首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10408篇
  免费   1篇
管理学   1499篇
民族学   99篇
人口学   2407篇
理论方法论   484篇
综合类   286篇
社会学   4443篇
统计学   1191篇
  2018年   1657篇
  2017年   1651篇
  2016年   1074篇
  2015年   33篇
  2014年   34篇
  2013年   32篇
  2012年   318篇
  2011年   1145篇
  2010年   1044篇
  2009年   783篇
  2008年   819篇
  2007年   995篇
  2005年   224篇
  2004年   250篇
  2003年   212篇
  2002年   81篇
  2001年   5篇
  2000年   10篇
  1999年   5篇
  1998年   1篇
  1996年   28篇
  1988年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
181.
In 1984, Gabow and Tarjan provided a very elegant and fast algorithm for the following problem: given a matroid defined on a red and blue colored ground set, determine a basis of minimum cost among those with k red elements, or decide that no such basis exists. In this paper, we investigate extensions of this problem from ordinary matroids to the more general notion of poset matroids which take precedence constraints on the ground set into account. We show that the problem on general poset matroids becomes -hard, already if the underlying partially ordered set (poset) consists of binary trees of height two. On the positive side, we present two algorithms: a pseudopolynomial one for integer polymatroids, i.e., the case where the poset consists of disjoint chains, and a polynomial algorithm for the problem to determine a minimum cost ideal of size l with k red elements, i.e., the uniform rank-l poset matroid, on series-parallel posets.  相似文献   
182.
In the facility location game on a line, there are some agents who have fixed locations on the line where an obnoxious facility will be placed. The objective is to maximize the social welfare, e.g., the sum of distances from the facility to all agents. On collecting location information, agents may misreport the locations so as to stay far away from the obnoxious facility. In this paper, strategy-proof mechanisms are designed and the approximation ratio is used to measure the performances of the strategy-proof mechanisms. Two objective functions, maximizing the sum of squares of distances (maxSOS) and maximizing the sum of distances (maxSum), have been considered. For maxSOS, a randomized 5/3-approximated strategy-proof mechanism is proposed, and the lower bound of the approximation ratio is proved to be at least 1.042. For maxSum, the lower bound of the approximation ratio of the randomized strategy-proof mechanism is proved to be 1.077. Moreover, a general model is considered that each agent may have multiple locations on the line. For the objective functions maxSum and maxSOS, both deterministic and randomized strategy-proof mechanisms are investigated, and the deterministic mechanisms are shown to be best possible.  相似文献   
183.
This paper studies the large-scale stochastic job shop scheduling problem with general number of similar jobs, where the processing times of the same step are independently drawn from a known probability distribution, and the objective is to minimize the makespan. For the stochastic problem, we introduce the fluid relaxation of its deterministic counterpart, and define a fluid schedule for the fluid relaxation. By tracking the fluid schedule, a policy is proposed for the stochastic job shop scheduling problem. The expected value of the gap between the solution produced by the policy and the optimal solution is proved to be O(1), which indicates the policy is asymptotically optimal in expectation.  相似文献   
184.
This paper studies the continuous connected 2-facility location problem (CC2FLP) in trees. Let \(T = (V, E, c, d, \ell , \mu )\) be an undirected rooted tree, where each node \(v \in V\) has a weight \(d(v) \ge 0\) denoting the demand amount of v as well as a weight \(\ell (v) \ge 0\) denoting the cost of opening a facility at v, and each edge \(e \in E\) has a weight \(c(e) \ge 0\) denoting the cost on e and is associated with a function \(\mu (e,t) \ge 0\) denoting the cost of opening a facility at a point x(et) on e where t is a continuous variable on e. Given a subset \(\mathcal {D} \subseteq V\) of clients, and a subset \(\mathcal {F} \subseteq \mathcal {P}(T)\) of continuum points admitting facilities where \(\mathcal {P}(T)\) is the set of all the points on edges of T, when two facilities are installed at a pair of continuum points \(x_1\) and \(x_2\) in \(\mathcal {F}\), the total cost involved in CC2FLP includes three parts: the cost of opening two facilities at \(x_1\) and \(x_2\), K times the cost of connecting \(x_1\) and \(x_2\), and the cost of all the clients in \(\mathcal {D}\) connecting to some facility. The objective is to open two facilities at a pair of continuum points in \(\mathcal {F}\) to minimize the total cost, for a given input parameter \(K \ge 1\). This paper focuses on the case of \(\mathcal {D} = V\) and \(\mathcal {F} = \mathcal {P}(T)\). We first study the discrete version of CC2FLP, named the discrete connected 2-facility location problem (DC2FLP), where two facilities are restricted to the nodes of T, and devise a quadratic time edge-splitting algorithm for DC2FLP. Furthermore, we prove that CC2FLP is almost equivalent to DC2FLP in trees, and develop a quadratic time exact algorithm based on the edge-splitting algorithm. Finally, we adapt our algorithms to the general case of \(\mathcal {D} \subseteq V\) and \(\mathcal {F} \subseteq \mathcal {P}(T)\).  相似文献   
185.
