全文获取类型
收费全文 | 1418篇 |
免费 | 58篇 |
国内免费 | 21篇 |
专业分类
管理学 | 384篇 |
民族学 | 1篇 |
人才学 | 1篇 |
人口学 | 38篇 |
丛书文集 | 72篇 |
理论方法论 | 46篇 |
综合类 | 628篇 |
社会学 | 116篇 |
统计学 | 211篇 |
出版年
2024年 | 4篇 |
2023年 | 20篇 |
2022年 | 16篇 |
2021年 | 10篇 |
2020年 | 28篇 |
2019年 | 40篇 |
2018年 | 40篇 |
2017年 | 42篇 |
2016年 | 50篇 |
2015年 | 51篇 |
2014年 | 79篇 |
2013年 | 155篇 |
2012年 | 70篇 |
2011年 | 80篇 |
2010年 | 76篇 |
2009年 | 78篇 |
2008年 | 64篇 |
2007年 | 70篇 |
2006年 | 66篇 |
2005年 | 62篇 |
2004年 | 59篇 |
2003年 | 62篇 |
2002年 | 38篇 |
2001年 | 50篇 |
2000年 | 35篇 |
1999年 | 23篇 |
1998年 | 19篇 |
1997年 | 18篇 |
1996年 | 11篇 |
1995年 | 20篇 |
1994年 | 13篇 |
1993年 | 13篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 9篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有1497条查询结果,搜索用时 171 毫秒
11.
秦川 《江南大学学报(人文社会科学版)》2005,4(3):119-121
中国的民间手工艺文化一直延续着中华本元文化的特征,保持了精神和物质统一的原生状态,同时包蕴了中华民族传统的自然观和思维方式,无论是其中的思想智慧还是造物工艺都为我们的现代设计在如何继承本土文化方面打开了一个可供吸收营养和借鉴的宝库。凤翔泥塑作为一种符号现象被现代设计加以运用,不能不说是民间传统手工艺术在现代的一次回归浪潮。文章探讨的是凤翔泥塑在纹饰、色彩、造型三个方面带给现代设计的启示。 相似文献
12.
基于规则的客户关系管理系统建模方法 总被引:2,自引:0,他引:2
客户关系管理系统(CRM)是提高企业核心竞争力的有力武器。以工作流和过程建模技术为基础,研究CRM系统的建模,是CRM系统的建立和顺畅运行的关键。因此,将动态过程建模的思想引入CRM系统的建模过程中,按照逐层分解的建模方式来简化系统的复杂性,并采用事件驱动的、基于扩展业务规则的方法进行CRM系统的过程建模和系统性能评价,是针对CRM系统进行建模的有效手段。通过以上方法,可以建立出全面支持CRM系统运行、监控、仿真和性能评价的过程模型。根据该方法建立的CRM系统的模型经过仿真实验和企业实际应用,证明具有良好的应用效果。 相似文献
13.
Eugene Seneta 《Australian & New Zealand Journal of Statistics》2002,44(4):385-400
The death, in Sydney, of Oliver Lancaster marks the end of an era in the histories of the Statistical Society of Australia, which (in its previous existence as the Statistical Society of New South Wales) he helped found in 1947, and of the Australian Journal of Statistics of which he was founding editor (1959–1971). Oliver Lancaster was Foundation Professor of Mathematical Statistics at the University of Sydney (1959–1978), where he spent his life as student and academic. During his academic career, he achieved scholarly distinction in at least four fields: mathematical statistics, medical and public health statistics, the history of medicine and of statistics, and statistical bibliography. With E.J.G. Pitman (1897–1993), M.H. Belz (1897–1975), E.A. Cornish (1909–1973) and P.A.P. Moran (1917–1988) he was part of a cohort of renowned Australian mathematical statisticians who laid the foundation of the glory days of Australian mathematical statistics. This obituary and tribute focuses on some of these aspects, within a broader historical picture. 相似文献
14.
研究了一种新型的可靠性系统,即间歇开放系统。在建立数学模型的基础上,我们详细分析了系统有关的可靠性问题,不仅获得时刻t系统失效的概率和(0,t]中系统失效的平均次数的瞬态解,而且也获得其平稳结果。最后用数值计算比较了间歇开放系统和经典系统的差别。 相似文献
15.
Persuasive argumentation in negotiation 总被引:12,自引:0,他引:12
Katia P. Sycara 《Theory and Decision》1990,28(3):203-242
16.
17.
18.
Effective supply chain management (SCM) has become a potentially valuable way of securing competitive advantage and improving organizational performance since competition is no longer between organizations, but among supply chains. This research conceptualizes and develops five dimensions of SCM practice (strategic supplier partnership, customer relationship, level of information sharing, quality of information sharing, and postponement) and tests the relationships between SCM practices, competitive advantage, and organizational performance. Data for the study were collected from 196 organizations and the relationships proposed in the framework were tested using structural equation modeling. The results indicate that higher levels of SCM practice can lead to enhanced competitive advantage and improved organizational performance. Also, competitive advantage can have a direct, positive impact on organizational performance. 相似文献
19.
A Macro-Economic Framework for Evaluation of Cyber Security Risks Related to Protection of Intellectual Property 总被引:1,自引:0,他引:1
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented. 相似文献
20.