首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
  示例: 沙坡头地区,人工植被区,变化  检索词用空格隔开表示必须包含全部检索词,用“,”隔开表示只需满足任一检索词即可!
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5634篇
  免费   34篇
管理学   1456篇
民族学   6篇
人口学   45篇
丛书文集   2篇
理论方法论   817篇
综合类   45篇
社会学   1688篇
统计学   1609篇
  2024年   1篇
  2021年   122篇
  2020年   301篇
  2019年   537篇
  2018年   321篇
  2017年   439篇
  2016年   396篇
  2015年   385篇
  2014年   418篇
  2013年   607篇
  2012年   413篇
  2011年   295篇
  2010年   303篇
  2009年   177篇
  2008年   201篇
  2007年   103篇
  2006年   111篇
  2005年   99篇
  2004年   111篇
  2003年   72篇
  2002年   79篇
  2001年   86篇
  2000年   68篇
  1999年   5篇
  1998年   2篇
  1997年   2篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1992年   3篇
  1990年   1篇
  1982年   1篇
  1981年   1篇
  1977年   1篇
排序方式: 共有5668条查询结果,搜索用时 15 毫秒
41.
    
Early and accurate detection of outbreaks is one of the most important objectives of syndromic surveillance systems. We propose a general Bayesian framework for syndromic surveillance systems. The methodology incorporates Gaussian Markov random field (GMRF) and spatio‐temporal conditional autoregressive (CAR) modeling. By contrast, most previous approaches have been based on only spatial or time series models. The model has appealing probabilistic representations as well as attractive statistical properties. Based on extensive simulation studies, the model is capable of capturing outbreaks rapidly, while still limiting false positives. © 2012 Wiley Periodicals, Inc. Statistical Analysis and Data Mining 5: 194–204, 2012  相似文献   
42.
    
Change‐point detection is the problem of discovering time points at which properties of time‐series data change. This covers a broad range of real‐world problems and has been actively discussed in the community of statistics and data mining. In this paper, we present a novel nonparametric approach to detecting the change of probability distributions of sequence data. Our key idea is to estimate the ratio of probability densities, not the probability densities themselves. This formulation allows us to avoid nonparametric density estimation, which is known to be a difficult problem. We provide a change‐point detection algorithm based on direct density‐ratio estimation that can be computed very efficiently in an online manner. The usefulness of the proposed method is demonstrated through experiments using artificial and real‐world datasets. © 2011 Wiley Periodicals, Inc. Statistical Analysis and Data Mining 2011  相似文献   
43.
    
Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205 This article is categorized under:
  • Algorithms and Computational Methods > Linear Programming
  • Algorithms and Computational Methods > Networks and Security
  相似文献   
44.
    
Missing data in clinical trials is a well‐known problem, and the classical statistical methods used can be overly simple. This case study shows how well‐established missing data theory can be applied to efficacy data collected in a long‐term open‐label trial with a discontinuation rate of almost 50%. Satisfaction with treatment in chronically constipated patients was the efficacy measure assessed at baseline and every 3 months postbaseline. The improvement in treatment satisfaction from baseline was originally analyzed with a paired t‐test ignoring missing data and discarding the correlation structure of the longitudinal data. As the original analysis started from missing completely at random assumptions regarding the missing data process, the satisfaction data were re‐examined, and several missing at random (MAR) and missing not at random (MNAR) techniques resulted in adjusted estimate for the improvement in satisfaction over 12 months. Throughout the different sensitivity analyses, the effect sizes remained significant and clinically relevant. Thus, even for an open‐label trial design, sensitivity analysis, with different assumptions for the nature of dropouts (MAR or MNAR) and with different classes of models (selection, pattern‐mixture, or multiple imputation models), has been found useful and provides evidence towards the robustness of the original analyses; additional sensitivity analyses could be undertaken to further qualify robustness. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
45.
    
The T‐optimality criterion is used in optimal design to derive designs for model selection. To set up the method, it is required that one of the models is considered to be true. We term this local T‐optimality. In this work, we propose a generalisation of T‐optimality (termed robust T‐optimality) that relaxes the requirement that one of the candidate models is set as true. We then show an application to a nonlinear mixed effects model with two candidate non‐nested models and combine robust T‐optimality with robust D‐optimality. Optimal design under local T‐optimality was found to provide adequate power when the a priori assumed true model was the true model but poor power if the a priori assumed true model was not the true model. The robust T‐optimality method provided adequate power irrespective of which model was true. The robust T‐optimality method appears to have useful properties for nonlinear models, where both the parameter values and model structure are required to be known a priori, and the most likely model that would be applied to any new experiment is not known with certainty. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
46.
    
