首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
  示例: 沙坡头地区,人工植被区,变化  检索词用空格隔开表示必须包含全部检索词,用“,”隔开表示只需满足任一检索词即可!
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1333篇
  免费   7篇
管理学   228篇
民族学   14篇
人口学   107篇
丛书文集   4篇
理论方法论   147篇
综合类   12篇
社会学   665篇
统计学   163篇
  2024年   21篇
  2023年   25篇
  2022年   13篇
  2021年   17篇
  2020年   58篇
  2019年   63篇
  2018年   47篇
  2017年   77篇
  2016年   74篇
  2015年   36篇
  2014年   65篇
  2013年   190篇
  2012年   65篇
  2011年   62篇
  2010年   46篇
  2009年   50篇
  2008年   44篇
  2007年   41篇
  2006年   39篇
  2005年   23篇
  2004年   36篇
  2003年   17篇
  2002年   18篇
  2001年   23篇
  2000年   13篇
  1999年   22篇
  1998年   14篇
  1997年   12篇
  1996年   14篇
  1995年   10篇
  1994年   5篇
  1993年   3篇
  1992年   7篇
  1991年   8篇
  1990年   6篇
  1989年   6篇
  1988年   6篇
  1987年   9篇
  1986年   5篇
  1985年   8篇
  1984年   5篇
  1983年   4篇
  1982年   5篇
  1981年   4篇
  1979年   3篇
  1976年   2篇
  1975年   2篇
  1970年   2篇
  1968年   2篇
  1965年   3篇
排序方式: 共有1340条查询结果,搜索用时 15 毫秒
11.
    
This article addresses the problem of estimating the time of apparent death in a binary stochastic process. We show that, when only censored data are available, a fitted logistic regression model may estimate the time of death incorrectly. We improve this estimation by utilizing discrete-event simulation to produce simulated complete time series data. The proposed methodology may be applied to situations where time of death cannot be formally determined and has to be estimated based on prolonged inactivity. As an illustration, we use observed monthly activity patterns from 300 real Open Source Software development projects sampled from Sourceforge.net.  相似文献   
12.
    
We propose a new type of multivariate statistical model that permits non‐Gaussian distributions as well as the inclusion of conditional independence assumptions specified by a directed acyclic graph. These models feature a specific factorisation of the likelihood that is based on pair‐copula constructions and hence involves only univariate distributions and bivariate copulas, of which some may be conditional. We demonstrate maximum‐likelihood estimation of the parameters of such models and compare them to various competing models from the literature. A simulation study investigates the effects of model misspecification and highlights the need for non‐Gaussian conditional independence models. The proposed methods are finally applied to modeling financial return data. The Canadian Journal of Statistics 40: 86–109; 2012 © 2012 Statistical Society of Canada  相似文献   
13.
    
This article aimed at a general audience of computational scientists, surveys the Cholesky factorization for symmetric positive definite matrices, covering algorithms for computing it, the numerical stability of the algorithms, and updating and downdating of the factorization. Cholesky factorization with pivoting for semidefinite matrices is also treated. Copyright © 2009 John Wiley & Sons, Inc. This article is categorized under:
  • Algorithms and Computational Methods > Numerical Methods
  相似文献   
14.
    
Adams, Gupta and Leeth ( British Journal of Management , 2008) question the universality of the glass cliff after finding no differences in US companies' financial performance either before or after the appointment of male and female CEOs. We agree that glass cliffs are neither universal nor ineluctable, but urge caution in interpreting this null result. This is because the nature and significance of women's precarious leadership positions becomes more apparent when one goes beyond archival financial data and compares the broad circumstances of male and female leaders. Here multiple strands of research suggest that above the glass ceiling the playing field for men and women is far from level.  相似文献   
15.
    
Shareholder agreements govern the relations among shareholders in privately held firms, such as joint ventures and venture capital‐backed companies. We provide an economic explanation for key clauses in such agreements—namely, put and call options, tag‐along and drag‐along rights, demand and piggy‐back rights, and catch‐up clauses. In a dynamic moral hazard setting, we show that these clauses can ensure that the contract parties make efficient ex ante investments in the firm. They do so by constraining renegotiation. In the absence of the clauses, ex ante investment would be distorted by unconstrained renegotiation aimed at (i) precluding value‐destroying ex post transfers, (ii) inducing value‐increasing ex post investments, or (iii) precluding hold‐out on value‐increasing sales to a trade buyer or the IPO market. (JEL: G34)  相似文献   
16.
    
We use data on announced and actual exchange rate arrangements to ask which countries follow de facto regimes different from their de iure ones, that is, do not do what they say. Our results suggest that countries with poor institutional quality have difficulty in maintaining pegging and abandon it often. In contrast, many countries with relatively good institutions display fear of floating, that is, they manage more than announced, perhaps to signal their differences from those countries incapable of maintaining promises of monetary stability. (JEL: F3, O1)  相似文献   
17.
    
