首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1661篇
  免费   62篇
  国内免费   13篇
管理学   84篇
劳动科学   5篇
民族学   36篇
人口学   31篇
丛书文集   392篇
理论方法论   71篇
综合类   803篇
社会学   126篇
统计学   188篇
  2023年   7篇
  2022年   23篇
  2021年   25篇
  2020年   28篇
  2019年   24篇
  2018年   40篇
  2017年   42篇
  2016年   42篇
  2015年   54篇
  2014年   70篇
  2013年   105篇
  2012年   84篇
  2011年   113篇
  2010年   119篇
  2009年   117篇
  2008年   98篇
  2007年   108篇
  2006年   126篇
  2005年   92篇
  2004年   51篇
  2003年   56篇
  2002年   66篇
  2001年   51篇
  2000年   30篇
  1999年   30篇
  1998年   20篇
  1997年   23篇
  1996年   16篇
  1995年   7篇
  1994年   8篇
  1993年   12篇
  1992年   9篇
  1991年   2篇
  1990年   6篇
  1989年   5篇
  1988年   5篇
  1987年   3篇
  1986年   5篇
  1985年   2篇
  1984年   5篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1980年   1篇
排序方式: 共有1736条查询结果,搜索用时 15 毫秒
41.
新加坡中国大陆新移民现状浅析   总被引:1,自引:0,他引:1  
在日益全球化的今天,国际移民活动正以前所未有的规模进行着,其原因主要是地区经济发展不平衡导致发展中国家的人口大量移居发达国家。源自中国大陆的新移民是国际移民的一个重要组成部分。据估计,20世纪70年代中期至90年代中期华人新移民的人数至少在240万以上,其中源自大陆的  相似文献   
42.
本文根据1250家上市公司所公布的"自查报告和整改计划",重点从大股东、董事会/监事会、经理层以及投资者法律保护等四个方面对"自查报告和整改计划"的调查问题进行全面归纳、整理、分解和剖析,通过统计分析和理论文献对比,综合反映出目前我国上市公司治理现状和问题.调查分析结果表明,虽然我国目前已基本上建立了一整套与上市公司治理相关的法律法规,上市公司在大股东、董事会、经理层和投资者保护等方面的行为得到了一定的规范约束.但是,我国上市公司治理仍然处在不断完善过程中,如何强化大股东的信托义务和法律责任,从根本上解决大股东侵占中小股东利益的问题、保证董事会制度的独立性和有效性、培育经理人市场,积极推进股权激励机制、落实投资者法律保护制度等成为今后完善我国上市公司治理的重要任务.  相似文献   
43.
我国全要素能源效率的测度与分析   总被引:7,自引:0,他引:7  
考虑到能源与资本、劳动力等投入要素间普遍存在的替代效应,本文通过全要素能源效率指标考察我国能源利用水平的时空变化特征,并利用计量模型分析全要素生产率各分解部分对能源效率的影响作用。研究表明:我国总体及区域内的全要素能源效率自2001年起出现了退化现象,区域间能源效率的差异性较为显著,且有扩大趋势;全要素能源效率与全要素生产率之间关系密切,技术进步、纯技术效率和规模效率对能源效率的改善均具有促进作用,软技术的贡献甚至已超越了传统科技进步的功效。  相似文献   
44.
Contemporary theories on leadership development emphasize the importance of having a leader identity in building leadership skills and functioning effectively as leaders. We build on this approach by unpacking the role leader identity plays in the leader emergence process. Taking the perspective that leadership is a dynamic social process between group members, we propose a social network-based process model whereby leader role identity predicts network centrality (i.e., betweenness and indegree), which then contributes to leader emergence. We test our model using a sample of 88 cadets participating in a leadership development training course. In support of our model, cadets who possess a stronger leader role identity at the beginning of the course were more likely to emerge as leaders. However this relationship was only mediated by one form of network centrality, indegree centrality, reflecting one's ability to build relationships within one's group. Implications for research and practice are discussed.  相似文献   
45.
We study auctions for a set of commonly‐ranked items where each buyer has unit demand. This setting has promising applications in areas such as keyword auctions in the search engine advertising industry, the sale of quality‐ranked raw materials, etc. An auction mechanism suitable for this setting is the simultaneous pooled auction (SPA), where each bidder simultaneously submits a single bid and is allocated an object based on the rank of his bid among all the bids. We study how to improve the seller's expected revenue by enforcing a reserve price in an SPA. We find that the use of an appropriate reserve price may significantly increase the seller's revenue, especially when the number of items for sale is relatively large compared to the number of participating bidders. One inherent problem in the SPA is that some bidders may incur ex post losses; that is, they pay more than what they value the received objects. We propose a tailored VCG mechanism that generates the same expected revenue as the SPA does, while bidders do not incur any ex post loss. We also discuss the potential applications of this research to keyword auctions.  相似文献   
46.
Customer behavior modeling has been gaining increasing attention in the operations management community. In this paper we review current models of customer behavior in the revenue management and auction literatures and suggest several future research directions.  相似文献   
47.
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future.  相似文献   
48.
In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time‐series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time‐series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two‐month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time‐series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014.  相似文献   
49.
Perceived organizational support (POS) is viewed as an important explanatory framework for understanding the relationship between employees and the workplace, and is regarded by some researchers as central in understanding job-related attitudes and behaviors of employees. However, less research has taken into account the role of organizational identification, which reflects how individuals define the self with respect to their organization, as a potential influence on such relationships. Drawing on a cross-organizational sample of 238 subordinate-supervisor dyads from the People’s Republic of China, we examined whether organizational identification mediates the effect of perceived organizational support (POS) on work outcomes including turnover intentions, work performance, and organizational citizenship behavior (OCB). Results from the current study showed that organizational identification fully mediates the relation of POS to OCB-directed to individuals, and partially mediates relations between POS and other work outcomes (turnover intention, work performance, OCB-directed to organization). Implications for management theory and practice are discussed.  相似文献   
50.
Human error is one of the significant factors contributing to accidents. Traditional human error probability (HEP) studies based on fuzzy number concepts are one of the contributions addressing such a problem. It is particularly useful under circumstances where the lack of data exists. However, the degree of the discriminability of such studies may be questioned when applied under circumstances where experts have adequate information and specific values can be determined in the abscissa of the membership function of linguistic terms, that is, the fuzzy data of each scenario considered are close to each other. In this article, a novel HEP assessment aimed at solving such a difficulty is proposed. Under the framework, the fuzzy data are equipped with linguistic terms and membership values. By establishing a rule base for data combination, followed by the defuzzification and HEP transformation processes, the HEP results can be acquired. The methodology is first examined using a test case consisting of three different scenarios of which the fuzzy data are close to each other. The results generated are compared with the outcomes produced from the traditional fuzzy HEP studies using the same test case. It is concluded that the methodology proposed in this study has a higher degree of the discriminability and is capable of providing more reasonable results. Furthermore, in situations where the lack of data exists, the proposed approach is also capable of providing the range of the HEP results based on different risk viewpoints arbitrarily established as illustrated using a real‐world example.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号