全文获取类型
收费全文 | 241篇 |
免费 | 14篇 |
专业分类
管理学 | 49篇 |
民族学 | 7篇 |
人口学 | 17篇 |
理论方法论 | 27篇 |
综合类 | 3篇 |
社会学 | 93篇 |
统计学 | 59篇 |
出版年
2023年 | 6篇 |
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 11篇 |
2019年 | 28篇 |
2018年 | 23篇 |
2017年 | 22篇 |
2016年 | 17篇 |
2015年 | 13篇 |
2014年 | 12篇 |
2013年 | 31篇 |
2012年 | 13篇 |
2011年 | 14篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 3篇 |
2007年 | 7篇 |
2006年 | 4篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 2篇 |
2001年 | 2篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有255条查询结果,搜索用时 265 毫秒
31.
Laura Hoyt D'Anna Hannah-Hanh D. Nguyen Grace L. Reynolds Dennis G. Fisher Michael Janson Cristy Chen 《Journal of gay & lesbian social services》2013,25(2):119-139
In this article we examine the prevalence of and associations between sexual orientation–based verbal harassment and reported utilization of health services across levels of sexual orientation in a diverse sample of adult recipients of Los Angeles County–funded HIV-related health and social services. Thirty-two percent reported they had experienced verbal harassment, the majority (80.3%) of whom identified as lesbian, gay, or bisexual (LGB). Those who reported being verbally harassed received significantly more services overall than those who were not verbally harassed, and service utilization varied by sexual orientation. These findings inform future efforts to identify and assess social discrimination in health and social service settings. 相似文献
32.
33.
34.
The joint models for longitudinal data and time-to-event data have recently received numerous attention in clinical and epidemiologic studies. Our interest is in modeling the relationship between event time outcomes and internal time-dependent covariates. In practice, the longitudinal responses often show non linear and fluctuated curves. Therefore, the main aim of this paper is to use penalized splines with a truncated polynomial basis to parameterize the non linear longitudinal process. Then, the linear mixed-effects model is applied to subject-specific curves and to control the smoothing. The association between the dropout process and longitudinal outcomes is modeled through a proportional hazard model. Two types of baseline risk functions are considered, namely a Gompertz distribution and a piecewise constant model. The resulting models are referred to as penalized spline joint models; an extension of the standard joint models. The expectation conditional maximization (ECM) algorithm is applied to estimate the parameters in the proposed models. To validate the proposed algorithm, extensive simulation studies were implemented followed by a case study. In summary, the penalized spline joint models provide a new approach for joint models that have improved the existing standard joint models. 相似文献
35.
In this paper we give solution to a conjecture appearing in Christensen (1997, p. 360) in relation to the definitions of standardized
residuals in loglinear models.
Work done when he was visiting as the Distinguished Lukacs Professor on leave from the Complutense University of Madrid.
An erratum to this article is available at . 相似文献
36.
37.
Using qualitative interview data gathered from 28 Hmong adolescents, we examined the meaning ascribed to language and style and how language and style behaviors are used to distinguish identity. We found that the participants used language and style to define their own ethnic group membership and cultural identities. Moreover they inferred meaning from these identity behaviors to discern which peer groups are desirable (those who wear American style clothing and are bilingual) and which are of low social status (“fobby” style clothing and monolingual). The cultural identity symbols used by participants reveal heterogeneity among Hmong adolescent peer groups and evolving definitions of what it means to be Hmong in America. 相似文献
38.
Nam-Ky Nguyen 《Australian & New Zealand Journal of Statistics》2001,43(3):367-374
Most experimental material in agriculture and industry is heterogeneous in nature and therefore its statistical analysis benefits from blocking. Many experiments are restricted in time or space, and again blocking is useful. This paper adopts the idea of orthogonal blocking of Box & Hunter (1957) and applies it to optimal blocking designs. This approach is then compared with the determinant-based approach described in the literature for constructing block designs. 相似文献
39.
Yilin Shen Thang N. Dinh My T. Thai Hien T. Nguyen 《Journal of Combinatorial Optimization》2014,28(1):186-217
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future. 相似文献
40.
Jean‐Joseph Cadilhon Paule Moustier Nigel D. Poole Phan Thi Giac Tam Andrew P. Fearne 《Development policy review : the journal of the Overseas Development Institute》2006,24(1):31-49
This article describes the development of vegetable marketing in Ho Chi Minh City (Vietnam), where modern distribution outlets are competing fiercely with traditional traders for wholesale and retail customers. Data from interviews with supply chain stakeholders and a survey of vegetable wholesalers have been used to compare the performance of modern and traditional chains, and the findings reveal the chains as segmented in their product focus, the modern sector focusing exclusively on quality. Modern marketing channels are generally more efficient than traditional ones but still account for only around 2% of vegetable distribution. The article argues that policy‐makers should not promote the ‘modernisation’ of food systems at the expense of traditional channels which meet important consumer needs. 相似文献