首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
  示例: 沙坡头地区,人工植被区,变化  检索词用空格隔开表示必须包含全部检索词,用“,”隔开表示只需满足任一检索词即可!
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36503篇
  免费   271篇
  国内免费   40篇
管理学   4812篇
劳动科学   12篇
民族学   308篇
人才学   9篇
人口学   2958篇
丛书文集   1504篇
教育普及   2篇
理论方法论   2950篇
现状及发展   1篇
综合类   2901篇
社会学   14668篇
统计学   6689篇
  2023年   203篇
  2022年   210篇
  2021年   262篇
  2020年   586篇
  2019年   726篇
  2018年   826篇
  2017年   1156篇
  2016年   858篇
  2015年   729篇
  2014年   955篇
  2013年   5368篇
  2012年   1309篇
  2011年   1262篇
  2010年   1153篇
  2009年   1008篇
  2008年   1055篇
  2007年   1096篇
  2006年   1139篇
  2005年   1033篇
  2004年   777篇
  2003年   714篇
  2002年   817篇
  2001年   930篇
  2000年   885篇
  1999年   801篇
  1998年   586篇
  1997年   517篇
  1996年   572篇
  1995年   521篇
  1994年   482篇
  1993年   473篇
  1992年   542篇
  1991年   522篇
  1990年   467篇
  1989年   439篇
  1988年   465篇
  1987年   412篇
  1986年   367篇
  1985年   442篇
  1984年   437篇
  1983年   388篇
  1982年   323篇
  1981年   268篇
  1980年   245篇
  1979年   293篇
  1978年   259篇
  1977年   229篇
  1976年   187篇
  1975年   207篇
  1974年   181篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
The phenomenon of employee theft is examined empirically, utilizing a deterrence paradigm. Employees selected randomly from three different industry sectors and metropolitan areas were asked to self-report their involvement in a number of property theft activities within the employment setting. Using a weighted least-squares logit regression analysis, the study found that the perception of both the certainty and severity of organizational sanctions were related to employee theft. Males reported more theft than did females, but contrary to previous research, no gender/certainty or gender/severity interactions were observed. The best-fit model did, however, contain two significant first-order interactions: age/certainty and age/severity. These interactions strongly suggest that younger employees are not as deterrable as their older peers, especially under conditions of both high certainty and high severity of punishment. While a number of possible explanations might account for differential deterrability according to age, a commitment to or stakes in conformity explanation is proposed.  相似文献   
62.
We use an event-study analysis to understand how alliance activity affects firm risk. The risk measure is the implied volatility of a firm’s stock price and the events are alliance announcements to the market. We build on the previous event-studies in the alliance literature that focus on the change in shareholder value by taking the first step in delineating what part of that value arises from the changes in the firm’s risk. The analysis reveals that a number of factors within a firm’s control can be used to manipulate risk exposure in an alliance, including the similarity of the firm’s and the alliance’s core activities, the governance form of the alliance, and the function of the alliance.  相似文献   
63.
This paper describes how the core portion of the undergraduate business program at Indiana University was revised to facilitate integration of basic functionally oriented decision making skills and thus help students gain a deeper understanding of the interdependence of business decisions. It relates, in essence, why and how a single computer-oriented case study which demanded a solution to a large-scale, unified finance-marketing-production problem was used at Indiana University, mentions how we plan to accomplish further integration of functional material, and provides some insight into student reaction to what was, in fact, a massive project from both student and administrative points of view.  相似文献   
64.
This paper is concerned with the solution of linear and linear goal programming problems in which the values of the right-hand side parameters are not fixed constants. Specifically, we are concerned with linear optimization problems in which the right-hand sides of the constraining equations are free to vary subject to a set of linear constraining equations. By formulating a relaxed linear program wherein the right-hand sides are treated as variables, we show how it is possible to solve one larger linear program that yields as a solution not only the optimal values for the decision variables, but also the optimal values for the right-hand sides.  相似文献   
65.
66.
The utility of conventional project management techniques, such as PERT and CPM, is hampered by significant and realistic network attributes and managerial considerations. There are many situations which involve more than one project and numerous resources. Of major concern in such situations is the reduction of the maximum quantity of each required resource. The algorithm presented here is capable of scheduling the individual activities in multiple projects with multiple resources and leveling the overall quantity of each resource which is required. The basis of the algorithm is a sequencing procedure for examining various combinations of activity start times. The measure of effectiveness for each combination is the sum of the squares of the required quantity of each resource in each time period.  相似文献   
67.
美国政府支持创业与风险投资模式及其借鉴   总被引:1,自引:0,他引:1  
风险投资在其发展过程中,由于政治、经济、法律、文化的差异,而在各国呈现出不同的状况和特征。本文分析了美国以小企业管理局为核心的支持创业与风险投资模式,并结合我国实际,以期得到一些启示与借鉴。  相似文献   
68.
In the production planning and control of discrete-parts manufacture, aggregation of parts into families, on the basis of similarity, is carried out to ease both long-horizon planning and short-horizon scheduling. Additional advantages are related to those of group technology (GT), such as simplifying the flow of parts and tools and reducing both set-up and production costs. The problem of formally forming part families is presented and discussed. Previous work is reviewed and assessed. Two solution approaches, one based on a location model, the other on simulated annealing, are presented and compared along with test results. The location formulation, which results in an integer programming model solved by Lagrangian relaxation, proved capable of producing solutions of excellent quality, but only for relatively small problem instances. In contrast, simulated annealing, which is a general heuristic approach to combinatorial optimization, produced solutions of comparable quality and could handle realistically large problem instances. However, careful design of the simulated annealing algorithm is crucially important. An effective design is presented.  相似文献   
69.
本文从中西方文化差异的角度,通过大量实例,分析了动物名词翻译中的不等值现象。旨在提醒英语界同仁,在掌握词汇的同时,应多了解中西方不同的文化背景,翻译出脍炙人口的作品。  相似文献   
70.
Research suggests that victims of bullying may lack skills in emotional regulation, a process which facilitates coping with provocative situations to lessen the stress of negative emotions (Cicchetti, Ackerman, & Izard, 1995). The present study examined the emotional regulation and display patterns of victims during classroom bullying episodes. Children in grades one through six were observed during free play in the winter and spring of three consecutive school years. Results of the study indicated that the coping styles observed in victims of bullying can be grouped into two distinct clusters: 1) problem-solving strategies that are associated with the de-escalation and resolution of bullying episodes; and 2) aggressive strategies that tend to perpetuate and escalate the bullying interaction. Parallels were found between victims' and bullies' emotional displays. Results are discussed in the context of how maladaptive emotional regulation processes may act as risk factors for chronic victimization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号