首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   523篇
  免费   16篇
  国内免费   4篇
管理学   28篇
民族学   1篇
人口学   2篇
丛书文集   11篇
理论方法论   3篇
综合类   285篇
社会学   32篇
统计学   181篇
  2023年   3篇
  2022年   2篇
  2021年   4篇
  2020年   13篇
  2019年   11篇
  2018年   19篇
  2017年   28篇
  2016年   18篇
  2015年   23篇
  2014年   22篇
  2013年   73篇
  2012年   23篇
  2011年   26篇
  2010年   34篇
  2009年   22篇
  2008年   28篇
  2007年   33篇
  2006年   35篇
  2005年   31篇
  2004年   16篇
  2003年   10篇
  2002年   6篇
  2001年   11篇
  2000年   8篇
  1999年   6篇
  1998年   6篇
  1997年   3篇
  1996年   11篇
  1995年   5篇
  1994年   3篇
  1992年   4篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1986年   2篇
  1978年   1篇
排序方式: 共有543条查询结果,搜索用时 15 毫秒
1.
Summary.  As a part of the EUREDIT project new methods to detect multivariate outliers in incomplete survey data have been developed. These methods are the first to work with sampling weights and to be able to cope with missing values. Two of these methods are presented here. The epidemic algorithm simulates the propagation of a disease through a population and uses extreme infection times to find outlying observations. Transformed rank correlations are robust estimates of the centre and the scatter of the data. They use a geometric transformation that is based on the rank correlation matrix. The estimates are used to define a Mahalanobis distance that reveals outliers. The two methods are applied to a small data set and to one of the evaluation data sets of the EUREDIT project.  相似文献   
2.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。  相似文献   
3.
本文从CCD图象输入系统误差引起图象检测信号失真的原因分析出发,以降低系统装校误差精度要求和增大元器件离散性的宽容度为目标,讨论朱真校正方法的原理和数学描述。最后,介绍两种失真校正方法。  相似文献   
4.
稳频横向塞曼He-Ne激光器作为一种新型光源,具有功率大、频差低、易于相位细分的特点,因而能广泛应用于各种精密测量中.本文介绍了我们研制的稳频横向塞曼激光器,实验结果表明,其激光频率稳定度达4.7×10(-10),再现性达1.8×10(-8).  相似文献   
5.
利用互联网环境,从技术的角度出发,对一稿多投、抄袭行为、剽窃行为以及捏造行为等学术不端行为的检测与防范进行研究,提出了各种操作上可行的方法。实践证明,运用这些方法,可有效地防范有学术不端行为的文章在学术期刊上发表。  相似文献   
6.
An outlier is defined as an observation that is significantly different from the others in its dataset. In high-dimensional regression analysis, datasets often contain a portion of outliers. It is important to identify and eliminate the outliers for fitting a model to a dataset. In this paper, a novel outlier detection method is proposed for high-dimensional regression problems. The leave-one-out idea is utilized to construct a novel outlier detection measure based on distance correlation, and then an outlier detection procedure is proposed. The proposed method enjoys several advantages. First, the outlier detection measure can be simply calculated, and the detection procedure works efficiently even for high-dimensional regression data. Moreover, it can deal with a general regression, which does not require specification of a linear regression model. Finally, simulation studies show that the proposed method behaves well for detecting outliers in high-dimensional regression model and performs better than some other competing methods.  相似文献   
7.
We study how well individuals in a face-to-face situation can delude others. We exploit data from a laboratory experiment in which participants were asked to assess video-taped statements as being rather truthful or untruthful. The statements are face-to-face tax declarations. The video clips feature each subject twice making the same declaration: One time the subject is reporting honestly, and the other time willingly dishonestly. This allows us to investigate within-subject differences in perceived truthfulness. Our study provides several novel insights. We find that individuals can cover up their lies successfully. On average, a subject is perceived as more truthful if she deceives than if she reports honestly. In particular, individuals with a genuine dishonest appearance manage to increase their perceived truthfulness by up to 14 percent when lying. Moreover, our results show that a subject appears less truthful if she had previously been caught lying. Being detected as a liar previously appears to impair self-confidence and to thereby lower an individual’s ability to deceive.  相似文献   
8.
Using a real-world data set encompassing the daily portfolio holdings and exposures of complex investment funds, we derive a set of quantitative attributes to capture essential behavioral features of fund managers. We find the existence and stability of three investment attitudes, namely the conservative, the reactive, and the pro-active profiles, defining communities that respond differently when facing external shocks. The conservative community has behavioral similarities that tend to decrease due to external shocks, the reactive community members greatly increase their activity level especially during turmoil phases, while delegated investors in the pro-active community are more resilient to turbulence and counterbalance the impact of the events by adjusting their portfolio exposures in advance. We show that exogenous shocks only temporarily perturb the behavioral traits of the communities which then go back to their original states once the distress is embedded.  相似文献   
9.
This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.  相似文献   
10.
We present influence diagnostics for linear measurement error models with stochastic linear restrictions using the corrected likelihood of Nakamura in 1990. The case deletion and mean shift outlier models are developed to identify outlying and influential observations. We derive a corrected score test statistic for outlier detection based on mean shift outlier models. The analogs of Cook's distance and likelihood distance are proposed to determine influential observations based on case deletion models. A parametric bootstrap procedure is used to obtain empirical distributions of the test statistics and a simulation study has been used to evaluate the performance of the proposed estimators based on the mean squares error criterion and the score test statistic. Finally, a numerical example is given to illustrate the theoretical results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号