全文获取类型
收费全文 | 790篇 |
免费 | 22篇 |
国内免费 | 6篇 |
专业分类
管理学 | 25篇 |
民族学 | 5篇 |
人才学 | 1篇 |
人口学 | 12篇 |
丛书文集 | 84篇 |
理论方法论 | 19篇 |
综合类 | 459篇 |
社会学 | 19篇 |
统计学 | 194篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 9篇 |
2020年 | 7篇 |
2019年 | 16篇 |
2018年 | 18篇 |
2017年 | 16篇 |
2016年 | 17篇 |
2015年 | 18篇 |
2014年 | 33篇 |
2013年 | 75篇 |
2012年 | 46篇 |
2011年 | 62篇 |
2010年 | 38篇 |
2009年 | 41篇 |
2008年 | 47篇 |
2007年 | 65篇 |
2006年 | 68篇 |
2005年 | 47篇 |
2004年 | 59篇 |
2003年 | 47篇 |
2002年 | 26篇 |
2001年 | 16篇 |
2000年 | 12篇 |
1999年 | 8篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1983年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有818条查询结果,搜索用时 31 毫秒
1.
Mihyun Kim 《Statistics》2019,53(4):699-720
Functional principal component scores are commonly used to reduce mathematically infinitely dimensional functional data to finite dimensional vectors. In certain applications, most notably in finance, these scores exhibit tail behaviour consistent with the assumption of regular variation. Knowledge of the index of the regular variation, α, is needed to apply methods of extreme value theory. The most commonly used method of the estimation of α is the Hill estimator. We derive conditions under which the Hill estimator computed from the sample scores is consistent for the tail index of the unobservable population scores. 相似文献
2.
股份合作制有其制度优势,特别适合小企业,资本与劳动的矛盾不是股份合作制的制度障碍,并对股权设置中的共有产权、资本与劳动关系、经营者积极性、治理结构、转让与筹资等问题提出我们的改进思路与方法。 相似文献
3.
廖晶 《中南大学学报(社会科学版)》2005,11(3):410-412
声音、节奏等具有伴随意义,有时是对语言本身意义的补充.在翻译时力求音义对应是实现等效翻译的一种重要手段.当然,英汉语音在结构、功能和表达方式上的差异也使音义对应有一定的限度. 相似文献
4.
Kenichi Ozaki 《Researches on Population Ecology》1993,35(2):273-284
Summary The number of larvae reaching maturity within the gall ofAdelges japonicus was positively related to gall volume, and the relationship between the number of mature larvae and gall volume did not change
with different densities of colonized larvae.
The population changes in the bud galls ofA. japonicus were surveyed by collecting the galls, which did not suffer predation or parasitism within the galls, from young artificial
plantations ofPicea jezoensis over two years. In the year when the density of colonized larvae was high, they suffered a 42% mortality within the galls,
whereas mortality was nearly zero in the low density year. The numbers of larvae per gall were positively correlated with
gall volume. The regression lines of the number of colonized larvae on gall volume did not differ significantly in the regression
coefficients between the two years, whereas the intercept was significantly higher in the year when the density of colonized
larvae was higher. However, different within-gall mortality nullified this difference, and the regression lines of the number
of mature larvae on gall volume had no significant difference both in the regression coefficients and the intercepts. This
suggests that the number of mature larvae per gall was limited by available resources within the gall which were positively
related to gall volume. In 25% of the galls in which mature larvae inhabited, the space within the galls were completely filled
by the larvae, indicating that space was one of the limiting resources. Gall volume also affected the number of adults that
emerged from the gall and the potential number of their progeny. 相似文献
5.
In this paper we discuss a new theoretical basis for perturbation methods. In developing this new theoretical basis, we define the ideal measures of data utility and disclosure risk. Maximum data utility is achieved when the statistical characteristics of the perturbed data are the same as that of the original data. Disclosure risk is minimized if providing users with microdata access does not result in any additional information. We show that when the perturbed values of the confidential variables are generated as independent realizations from the distribution of the confidential variables conditioned on the non-confidential variables, they satisfy the data utility and disclosure risk requirements. We also discuss the relationship between the theoretical basis and some commonly used methods for generating perturbed values of confidential numerical variables. 相似文献
6.
7.
左琳 《三峡大学学报(人文社会科学版)》2008,30(5):111-114
运用Halliday系统功能语法的观点和方法,主要探讨了语篇功能赖以实现的主位系统,分析主位结构和主位推进程序在实现语篇的衔接和连贯中的作用、所具有的文体功能以及主位的选择和使用表达说话者的不同目的的关系。 相似文献
8.
物上请求权在性质上属于债权 ,其种类应包括返还请求权、妨害除去请求权及妨害预防请求权 ,物上请求权不应适用消灭时效 相似文献
9.
穿越当代"经典"--文化寻根文学热点作品局限评述 总被引:1,自引:0,他引:1
所谓文学穿越,它一方面穿越的是政治和文化,并通过政治和文化走向人类关怀,另一方面穿越的是既定的各种世界观,建立起作家自己的世界观。本文所做的,就是依据一个作家应该建立起的对世界的独到的哲学性理解,来看中国新时期文学“文化寻根文学”阶段几部轰动性作品所存在的思想性和文学性局限。 相似文献
10.
张立 《长沙师范专科学校学报》2006,(3)
女性主义翻译是近二十年来新兴的一派翻译理论,其鲜明的旗帜与激进的主张在学术界引起较大反响。文章从女性主义与翻译的相互关系角度,分析了两者间的相互影响,论述了女性主义与翻译相结合的原因,并指出其对传统翻译理论的颠覆及其局限性。 相似文献