全文获取类型
收费全文 | 9686篇 |
免费 | 447篇 |
国内免费 | 164篇 |
专业分类
管理学 | 470篇 |
劳动科学 | 2篇 |
民族学 | 79篇 |
人才学 | 1篇 |
人口学 | 278篇 |
丛书文集 | 602篇 |
理论方法论 | 344篇 |
综合类 | 4068篇 |
社会学 | 876篇 |
统计学 | 3577篇 |
出版年
2024年 | 29篇 |
2023年 | 133篇 |
2022年 | 164篇 |
2021年 | 187篇 |
2020年 | 266篇 |
2019年 | 338篇 |
2018年 | 392篇 |
2017年 | 472篇 |
2016年 | 360篇 |
2015年 | 331篇 |
2014年 | 589篇 |
2013年 | 1355篇 |
2012年 | 700篇 |
2011年 | 655篇 |
2010年 | 499篇 |
2009年 | 468篇 |
2008年 | 432篇 |
2007年 | 473篇 |
2006年 | 419篇 |
2005年 | 429篇 |
2004年 | 341篇 |
2003年 | 265篇 |
2002年 | 201篇 |
2001年 | 195篇 |
2000年 | 144篇 |
1999年 | 90篇 |
1998年 | 95篇 |
1997年 | 66篇 |
1996年 | 31篇 |
1995年 | 39篇 |
1994年 | 26篇 |
1993年 | 17篇 |
1992年 | 22篇 |
1991年 | 14篇 |
1990年 | 14篇 |
1989年 | 6篇 |
1988年 | 8篇 |
1987年 | 7篇 |
1986年 | 6篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1981年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 437 毫秒
41.
存储区域网络iSCSI协议的通信机制研究 总被引:1,自引:0,他引:1
介绍了存储区域网络主要采用的组网协议,包括FC协议、FCIP协议、iFCP协议和iSCSI协议,着重研究了一种利用TCP/IPI网组建存储区域网络的协议-iSCSI协议,分析了iSCSI协议的通信机制,比较了在IP网络上实现iSCSI协议通信的3种方法,开发了一种iSCSI协议数据单元与TCP数据帧间的接口算法及其硬件设计,并用 VHDL语言成功进行了行为级的仿真。 相似文献
42.
Philip L. H. Yu K. F. Lam S. M. Lo 《Journal of the Royal Statistical Society. Series A, (Statistics in Society)》2005,168(3):583-597
Summary. Factor analysis is a powerful tool to identify the common characteristics among a set of variables that are measured on a continuous scale. In the context of factor analysis for non-continuous-type data, most applications are restricted to item response data only. We extend the factor model to accommodate ranked data. The Monte Carlo expectation–maximization algorithm is used for parameter estimation at which the E-step is implemented via the Gibbs sampler. An analysis based on both complete and incomplete ranked data (e.g. rank the top q out of k items) is considered. Estimation of the factor scores is also discussed. The method proposed is applied to analyse a set of incomplete ranked data that were obtained from a survey that was carried out in GuangZhou, a major city in mainland China, to investigate the factors affecting people's attitude towards choosing jobs. 相似文献
43.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。 相似文献
44.
Longitudinal data often contain missing observations, and it is in general difficult to justify particular missing data mechanisms, whether random or not, that may be hard to distinguish. The authors describe a likelihood‐based approach to estimating both the mean response and association parameters for longitudinal binary data with drop‐outs. They specify marginal and dependence structures as regression models which link the responses to the covariates. They illustrate their approach using a data set from the Waterloo Smoking Prevention Project They also report the results of simulation studies carried out to assess the performance of their technique under various circumstances. 相似文献
45.
Silphids in urban forests: Diversity and function 总被引:2,自引:0,他引:2
Many ecologists have examined the process of how urbanization reduces biological diversity but rarely have its ecological consequences been assessed. We studied forest-dwelling burying beetles (Coleoptera: Silphidae)—a guild of insects that requires carrion to complete their life cycles—along an urban-rural gradient of land use in Maryland. Our objective was to determine how forest fragmentation associated with urbanization affects (1) beetle community diversity and structure and (2) the ecological function provided by these insects, that is, decomposition of vertebrate carcasses. Forest fragmentation strongly reduced burying beetle diversity and abundance, and did so far more pervasively than urbanization of the surrounding landscape. The likelihood that beetles interred experimental baits was a direct, positive function of burying beetle diversity. We conclude that loss of burying beetle diversity resulting from forest fragmentation could have important ecological consequences in urban forests. 相似文献
46.
Jerald F. Lawless 《Revue canadienne de statistique》2004,32(3):327-331
Oiler, Gomez & Calle (2004) give a constant sum condition for processes that generate interval‐censored lifetime data. They show that in models satisfying this condition, it is possible to estimate non‐parametrically the lifetime distribution based on a well‐known simplified likelihood. The author shows that this constant‐sum condition is equivalent to the existence of an observation process that is independent of lifetimes and which gives the same probability distribution for the observed data as the underlying true process. 相似文献
47.
Göran Kauermann Renate Ortlieb 《Journal of the Royal Statistical Society. Series C, Applied statistics》2004,53(2):355-367
Summary. The pattern of absenteeism in the downsizing process of companies is a topic in focus in economics and social science. A general question is whether employees who are frequently absent are more likely to be selected to be laid off or in contrast whether employees to be dismissed are more likely to be absent for the remaining time of their working contract. We pursue an empirical and microeconomic investigation of these theses. We analyse longitudinal data that were collected in a German company over several years. We fit a semiparametric transition model based on a mixture Poisson distribution for the days of absenteeism per month. Prediction intervals are considered and the primary focus is on the period of downsizing. The data reveal clear evidence for the hypothesis that employees who are to be laid off are more frequently absent before leaving the company. Interestingly, though, no clear evidence is seen that employees being selected to leave the company are those with a bad absenteeism profile. 相似文献
48.
In this paper we discuss a new theoretical basis for perturbation methods. In developing this new theoretical basis, we define the ideal measures of data utility and disclosure risk. Maximum data utility is achieved when the statistical characteristics of the perturbed data are the same as that of the original data. Disclosure risk is minimized if providing users with microdata access does not result in any additional information. We show that when the perturbed values of the confidential variables are generated as independent realizations from the distribution of the confidential variables conditioned on the non-confidential variables, they satisfy the data utility and disclosure risk requirements. We also discuss the relationship between the theoretical basis and some commonly used methods for generating perturbed values of confidential numerical variables. 相似文献
49.
城市规划公众参与初探 总被引:6,自引:0,他引:6
在公众参与城市规划理念产生背景的基础上,简要回顾了国外公众参与理论,介绍了我国公众参与的影响因素及现状,提出了公众参与实现的三个方面的转变及公众参与的三个促进机制,论述了公众参与存在的几个问题及应对措施. 相似文献
50.
闵泽平 《三峡大学学报(人文社会科学版)》2003,25(3):39-41
历来人们大多认为孟浩然的归隐源于仕途上的挫折和政治的毫无出路,这一看法有些一厢情愿,忽略了对孟浩然自身兴趣的关注.虽然有关孟浩然的史料相当稀少,但从现存他的诗歌中,我们还是能够发现他对山水的爱好是由衷的.这决定了他交游的对象、他诗歌创作的题材和艺术风格. 相似文献