首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   109篇
  免费   2篇
管理学   15篇
人口学   14篇
理论方法论   13篇
综合类   3篇
社会学   49篇
统计学   17篇
  2023年   4篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2018年   3篇
  2017年   6篇
  2016年   5篇
  2015年   1篇
  2014年   3篇
  2013年   18篇
  2012年   2篇
  2011年   4篇
  2010年   2篇
  2009年   3篇
  2008年   3篇
  2007年   10篇
  2006年   3篇
  2005年   4篇
  2004年   3篇
  2003年   2篇
  2002年   3篇
  2001年   2篇
  2000年   2篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1990年   2篇
  1988年   1篇
  1986年   1篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1978年   1篇
  1976年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有111条查询结果,搜索用时 156 毫秒
61.
Simulation models are widely used in risk analysis to study the effects of uncertainties on outcomes of interest in complex problems. Often, these models are computationally complex and time consuming to run. This latter point may be at odds with time‐sensitive evaluations or may limit the number of parameters that are considered. In this article, we give an introductory tutorial focused on parallelizing simulation code to better leverage modern computing hardware, enabling risk analysts to better utilize simulation‐based methods for quantifying uncertainty in practice. This article is aimed primarily at risk analysts who use simulation methods but do not yet utilize parallelization to decrease the computational burden of these models. The discussion is focused on conceptual aspects of embarrassingly parallel computer code and software considerations. Two complementary examples are shown using the languages MATLAB and R. A brief discussion of hardware considerations is located in the Appendix.  相似文献   
62.
63.
This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field. The Science of Security (SoS) initiative at the National Security Agency seeks to further and promote interdisciplinary research in cybersecurity. SoS organizes its research into the Five Hard Problems (5HP): (1) scalability and composability; (2) policy‐governed secure collaboration; (3) security‐metrics–driven evaluation, design, development, and deployment; (4) resilient architectures; and (5) understanding and accounting for human behavior. However, a vast majority of the research sponsored by SoS does not consider risk and when it does so, only implicitly. Therefore, we identify opportunities for risk analysis in each hard problem and propose approaches to address these objectives. Such collaborations between risk and cybersecurity researchers will enable growth and insight in both fields, as risk analysts may apply existing methodology in a new realm, while the cybersecurity community benefits from accepted practices for describing, quantifying, working with, and mitigating risk.  相似文献   
64.
65.
Given limited resource availability in a developing nation like India, faced with high incidences of crime, it is important to optimize on the resources spent in combating crime by channelling them to proper direction. This requires an understanding of the actual and overall level of crime across India. Our paper provides a complete understanding of the various indicators of violent crime and the determinants of these crimes in India using district level data for three census years, namely, 1981, 1991 and 2001. We construct three alternative crime-burden indices. Including a variable like voter turnout in state election at the district level, we document significant impact of public awareness to reduce and combat crime. The constructed crime burden index shows that states located in northern parts of India have more incidences of crime compared to states in the south. We also find that our estimated crime-burden indices tend to report in general a higher level of crime-burden than the average based index. This suggests controlling for the factors beyond population while constructing the aggregate crime-burden index for any country is essential. Our work although is limited to the Indian data, we however, believe that this can be easily applied to various other countries.  相似文献   
66.
67.
This article reports the results of a corporate planning survey involving 15 U.K. companies and an experimental pilot planning system developed as a research tool to investigate aspects of interactive planning. The preliminary findings indicate that such systems can be of considerable benefit to managers, planners, and the organization, and that the design of the system from the users point of view will determine whether or not it will be accepted as a decision making aid. Some of the essential features are then described.  相似文献   
68.
69.
Pre-discharge psychoeducation workshops for relatives of psychiatric inpatients, conducted with and without the patient present, were compared to hospital-tour and no-contact control groups. Despite highly positive evaluations of the workshops, there were no group differences in patient relapse or family involvement in treatment after discharge; nor did the groups differ on questionnaire measures of relatives' illness attributions or criticism/rejection of the patient taken immediately after the workshops. Process analyses indicated that relatives made fewer personal and topic-relevant comments over time in workshops with patients present, compared to those patients absent. Patients, however, maintained high (often disruptive) levels of participation.  相似文献   
70.
Children in Foster Care: Possible factors affecting permanency planning   总被引:1,自引:0,他引:1  
This is a study of Children in Foster Care to determine possible factors affecting permanency planning. Several issues were determined to be of importance, cultural diversity, economics, and family support services. Areas needing additional study were determined to be the different treatment given to African-American and poor children, and the influence of economic and social problems on placement needs and planning.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号