In some exceptional circumstances, as in very rare diseases, nonrandomized one‐arm trials are the sole source of evidence to demonstrate efficacy and safety of a new treatment. The design of such studies needs a sound methodological approach in order to provide reliable information, and the determination of the appropriate sample size still represents a critical step of this planning process. As, to our knowledge, no method exists for sample size calculation in one‐arm trials with a recurrent event endpoint, we propose here a closed sample size formula. It is derived assuming a mixed Poisson process, and it is based on the asymptotic distribution of the one‐sample robust nonparametric test recently developed for the analysis of recurrent events data. The validity of this formula in managing a situation with heterogeneity of event rates, both in time and between patients, and time‐varying treatment effect was demonstrated with exhaustive simulation studies. Moreover, although the method requires the specification of a process for events generation, it seems to be robust under erroneous definition of this process, provided that the number of events at the end of the study is similar to the one assumed in the planning phase. The motivating clinical context is represented by a nonrandomized one‐arm study on gene therapy in a very rare immunodeficiency in children (ADA‐SCID), where a major endpoint is the recurrence of severe infections. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
47.
    
We study a class of semiparametric skewed distributions arising when the sample selection process produces non‐randomly sampled observations. Based on semiparametric theory and taking into account the symmetric nature of the population distribution, we propose both consistent estimators, i.e. robust to model mis‐specification, and efficient estimators, i.e. reaching the minimum possible estimation variance, of the location of the symmetric population. We demonstrate the theoretical properties of our estimators through asymptotic analysis and assess their finite sample performance through simulations. We also implement our methodology on a real data example of ambulatory expenditures to illustrate the applicability of the estimators in practice. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
48.
    
We use data on both daily stock returns and internet activity to estimate the value of Apple's iPhone and related intellectual property. We find the private value of iPhone to be 10%–13% of Apple's market cap. Grounded in the resource‐based theory, we argue that much of this value stems from Apple's managerial capabilities to capitalize on the product, as proprietary technology explains about 25% of the private value. This effect arises from patent applications, rather than grants or trademarks. Our analysis of the global supply chain of iPhone suggests that besides Apple, firms in the supply chain are able to capture very limited value from iPhone. These results support the theory of dynamic capabilities, maintaining that a firm's unique dynamic managerial and organizational capabilities are crucial for value creation in globally competitive innovative industries.  相似文献   
49.
    
In this paper, we investigate the evolution of multinational corporation (MNC) research and development (R&D) subsidiaries through evolution of innovation networks. Their evolution within and outside MNC R&D subsidiaries has not been investigated in the context of MNCs that source innovation from emerging economies. We do so, using two dimensions: geographical and organizational boundaries. In order to identify a pattern, we chose the information technology (IT) cluster in Bangalore, India, as the context for a qualitative study; for there are MNC subsidiaries that operate and innovate within and outside organizational boundaries, and have strong links with firms within and outside of Bangalore cluster. The globalized nature of the cluster helps us infer the evolution of innovation networks by taking a knowledge flow perspective. We identify four distinct phases based on where and how knowledge flows. We find that the innovation networks of these MNC subsidiaries in emerging economies first develop as hierarchical networks and then extend to the local markets. Within the first part, the networks start with a non‐local nature (phase A) and get embedded into local networks (phase B and phase C), finally developing into non‐local (phase D) market ties that enable MNC headquarters to source innovation from the host country. In an emerging economy context, clusters can serve as a springboard by providing a local environment that can help overcome institutional voids.  相似文献   
50.
    
This paper investigates the link between resource and skill transfers and the long‐term performance of acquisitions. Rather than taking the more common acquirer's perspective, this research emphasizes the point of view of the acquired firm and focuses on a little‐studied type of business, namely, small and medium‐sized subcontractor firms. Through 14 case studies of subcontractor acquisitions, we show that those acquired firms can improve their long‐term performance in terms of turnover, profitability, number of employees and reduced dependency, if they receive certain types of new resources and skills from acquirers. Particularly, post‐acquisition performance is more closely related to the transfer of managerial and functional skills than to operational resources. Three factors (e.g., geographical, business and cultural proximity) also help facilitate some types of transfers. However, the degree of post‐acquisition integration does not play a key role in those transfers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号