首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12490篇
  免费   63篇
管理学   1741篇
民族学   128篇
人才学   1篇
人口学   2643篇
丛书文集   3篇
理论方法论   654篇
综合类   315篇
社会学   5389篇
统计学   1679篇
  2024年   2篇
  2023年   42篇
  2022年   32篇
  2021年   59篇
  2020年   113篇
  2019年   141篇
  2018年   1809篇
  2017年   1800篇
  2016年   1204篇
  2015年   121篇
  2014年   157篇
  2013年   445篇
  2012年   475篇
  2011年   1201篇
  2010年   1103篇
  2009年   835篇
  2008年   873篇
  2007年   1029篇
  2006年   43篇
  2005年   255篇
  2004年   279篇
  2003年   228篇
  2002年   109篇
  2001年   23篇
  2000年   26篇
  1999年   16篇
  1998年   16篇
  1997年   11篇
  1996年   43篇
  1995年   9篇
  1994年   9篇
  1993年   4篇
  1992年   7篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1988年   9篇
  1987年   3篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
  1974年   1篇
  1973年   2篇
  1971年   1篇
  1969年   1篇
  1968年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
221.
This paper is an assessment of the impact of child support enforcement and welfare policies on nonmarital teenage childbearing and motherhood. We derive four hypotheses about the effects of policies on nonmarital teenage childbearing and motherhood. We propose that teenage motherhood and school enrollment are joint decisions for teenage girls. Based on individual trajectories during ages 12–19, our analysis uses an event history model for nonmarital teenage childbearing and a dynamic model of motherhood that is jointly determined with school enrollment. We find some evidence that child support policies indirectly reduce teen motherhood by increasing the probability of school enrollment, which, in turn, reduces the probability of teen motherhood. This finding suggests that welfare offices may wish to place greater weight on outreach programs that inform more teenagers of the existence of strong child support enforcement measures. Such programs might reduce nonmarital teen motherhood further and thus reduce the need for welfare support and child support enforcement in the long run.
Lingxin HaoEmail:
  相似文献   
222.
谈中药知识产权保护的现状与对策   总被引:9,自引:0,他引:9  
中国加入WTO之后,中国民族医药产业将面临着机遇和挑战,加强中药知识产权的保护工作意义尤其重大。作者在详尽分析了我国中药知识产权方面的现状之后,进一步提出了我国在中药知识产权保护方面的对策。  相似文献   
223.
Internet technology has become an informational resource for most health care consumers. Online information, discussion, and support groups, in the form of message boards, listservs, and chat rooms are emerging as parts of virtual self-health-care network. This paper examines the extent to which participation in online health discussion groups was reported to be helpful in increasing medical knowledge and in enhancing the participatory patient role of health care consumers in interaction with health care service professionals. Data for this study was collected from 350 patients who participated in Internet discussion groups for cancer patients. The findings of the study indicated the important impact of Internet health discussion groups on health care management practices as perceived by health care consumers, including empowerment through knowledge and proactive participation in cancer care management. This research contributes to understanding the patient perspective and assesses the perceived importance of Internet groups by health care consumers.  相似文献   
224.
We study uniqueness of Nash equilibria in atomic splittable congestion games and derive a uniqueness result based on polymatroid theory: when the strategy space of every player is a bidirectional flow polymatroid, then equilibria are unique. Bidirectional flow polymatroids are introduced as a subclass of polymatroids possessing certain exchange properties. We show that important cases such as base orderable matroids can be recovered as a special case of bidirectional flow polymatroids. On the other hand we show that matroidal set systems are in some sense necessary to guarantee uniqueness of equilibria: for every atomic splittable congestion game with at least three players and non-matroidal set systems per player, there is an isomorphic game having multiple equilibria. Our results leave a gap between base orderable matroids and general matroids for which we do not know whether equilibria are unique.  相似文献   
225.
In 1984, Gabow and Tarjan provided a very elegant and fast algorithm for the following problem: given a matroid defined on a red and blue colored ground set, determine a basis of minimum cost among those with k red elements, or decide that no such basis exists. In this paper, we investigate extensions of this problem from ordinary matroids to the more general notion of poset matroids which take precedence constraints on the ground set into account. We show that the problem on general poset matroids becomes -hard, already if the underlying partially ordered set (poset) consists of binary trees of height two. On the positive side, we present two algorithms: a pseudopolynomial one for integer polymatroids, i.e., the case where the poset consists of disjoint chains, and a polynomial algorithm for the problem to determine a minimum cost ideal of size l with k red elements, i.e., the uniform rank-l poset matroid, on series-parallel posets.  相似文献   
226.
In the facility location game on a line, there are some agents who have fixed locations on the line where an obnoxious facility will be placed. The objective is to maximize the social welfare, e.g., the sum of distances from the facility to all agents. On collecting location information, agents may misreport the locations so as to stay far away from the obnoxious facility. In this paper, strategy-proof mechanisms are designed and the approximation ratio is used to measure the performances of the strategy-proof mechanisms. Two objective functions, maximizing the sum of squares of distances (maxSOS) and maximizing the sum of distances (maxSum), have been considered. For maxSOS, a randomized 5/3-approximated strategy-proof mechanism is proposed, and the lower bound of the approximation ratio is proved to be at least 1.042. For maxSum, the lower bound of the approximation ratio of the randomized strategy-proof mechanism is proved to be 1.077. Moreover, a general model is considered that each agent may have multiple locations on the line. For the objective functions maxSum and maxSOS, both deterministic and randomized strategy-proof mechanisms are investigated, and the deterministic mechanisms are shown to be best possible.  相似文献   
227.
