首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   132篇
  免费   5篇
管理学   22篇
民族学   1篇
人口学   7篇
理论方法论   18篇
综合类   6篇
社会学   72篇
统计学   11篇
  2023年   5篇
  2022年   1篇
  2021年   3篇
  2020年   5篇
  2019年   7篇
  2018年   9篇
  2017年   5篇
  2016年   11篇
  2015年   2篇
  2014年   5篇
  2013年   25篇
  2012年   7篇
  2011年   2篇
  2010年   7篇
  2009年   5篇
  2008年   4篇
  2007年   1篇
  2006年   6篇
  2005年   4篇
  2004年   1篇
  2003年   3篇
  2002年   3篇
  2001年   2篇
  2000年   2篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1992年   1篇
  1991年   1篇
  1987年   1篇
  1984年   1篇
  1982年   1篇
  1976年   1篇
  1970年   1篇
排序方式: 共有137条查询结果,搜索用时 15 毫秒
51.
This paper builds on the work of Norbert Elias to examine how conduct varies across cultural contexts. We compare courtship practices in New York and Berlin and ask how people act during the course of ‘getting together’ with a sexual or romantic partner. Drawing on interviews in both contexts, we find that conduct associated with the practice of ‘dating’ among New York respondents is more rationalized as indicated by a greater awareness of timing, a greater degree of intentionality and planning and a greater tendency to psychologize self and others. Berlin respondents report observations of themselves and others in less detail and tend to describe themselves as passive objects of the impersonal forces of love. Whereas conduct associated with dating is more reflexive in some ways, these forms of reflexive conduct are not themselves fully conscious or the object of reflection but have in turn become taken for granted and habitual. These findings challenge us to conceptualize habitus in a manner that does not reproduce the opposition between habit and reflexivity but allows us to use the concept as a tool to capture variations in how self‐monitoring and habit are combined in modes of conduct.  相似文献   
52.
Fault-tolerant networks are being used to provide more reliable network connections. Development of the fault-tolerant computing system requires accurate reliability modeling. Numerical formulations and complex models are commonly used for obtaining reliability measures. These measures are functions of component failure rates and fault-coverage. Coverage provides information about the fault and error detection, isolation, and system recovery capabilities. This research studied a system consisting three units in parallel with three types of failures namely, catastrophic, human, and unit failures incorporating the coverage factor and evaluated the various reliability measures of the considered multi-state system subject to imperfect fault coverage.  相似文献   
53.
eIFL.net is an umbrella organization of library consortia in fifty transition and developing countries. Its main purpose is to negotiate, encourage, and advocate for the wide availability of scholarly electronic information by library users from the education and research sectors, professional communities, governmental organizations, and civil society.The paper presents the beginnings, goals, and development of eIFL.net in its five years of existence. The authors outline what it has achieved so far and provide an overview of the main challenges that developing countries face in accessing quality e-resources. Some success stories will demonstrate concrete accomplishments of the organization and its participating countries.  相似文献   
54.
In this article, I bring together literature from the fields of memory and reconciliation to investigate practices of ‘border crossing’ in post-war Bosnia and Herzegovina. While national divisions prevail, subtle attempts at border crossing can be witnessed even in those areas most impacted by the war’s partition, such as in Mostar, a city that has been left divided into Croat and Bosniak sides. Borders are physically crossed to reintegrate the ‘other side’ into one’s everyday life, but also in a more metonymical sense through the questioning of absolute national identities. Such acts of border crossing heavily rely on memories of positive pre-war cross-national relations, which are brought forward to re-establish these relations in post-war times. The research findings suggest that re-enacting a shared common ground – most often found in the past rather than in the present – bears an integrative potential that deserves more attention in post-conflict settings.  相似文献   
55.
56.