This study focuses on the issues relating to the implementation of management accounting systems in complex settings such as archeological sites. The aim is to understand the conditions under which the implementation of performance management systems (PMS) may enable cultural organizations to fulfil their multiple objectives and the factors which play a crucial role in such dynamics. Focusing on the Herculaneum Conservation Project (HCP) the study explains how PMS came to be implemented having been made acceptable to all parties involved. The Middle Range Theory as developed by Broadbent and Laughlin (Accounting control and controlling accounting: interdisciplinary and critical perspectives, Bingley, Emerald, 2013) was utilized to explore how the PMS change took place in the HCP, and focus on the factors influencing this process. The findings reveal that the change in the PMS benefited from the involvement of a multidisciplinary Specialist Work Group. This involvement reduced the natural tendency to resist the forces of change and increased the commitment of the various groups of stakeholders to the new culture. The findings reveal how PMS were developed in the context of a multifaceted approach to change, allowing us to draw both theoretical and practical lessons that may be brought to bear in other complex contexts.  相似文献   
186.
In a graph \(G=(V,E)\), a set \(D \subseteq V\) is said to be a dominating set of G if for every vertex \(u\in V{\setminus }D\), there exists a vertex \(v\in D\) such that \(uv\in E\). A secure dominating set of the graph G is a dominating set D of G such that for every \(u\in V{\setminus }D\), there exists a vertex \(v\in D\) such that \(uv\in E\) and \((D{\setminus }\{v\})\cup \{u\}\) is a dominating set of G. Given a graph G and a positive integer k, the secure domination problem is to decide whether G has a secure dominating set of cardinality at most k. The secure domination problem has been shown to be NP-complete for chordal graphs via split graphs and for bipartite graphs. In Liu et al. (in: Proceedings of 27th workshop on combinatorial mathematics and computation theory, 2010), it is asked to find a polynomial time algorithm for computing a minimum secure dominating set in a block graph. In this paper, we answer this by presenting a linear time algorithm to compute a minimum secure dominating set in block graphs. We then strengthen the known NP-completeness of the secure domination problem by showing that the secure domination problem is NP-complete for undirected path graphs and chordal bipartite graphs.  相似文献   
187.
This methodological paper highlights the differences and the resulting implications from the application of the three most commonly applied weighting index methods to measuring corporate governance quality at an aggregate level: the Dichotomous; the partial compliance (PC) unweighted; and the Experts’ methods. In particular, first, we demonstrate how each method is applied and provide the details needed for readers to replicate each method. Second, we employ these methods on a sample of companies and compare the corresponding scores by testing their differences statistically. Third, as an indicative example of the potential implications arising from the use of these measures, we test whether the relation between market value and corporate governance levels differs, depending on the method applied. We find that the three methods produce significantly different overall and relative (i.e., ranking order) scores and, consequently, the relation between market value and corporate governance levels differs, depending on the method applied. Thus, we contribute to the corporate governance literature by showing that weighting in corporate governance indices matters and we recommend simultaneous application of at least two methods (i.e., the PC unweighted and the Experts’ methods) for deriving robust findings.  相似文献   
188.
We introduce and study optimization problems which are related to the well-known Subset Sum problem. In each new problem, a node-weighted digraph is given and one has to select a subset of vertices whose total weight does not exceed a given budget. Some additional constraints called digraph constraints and maximality need to be satisfied. The digraph constraint imposes that a node must belong to the solution if at least one of its predecessors is in the solution. An alternative of this constraint says that a node must belong to the solution if all its predecessors are in the solution. The maximality constraint ensures that no superset of a feasible solution is also feasible. The combination of these constraints provides four problems. We study their complexity and present some approximation results according to the type of input digraph, such as directed acyclic graphs and oriented trees.  相似文献   
189.
Given the limitations in providing monetary rewards as an incentive in the public sector, Herzberg’s Two-Factor Theory of Motivation can be promising if it is applicable to public employees. This study identifies the effects of motivators and hygiene factors on public managers’ job satisfaction, and finds out if there is difference, compared to how private-sector employees are motivated. According to the findings, a majority of identified motivators in the previous research showed positive effects on job satisfaction among public managers, and public managers’ job satisfaction was not affected by hygiene factor as predicted in Herzberg’s study. Managerial implications are discussed.  相似文献   
190.
This paper critically scrutinizes the key success factors and tools described in the partnering literature by exploring how they are implemented in a public–private partnering collaboration. In addition to this the paper investigates to what extent these tools facilitate the relationship between the parties in a partnering process. The empirical data consist of two longitudinal case studies. Both cases are large and complex urban development projects in the Swedish water and sewage industry. The results from the cases were ambiguous and positive; as well, some negative outcomes were present. Further, the processes were in both cases far from easy and it required a lot of effort from the parties in the collaboration to make the collaboration work and establish a culture based on trust, especially higher up in the organization. As could be expected, the reality is thus far more complex and cumbersome than previous studies indicate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号