The success of the Global Polio Eradication Initiative promises to bring large benefits, including sustained improvements in quality of life (i.e., cases of paralytic disease and deaths avoided) and costs saved from cessation of vaccination. Obtaining and maintaining these benefits requires that policymakers manage the transition from the current massive use of oral poliovirus vaccine (OPV) to a world without OPV and free of the risks of potential future reintroductions of live polioviruses. This article describes the analytical journey that began in 2001 with a retrospective case study on polio risk management and led to development of dynamic integrated risk, economic, and decision analysis tools to inform global policies for managing the risks of polio. This analytical journey has provided several key insights and lessons learned that will be useful to future analysts involved in similar complex decision-making processes.  相似文献   
18.
    
This article presents an approach to the problem of terrorism risk assessment and management by adapting the framework of the risk filtering, ranking, and management method. The assessment is conducted at two levels: (1) the system level, and (2) the asset-specific level. The system-level risk assessment attempts to identify and prioritize critical infrastructures from an inventory of system assets. The definition of critical infrastructures offered by Presidential Decision Directive 63 was used to determine the set of attributes to identify critical assets--categorized according to national, regional, and local impact. An example application is demonstrated using information from the Federal Highway Administration National Bridge Inventory for the State of Virginia. Conversely, the asset-specific risk assessment performs an in-depth analysis of the threats and vulnerabilities of a specific critical infrastructure. An illustration is presented to offer some insights in risk scenario identification and prioritization, multiobjective evaluation of management options, and extreme-event analysis for critical infrastructure protection.  相似文献   
19.
    
In Bielecki et al. (2014a Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014a ). Dynamic hedging of portfolio credit risk in a markov copula model . J. Optimiz. Theor. Applic . doi: DOI 10.1007/s10957-013-0318-4 (forthcoming) .[Crossref] [Google Scholar]), the authors introduced a Markov copula model of portfolio credit risk where pricing and hedging can be done in a sound theoretical and practical way. Further theoretical backgrounds and practical details are developed in Bielecki et al. (2014b Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014b ). A bottom-up dynamic model of portfolio credit risk - Part I: Markov copula perspective . In: Recent Adv. Fin. Eng. 2012 , World Scientific (preprint version available at http://dx.doi.org/10.2139/ssrn.1844574) . [Google Scholar],c) where numerical illustrations assumed deterministic intensities and constant recoveries. In the present paper, we show how to incorporate stochastic default intensities and random recoveries in the bottom-up modeling framework of Bielecki et al. (2014a Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014a ). Dynamic hedging of portfolio credit risk in a markov copula model . J. Optimiz. Theor. Applic . doi: DOI 10.1007/s10957-013-0318-4 (forthcoming) .[Crossref] [Google Scholar]) while preserving numerical tractability. These two features are of primary importance for applications like CVA computations on credit derivatives (Assefa et al., 2011 Assefa , S. , Bielecki , T. R. , Crépey , S. , Jeanblanc , M. ( 2011 ). CVA computation for counterparty risk assessment in credit portfolios . In: Bielecki , T.R. , Brigo , D. , Patras , F. , Eds., Credit Risk Frontiers . Hoboken : Wiley/Bloomberg-Press . [Google Scholar]; Bielecki et al., 2012 Bielecki , T. R. , Crépey , S. , Jeanblanc , M. , Zargari , B. ( 2012 ). Valuation and Hedging of CDS counterparty exposure in a markov copula model . Int. J. Theoret. Appl. Fin. 15 ( 1 ): 1250004 .[Crossref] [Google Scholar]), as CVA is sensitive to the stochastic nature of credit spreads and random recoveries allow to achieve satisfactory calibration even for “badly behaved” data sets. This article is thus a complement to Bielecki et al. (2014a Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014a ). Dynamic hedging of portfolio credit risk in a markov copula model . J. Optimiz. Theor. Applic . doi: DOI 10.1007/s10957-013-0318-4 (forthcoming) .[Crossref] [Google Scholar]), Bielecki et al. (2014b Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014b ). A bottom-up dynamic model of portfolio credit risk - Part I: Markov copula perspective . In: Recent Adv. Fin. Eng. 2012 , World Scientific (preprint version available at http://dx.doi.org/10.2139/ssrn.1844574) . [Google Scholar]) and Bielecki et al. (2014c Bielecki , T. R. , Cousin , A. , Crépey , S. , Herbertsson , A. ( 2014c ). A bottom-up dynamic model of portfolio credit risk - Part II: Common-shock interpretation, calibration and hedging issues . Recent Adv. Fin. Eng. 2012 , World Scientific (preprint version available at http://dx.doi.org/10.2139/ssrn.2245130) . [Google Scholar]).  相似文献   
20.
    
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号