首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2265篇
  免费   70篇
  国内免费   39篇
管理学   30篇
民族学   12篇
人口学   23篇
丛书文集   248篇
理论方法论   72篇
综合类   1611篇
社会学   189篇
统计学   189篇
  2024年   5篇
  2023年   14篇
  2022年   21篇
  2021年   17篇
  2020年   27篇
  2019年   30篇
  2018年   41篇
  2017年   63篇
  2016年   56篇
  2015年   77篇
  2014年   128篇
  2013年   185篇
  2012年   135篇
  2011年   161篇
  2010年   132篇
  2009年   135篇
  2008年   139篇
  2007年   178篇
  2006年   170篇
  2005年   170篇
  2004年   135篇
  2003年   130篇
  2002年   63篇
  2001年   76篇
  2000年   25篇
  1999年   14篇
  1998年   9篇
  1997年   4篇
  1996年   12篇
  1995年   6篇
  1994年   5篇
  1992年   5篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1986年   2篇
  1978年   1篇
排序方式: 共有2374条查询结果,搜索用时 15 毫秒
31.
An outlier is defined as an observation that is significantly different from the others in its dataset. In high-dimensional regression analysis, datasets often contain a portion of outliers. It is important to identify and eliminate the outliers for fitting a model to a dataset. In this paper, a novel outlier detection method is proposed for high-dimensional regression problems. The leave-one-out idea is utilized to construct a novel outlier detection measure based on distance correlation, and then an outlier detection procedure is proposed. The proposed method enjoys several advantages. First, the outlier detection measure can be simply calculated, and the detection procedure works efficiently even for high-dimensional regression data. Moreover, it can deal with a general regression, which does not require specification of a linear regression model. Finally, simulation studies show that the proposed method behaves well for detecting outliers in high-dimensional regression model and performs better than some other competing methods.  相似文献   
32.
We study how well individuals in a face-to-face situation can delude others. We exploit data from a laboratory experiment in which participants were asked to assess video-taped statements as being rather truthful or untruthful. The statements are face-to-face tax declarations. The video clips feature each subject twice making the same declaration: One time the subject is reporting honestly, and the other time willingly dishonestly. This allows us to investigate within-subject differences in perceived truthfulness. Our study provides several novel insights. We find that individuals can cover up their lies successfully. On average, a subject is perceived as more truthful if she deceives than if she reports honestly. In particular, individuals with a genuine dishonest appearance manage to increase their perceived truthfulness by up to 14 percent when lying. Moreover, our results show that a subject appears less truthful if she had previously been caught lying. Being detected as a liar previously appears to impair self-confidence and to thereby lower an individual’s ability to deceive.  相似文献   
33.
Using a real-world data set encompassing the daily portfolio holdings and exposures of complex investment funds, we derive a set of quantitative attributes to capture essential behavioral features of fund managers. We find the existence and stability of three investment attitudes, namely the conservative, the reactive, and the pro-active profiles, defining communities that respond differently when facing external shocks. The conservative community has behavioral similarities that tend to decrease due to external shocks, the reactive community members greatly increase their activity level especially during turmoil phases, while delegated investors in the pro-active community are more resilient to turbulence and counterbalance the impact of the events by adjusting their portfolio exposures in advance. We show that exogenous shocks only temporarily perturb the behavioral traits of the communities which then go back to their original states once the distress is embedded.  相似文献   
34.
35.
This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.  相似文献   
36.
We present influence diagnostics for linear measurement error models with stochastic linear restrictions using the corrected likelihood of Nakamura in 1990. The case deletion and mean shift outlier models are developed to identify outlying and influential observations. We derive a corrected score test statistic for outlier detection based on mean shift outlier models. The analogs of Cook's distance and likelihood distance are proposed to determine influential observations based on case deletion models. A parametric bootstrap procedure is used to obtain empirical distributions of the test statistics and a simulation study has been used to evaluate the performance of the proposed estimators based on the mean squares error criterion and the score test statistic. Finally, a numerical example is given to illustrate the theoretical results.  相似文献   
37.
The aim of the study was to explore adolescents’ perceptions of substance use as a contributing factor to community violence by employing a conceptual framework proposed by Goldstein. Data were collected from a sample of adolescents between the ages of 15 and 16 years by means of focus group interviews. Theoretical thematic analysis was used to analyse and interpret the findings. The participants’ perceptions indicated that substance use and withdrawal symptoms induce physiological and behavioural modifications resulting in aggression and violence. The findings also suggest that participants believed that substance users frequently commit property and violent interpersonal crimes such as theft, robbery, assault and murder to procure their substances. Further, the adolescents’ perceived violence to be rooted within gang culture as well as the involvement in shared markets for illicit substance trading.  相似文献   
38.
This study highlights the symbiotic relationship that may arise between political and business actors in conspiracies organized around public construction bids. Based on a core-periphery social network analysis, the study tracks the emergence of such a conspiracy in the city of Laval (Canada) by illustrating the evolution of bid-rigging networks revolving around suspected and persistent acts of corruption, bid-rigging, and bribery. To assess this process, the study monitors irregular bidding indicators across a data set compiled from more than 7000 public construction tenders that were processed by the city from 1966 to 2013. Findings reveal that firms suspected of bid-rigging activities were perennial core participants largely as a result of a state-corporate crime system that served as the guiding force for agreements between the main construction entrepreneurs.  相似文献   
39.
We propose a semiparametric estimator for single‐index models with censored responses due to detection limits. In the presence of left censoring, the mean function cannot be identified without any parametric distributional assumptions, but the quantile function is still identifiable at upper quantile levels. To avoid parametric distributional assumption, we propose to fit censored quantile regression and combine information across quantile levels to estimate the unknown smooth link function and the index parameter. Under some regularity conditions, we show that the estimated link function achieves the non‐parametric optimal convergence rate, and the estimated index parameter is asymptotically normal. The simulation study shows that the proposed estimator is competitive with the omniscient least squares estimator based on the latent uncensored responses for data with normal errors but much more efficient for heavy‐tailed data under light and moderate censoring. The practical value of the proposed method is demonstrated through the analysis of a human immunodeficiency virus antibody data set.  相似文献   
40.
《刑法》第306条有关律师伪证罪的规定一直面临着悖逆民心的困境,但其原因并非实体内容不公正,而是欠缺程序上的合理限制,由此导致它沦为检察机关实施职业报复的工具。将律师纪律处分或行政处罚程序作为刑事诉讼程序的程序性前提,把取消会员资格的行业处分或吊销律师职业证书的行政处罚作为刑事诉讼的实体性前提,并限制刑事侦查的调查范围,可以合理地限制检察机关的偏见和恣意,带领该规定走出当前的困境。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号