This paper studies the large-scale stochastic job shop scheduling problem with general number of similar jobs, where the processing times of the same step are independently drawn from a known probability distribution, and the objective is to minimize the makespan. For the stochastic problem, we introduce the fluid relaxation of its deterministic counterpart, and define a fluid schedule for the fluid relaxation. By tracking the fluid schedule, a policy is proposed for the stochastic job shop scheduling problem. The expected value of the gap between the solution produced by the policy and the optimal solution is proved to be O(1), which indicates the policy is asymptotically optimal in expectation.  相似文献   
228.
This paper studies the continuous connected 2-facility location problem (CC2FLP) in trees. Let \(T = (V, E, c, d, \ell , \mu )\) be an undirected rooted tree, where each node \(v \in V\) has a weight \(d(v) \ge 0\) denoting the demand amount of v as well as a weight \(\ell (v) \ge 0\) denoting the cost of opening a facility at v, and each edge \(e \in E\) has a weight \(c(e) \ge 0\) denoting the cost on e and is associated with a function \(\mu (e,t) \ge 0\) denoting the cost of opening a facility at a point x(et) on e where t is a continuous variable on e. Given a subset \(\mathcal {D} \subseteq V\) of clients, and a subset \(\mathcal {F} \subseteq \mathcal {P}(T)\) of continuum points admitting facilities where \(\mathcal {P}(T)\) is the set of all the points on edges of T, when two facilities are installed at a pair of continuum points \(x_1\) and \(x_2\) in \(\mathcal {F}\), the total cost involved in CC2FLP includes three parts: the cost of opening two facilities at \(x_1\) and \(x_2\), K times the cost of connecting \(x_1\) and \(x_2\), and the cost of all the clients in \(\mathcal {D}\) connecting to some facility. The objective is to open two facilities at a pair of continuum points in \(\mathcal {F}\) to minimize the total cost, for a given input parameter \(K \ge 1\). This paper focuses on the case of \(\mathcal {D} = V\) and \(\mathcal {F} = \mathcal {P}(T)\). We first study the discrete version of CC2FLP, named the discrete connected 2-facility location problem (DC2FLP), where two facilities are restricted to the nodes of T, and devise a quadratic time edge-splitting algorithm for DC2FLP. Furthermore, we prove that CC2FLP is almost equivalent to DC2FLP in trees, and develop a quadratic time exact algorithm based on the edge-splitting algorithm. Finally, we adapt our algorithms to the general case of \(\mathcal {D} \subseteq V\) and \(\mathcal {F} \subseteq \mathcal {P}(T)\).  相似文献   
229.
This study focuses on the issues relating to the implementation of management accounting systems in complex settings such as archeological sites. The aim is to understand the conditions under which the implementation of performance management systems (PMS) may enable cultural organizations to fulfil their multiple objectives and the factors which play a crucial role in such dynamics. Focusing on the Herculaneum Conservation Project (HCP) the study explains how PMS came to be implemented having been made acceptable to all parties involved. The Middle Range Theory as developed by Broadbent and Laughlin (Accounting control and controlling accounting: interdisciplinary and critical perspectives, Bingley, Emerald, 2013) was utilized to explore how the PMS change took place in the HCP, and focus on the factors influencing this process. The findings reveal that the change in the PMS benefited from the involvement of a multidisciplinary Specialist Work Group. This involvement reduced the natural tendency to resist the forces of change and increased the commitment of the various groups of stakeholders to the new culture. The findings reveal how PMS were developed in the context of a multifaceted approach to change, allowing us to draw both theoretical and practical lessons that may be brought to bear in other complex contexts.  相似文献   
230.
In a graph \(G=(V,E)\), a set \(D \subseteq V\) is said to be a dominating set of G if for every vertex \(u\in V{\setminus }D\), there exists a vertex \(v\in D\) such that \(uv\in E\). A secure dominating set of the graph G is a dominating set D of G such that for every \(u\in V{\setminus }D\), there exists a vertex \(v\in D\) such that \(uv\in E\) and \((D{\setminus }\{v\})\cup \{u\}\) is a dominating set of G. Given a graph G and a positive integer k, the secure domination problem is to decide whether G has a secure dominating set of cardinality at most k. The secure domination problem has been shown to be NP-complete for chordal graphs via split graphs and for bipartite graphs. In Liu et al. (in: Proceedings of 27th workshop on combinatorial mathematics and computation theory, 2010), it is asked to find a polynomial time algorithm for computing a minimum secure dominating set in a block graph. In this paper, we answer this by presenting a linear time algorithm to compute a minimum secure dominating set in block graphs. We then strengthen the known NP-completeness of the secure domination problem by showing that the secure domination problem is NP-complete for undirected path graphs and chordal bipartite graphs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号