Statistical disclosure control (SDC) is a balancing act between mandatory data protection and the comprehensible demand from researchers for access to original data. In this paper, a family of methods is defined to ‘mask’ sensitive variables before data files can be released. In the first step, the variable to be masked is ‘cloned’ (C). Then, the duplicated variable as a whole or just a part of it is ‘suppressed’ (S). The masking procedure's third step ‘imputes’ (I) data for these artificial missings. Then, the original variable can be deleted and its masked substitute has to serve as the basis for the analysis of data. The idea of this general ‘CSI framework’ is to open the wide field of imputation methods for SDC. The method applied in the I-step can make use of available auxiliary variables including the original variable. Different members of this family of methods delivering variance estimators are discussed in some detail. Furthermore, a simulation study analyzes various methods belonging to the family with respect to both, the quality of parameter estimation and privacy protection. Based on the results obtained, recommendations are formulated for different estimation tasks.  相似文献   
57.
Given a connected edge-weighted graph G and a positive integer B, the degree-constrained minimum spanning tree problem (DCMST) consists in finding a minimum cost spanning tree of G such that the degree of each vertex in the tree is less than or equal to B. This problem, which has been extensively studied over the last few decades, has several practical applications, mainly in networks. However, some applications do not especially impose a subgraph as a solution. For this purpose, a more flexible so-called hierarchy structure has been proposed. Hierarchy, which can be seen as a generalization of trees, is defined as a homomorphism of a tree in a graph. In this paper, we discuss the degree-constrained minimum spanning hierarchy (DCMSH) problem which is NP-hard. An integer linear program (ILP) formulation of this new problem is given. Properties of the solution are analysed, which allows us to add valid inequalities to the ILP. To evaluate the difference of cost between trees and hierarchies, the exact solution of DCMST and z problems are compared. It appears that, in sparse random graphs, the average percentage of improvement of the cost varies from 20 to 36% when the maximal authorized degree of vertices B is equal to 2, and from 11 to 31% when B is equal to 3. The improvement increases as the graph size increases.  相似文献   
58.
为了探索未来中国休闲研究的关键问题,28位从事休闲研究的中国学者参加了由北京第二外国语学院主办、美国伊利诺伊大学与加拿大阿尔伯塔大学联合承办的2013年中国休闲与社会进步学术年会及期间的研究项目,这些学者还成为该项目的受访者。运用序列解释混合法对28位专家进行意见征询和反馈,最终,中国学者确定了如下9个休闲议题:时间利用、休闲与幸福(生活满意度)、公共政策和规划、家庭休闲、需要和动机、技术变革、休闲空间和资源、休闲教育、休闲与传统文化。这些领域反映了中国文化与社会焦点的影响力,对21世纪第二个十年的中国社会具有特殊的重要性,对如何改善休闲服务供给问题具有重要启示,同时也对建设和谐社会有重要的参考作用。  相似文献   
59.
Information of exposure factors used in quantitative risk assessments has previously been compiled and reported for U.S. and European populations. However, due to the advancement of science and knowledge, these reports are in continuous need of updating with new data. Equally important is the change over time of many exposure factors related to both physiological characteristics and human behavior. Body weight, skin surface, time use, and dietary habits are some of the most obvious examples covered here. A wealth of data is available from literature not primarily gathered for the purpose of risk assessment. Here we review a number of key exposure factors and compare these factors between northern Europe—here represented by Sweden—and the United States. Many previous compilations of exposure factor data focus on interindividual variability and variability between sexes and age groups, while uncertainty is mainly dealt with in a qualitative way. In this article variability is assessed along with uncertainty. As estimates of central tendency and interindividual variability, mean, standard deviation, skewness, kurtosis, and multiple percentiles were calculated, while uncertainty was characterized using 95% confidence intervals for these parameters. The presented statistics are appropriate for use in deterministic analyses using point estimates for each input parameter as well as in probabilistic assessments.  相似文献   
60.
Women in management are faced with special challenges and conflicts in their work situation: Outdated gender stereotypes, barriers to promotion and often less pay than for their male counterparts are persisting phenomena. Using results from a random sample of 21 individual coaching series, the special conditions underlying the professional leadership role of highly qualified women is examined. The coaching objective is to look for individual concepts and strategies beyond traditional stereotypes and develop life paths that are both personally and professionally meaningful. Self-reflection constitutes a focus in Coaching; it is the key to questioning and reassessing thinking and behavioural patterns as well as to developing new behavioural options. The aim is to design career and life paths in such a way that they express the individual’s own values as well as enable women in management to increase their power to act and to command legitimate power in their professional lives.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号