首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9686篇
  免费   447篇
  国内免费   164篇
管理学   470篇
劳动科学   2篇
民族学   79篇
人才学   1篇
人口学   278篇
丛书文集   602篇
理论方法论   344篇
综合类   4068篇
社会学   876篇
统计学   3577篇
  2024年   29篇
  2023年   133篇
  2022年   164篇
  2021年   187篇
  2020年   266篇
  2019年   338篇
  2018年   392篇
  2017年   472篇
  2016年   360篇
  2015年   331篇
  2014年   589篇
  2013年   1355篇
  2012年   700篇
  2011年   655篇
  2010年   499篇
  2009年   468篇
  2008年   432篇
  2007年   473篇
  2006年   419篇
  2005年   429篇
  2004年   341篇
  2003年   265篇
  2002年   201篇
  2001年   195篇
  2000年   144篇
  1999年   90篇
  1998年   95篇
  1997年   66篇
  1996年   31篇
  1995年   39篇
  1994年   26篇
  1993年   17篇
  1992年   22篇
  1991年   14篇
  1990年   14篇
  1989年   6篇
  1988年   8篇
  1987年   7篇
  1986年   6篇
  1985年   6篇
  1984年   6篇
  1983年   5篇
  1981年   1篇
  1980年   1篇
排序方式: 共有10000条查询结果,搜索用时 437 毫秒
41.
存储区域网络iSCSI协议的通信机制研究   总被引:1,自引:0,他引:1  
介绍了存储区域网络主要采用的组网协议,包括FC协议、FCIP协议、iFCP协议和iSCSI协议,着重研究了一种利用TCP/IPI网组建存储区域网络的协议-iSCSI协议,分析了iSCSI协议的通信机制,比较了在IP网络上实现iSCSI协议通信的3种方法,开发了一种iSCSI协议数据单元与TCP数据帧间的接口算法及其硬件设计,并用 VHDL语言成功进行了行为级的仿真。  相似文献   
42.
Summary.  Factor analysis is a powerful tool to identify the common characteristics among a set of variables that are measured on a continuous scale. In the context of factor analysis for non-continuous-type data, most applications are restricted to item response data only. We extend the factor model to accommodate ranked data. The Monte Carlo expectation–maximization algorithm is used for parameter estimation at which the E-step is implemented via the Gibbs sampler. An analysis based on both complete and incomplete ranked data (e.g. rank the top q out of k items) is considered. Estimation of the factor scores is also discussed. The method proposed is applied to analyse a set of incomplete ranked data that were obtained from a survey that was carried out in GuangZhou, a major city in mainland China, to investigate the factors affecting people's attitude towards choosing jobs.  相似文献   
43.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。  相似文献   
44.
Longitudinal data often contain missing observations, and it is in general difficult to justify particular missing data mechanisms, whether random or not, that may be hard to distinguish. The authors describe a likelihood‐based approach to estimating both the mean response and association parameters for longitudinal binary data with drop‐outs. They specify marginal and dependence structures as regression models which link the responses to the covariates. They illustrate their approach using a data set from the Waterloo Smoking Prevention Project They also report the results of simulation studies carried out to assess the performance of their technique under various circumstances.  相似文献   
45.
Silphids in urban forests: Diversity and function   总被引:2,自引:0,他引:2  
Wolf  Jordan M.  Gibbs  James P. 《Urban Ecosystems》2004,7(4):371-384
Many ecologists have examined the process of how urbanization reduces biological diversity but rarely have its ecological consequences been assessed. We studied forest-dwelling burying beetles (Coleoptera: Silphidae)—a guild of insects that requires carrion to complete their life cycles—along an urban-rural gradient of land use in Maryland. Our objective was to determine how forest fragmentation associated with urbanization affects (1) beetle community diversity and structure and (2) the ecological function provided by these insects, that is, decomposition of vertebrate carcasses. Forest fragmentation strongly reduced burying beetle diversity and abundance, and did so far more pervasively than urbanization of the surrounding landscape. The likelihood that beetles interred experimental baits was a direct, positive function of burying beetle diversity. We conclude that loss of burying beetle diversity resulting from forest fragmentation could have important ecological consequences in urban forests.  相似文献   
46.
Oiler, Gomez & Calle (2004) give a constant sum condition for processes that generate interval‐censored lifetime data. They show that in models satisfying this condition, it is possible to estimate non‐parametrically the lifetime distribution based on a well‐known simplified likelihood. The author shows that this constant‐sum condition is equivalent to the existence of an observation process that is independent of lifetimes and which gives the same probability distribution for the observed data as the underlying true process.  相似文献   
47.
Summary.  The pattern of absenteeism in the downsizing process of companies is a topic in focus in economics and social science. A general question is whether employees who are frequently absent are more likely to be selected to be laid off or in contrast whether employees to be dismissed are more likely to be absent for the remaining time of their working contract. We pursue an empirical and microeconomic investigation of these theses. We analyse longitudinal data that were collected in a German company over several years. We fit a semiparametric transition model based on a mixture Poisson distribution for the days of absenteeism per month. Prediction intervals are considered and the primary focus is on the period of downsizing. The data reveal clear evidence for the hypothesis that employees who are to be laid off are more frequently absent before leaving the company. Interestingly, though, no clear evidence is seen that employees being selected to leave the company are those with a bad absenteeism profile.  相似文献   
48.
In this paper we discuss a new theoretical basis for perturbation methods. In developing this new theoretical basis, we define the ideal measures of data utility and disclosure risk. Maximum data utility is achieved when the statistical characteristics of the perturbed data are the same as that of the original data. Disclosure risk is minimized if providing users with microdata access does not result in any additional information. We show that when the perturbed values of the confidential variables are generated as independent realizations from the distribution of the confidential variables conditioned on the non-confidential variables, they satisfy the data utility and disclosure risk requirements. We also discuss the relationship between the theoretical basis and some commonly used methods for generating perturbed values of confidential numerical variables.  相似文献   
49.
城市规划公众参与初探   总被引:6,自引:0,他引:6  
在公众参与城市规划理念产生背景的基础上,简要回顾了国外公众参与理论,介绍了我国公众参与的影响因素及现状,提出了公众参与实现的三个方面的转变及公众参与的三个促进机制,论述了公众参与存在的几个问题及应对措施.  相似文献   
50.
历来人们大多认为孟浩然的归隐源于仕途上的挫折和政治的毫无出路,这一看法有些一厢情愿,忽略了对孟浩然自身兴趣的关注.虽然有关孟浩然的史料相当稀少,但从现存他的诗歌中,我们还是能够发现他对山水的爱好是由衷的.这决定了他交游的对象、他诗歌创作的题材和艺术风格.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号