. They specify marginal and dependence structures as regression models which link the responses to the covariates. They illustrate their approach using a data set from the Waterloo Smoking Prevention Project They also report the results of simulation studies carried out to assess the performance of their technique under various circumstances. 相似文献
46.
Point processes are the stochastic models most suitable for describing physical phenomena that appear at irregularly spaced
times, such as the earthquakes. These processes are uniquely characterized by their conditional intensity, that is, by the
probability that an event will occur in the infinitesimal interval (t, t+Δt), given the history of the process up tot. The seismic phenomenon displays different behaviours on different time and size scales; in particular, the occurrence of
destructive shocks over some centuries in a seismogenic region may be explained by the elastic rebound theory. This theory
has inspired the so-called stress release models: their conditional intensity translates the idea that an earthquake produces
a sudden decrease in the amount of strain accumulated gradually over time along a fault, and the subsequent event occurs when
the stress exceeds the strength of the medium. This study has a double objective: the formulation of these models in the Bayesian
framework, and the assignment to each event of a mark, that is its magnitude, modelled through a distribution that depends
at timet on the stress level accumulated up to that instant. The resulting parameter space is constrained and dependent on the data,
complicating Bayesian computation and analysis. We have resorted to Monte Carlo methods to solve these problems. 相似文献
47.
Jerald F. Lawless 《Revue canadienne de statistique》2004,32(3):327-331
Oiler, Gomez & Calle (2004) give a constant sum condition for processes that generate interval‐censored lifetime data. They show that in models satisfying this condition, it is possible to estimate non‐parametrically the lifetime distribution based on a well‐known simplified likelihood. The author shows that this constant‐sum condition is equivalent to the existence of an observation process that is independent of lifetimes and which gives the same probability distribution for the observed data as the underlying true process. 相似文献
48.
Göran Kauermann Renate Ortlieb 《Journal of the Royal Statistical Society. Series C, Applied statistics》2004,53(2):355-367
Summary. The pattern of absenteeism in the downsizing process of companies is a topic in focus in economics and social science. A general question is whether employees who are frequently absent are more likely to be selected to be laid off or in contrast whether employees to be dismissed are more likely to be absent for the remaining time of their working contract. We pursue an empirical and microeconomic investigation of these theses. We analyse longitudinal data that were collected in a German company over several years. We fit a semiparametric transition model based on a mixture Poisson distribution for the days of absenteeism per month. Prediction intervals are considered and the primary focus is on the period of downsizing. The data reveal clear evidence for the hypothesis that employees who are to be laid off are more frequently absent before leaving the company. Interestingly, though, no clear evidence is seen that employees being selected to leave the company are those with a bad absenteeism profile. 相似文献
49.
In this paper we discuss a new theoretical basis for perturbation methods. In developing this new theoretical basis, we define the ideal measures of data utility and disclosure risk. Maximum data utility is achieved when the statistical characteristics of the perturbed data are the same as that of the original data. Disclosure risk is minimized if providing users with microdata access does not result in any additional information. We show that when the perturbed values of the confidential variables are generated as independent realizations from the distribution of the confidential variables conditioned on the non-confidential variables, they satisfy the data utility and disclosure risk requirements. We also discuss the relationship between the theoretical basis and some commonly used methods for generating perturbed values of confidential numerical variables. 相似文献
50.
遗传算法在入侵检测中的应用 总被引:4,自引:0,他引:4
介绍了基于模型推理和基于模型两种入侵检测系统,提出了一种新的基于智能体技术的入侵检测系统体系结构,解决了传统集中式入侵检测系统的弊病,将任务处理和数据分布到网络各个结点上,充分利用网络资源协同完成入侵检测任务;介绍了遗传算法在该系统中的应用,因系统安全的先验知识体现在对原始数据中有价值特征属性变量集的选择上,故利用遗传算法对特征属性变量子集的选择进行优化,找到相对最优的由特征向量表示的特征属性变量集,以降低入侵检测系统的负荷。 相似文献