全文获取类型
收费全文 | 670篇 |
免费 | 10篇 |
国内免费 | 2篇 |
专业分类
管理学 | 93篇 |
民族学 | 6篇 |
人才学 | 1篇 |
人口学 | 6篇 |
丛书文集 | 38篇 |
理论方法论 | 32篇 |
综合类 | 206篇 |
社会学 | 73篇 |
统计学 | 227篇 |
出版年
2023年 | 6篇 |
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 15篇 |
2019年 | 10篇 |
2018年 | 14篇 |
2017年 | 24篇 |
2016年 | 7篇 |
2015年 | 13篇 |
2014年 | 15篇 |
2013年 | 154篇 |
2012年 | 23篇 |
2011年 | 16篇 |
2010年 | 26篇 |
2009年 | 24篇 |
2008年 | 29篇 |
2007年 | 23篇 |
2006年 | 23篇 |
2005年 | 21篇 |
2004年 | 20篇 |
2003年 | 23篇 |
2002年 | 34篇 |
2001年 | 17篇 |
2000年 | 16篇 |
1999年 | 21篇 |
1998年 | 13篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 12篇 |
1993年 | 5篇 |
1992年 | 13篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有682条查询结果,搜索用时 15 毫秒
1.
Reid Skibell 《Information, Communication & Society》2002,5(3):336-356
The seriousness of computer hacking is not exaggerated, it is far worse than that. The computer hacker has attained the status of myth; society associates all computer crime with a mythical perpetrator that bears no resemblance to reality. This paper will argue that in the early stages of the myth the computer hacker was regarded as a highly skilled but mentally disturbed youth who has an unhealthy association with computers. The new reality of electronic commerce resulted in pressures that culminated in the computer hacker becoming regarded as a dangerous criminal. A thorough analysis of the statistics will demonstrate that the majority of computer intruders are neither dangerous nor highly skilled, and thus nothing like the mythical hacker. 相似文献
2.
计算机辅助教学是传统教学模式的一个根本性变革 ,在高等教育中发挥的作用越来越明显。探讨了在进行计算机辅助教学课件 (CAI)的开发过程中 ,当前普遍存在的问题及其产生的原因 ,同时 ,初步提出了解决这些问题的方法 ,指出 CAI课件应向网络化、智能化方向发展 相似文献
3.
本文介绍了杭州汽轮机厂计算机集成制造系统HTW-CIMS的总体方案以及开发和应用该系统时遵循的技术路线。 相似文献
4.
西部高校怎样更好实现计算机与物理实验的整合 总被引:2,自引:0,他引:2
王晓璐 《贵州民族学院学报》2005,(3):159-160
随着计算机的飞速发展,学校里出现了越来越多的多媒体教室;CAI计算机辅助教学、虚拟实验教学等各种软件更是蓬勃发展起来;很多教育工作者提出物理实验中计算机仿真教学、物理实验中应用计算机辅助教学等各种措施.作为西部高校,我们应该根据自身资金有限、学生基础比较薄弱等特点,更好的实现计算机与物理实验的整合. 相似文献
5.
This paper proposes an experimental test to evaluate the performance of the serial cost sharing rule, originally proposed
by Shenker [Sigmetrics, 241–242 (1990)] and then analyzed by Moulin and Shenker [Econometrica 60, 1009–1037 (1992)]. We report
measures of the performance and efficiency of the serial mechanism by comparing the choices and payoffs attained by the subjects
to the expected equilibrium allocations. Experimental evidence shows that learning is needed for the subjects to converge
to the equilibrium strategy. However, in terms of efficiency, the serial mechanism leads to almost efficient allocations. 相似文献
6.
Robert Aslett Robert J. Buck Steven G. Duvall Jerome Sacks & William J. Welch 《Journal of the Royal Statistical Society. Series C, Applied statistics》1998,47(1):31-48
In electrical engineering, circuit designs are now often optimized via circuit simulation computer models. Typically, many response variables characterize the circuit's performance. Each response is a function of many input variables, including factors that can be set in the engineering design and noise factors representing manufacturing conditions. We describe a modelling approach which is appropriate for the simulator's deterministic input–output relationships. Non-linearities and interactions are identified without explicit assumptions about the functional form. These models lead to predictors to guide the reduction of the ranges of the designable factors in a sequence of experiments. Ultimately, the predictors are used to optimize the engineering design. We also show how a visualization of the fitted relationships facilitates an understanding of the engineering trade-offs between responses. The example used to demonstrate these methods, the design of a buffer circuit, has multiple targets for the responses, representing different trade-offs between the key performance measures. 相似文献
7.
论计算机信息及计算机信息交易——美国《统一计算机信息交易法》与美国《统一商法典》相关概念和规则的比较 总被引:4,自引:0,他引:4
刘颖 《暨南学报(哲学社会科学版)》2008,30(5)
1930年代,哥伦比亚大学卢埃林认识到,工业革命使工业产品成为社会财富的主要载体,需要新的合同法规则以适应新的经济.其结果就是美国<统一商法典>第2编的制定,该法的核心是"货物买卖".1990年代,信息革命的产生及深入发展,使信息和信息服务成为经济的核心,美国<统一计算机信息交易法>应运而生.该法的核心是"计算机信息许可".尽管存在对该法的诸多批评,该法仍具革命意义,并已在美国马里兰州和弗吉尼亚州实施近十年.我国应尽快建立以信息为标的交易法律制度,对信息进行明确的界定,并以此为基础,建立大众市场许可、信息担保、电子自助等制度. 相似文献
8.
以关键链方法中的二次资源冲突困境为切入点,从鲁棒调度优化角度提出一种解决策略.首先,采用定量化建模对问题进行数学描述和表达,剖析插入输入缓冲引起二次资源冲突的原理,进而采用场景分析法从复杂的冲突表象中分解出四种基本的冲突场景构成要素.其次,基于鲁棒调度优化理论,探究各种冲突子问题的有效对策并归类,据此开发出一种消除二次资源冲突的局部重调度启发式协调策略;根据策略设计基于两次调度进程和两类缓冲动态消耗的鲁棒性指标,采用鲁棒性关键链项目调度问题输出鲁棒性最大的调度方案.再次,设计仿真程序和三个测试指标:项目实际按期完工率、活动开始时间偏差绝对值之和及偏差绝对值的方差;基于ProGen随机地生成测试算例集合进行数值实验.结果发现,以鲁棒性调度方案为依据安排项目的实施过程,三个统计指标值都优于以传统关键链调度方案为依据时相对应的指标值.结论表明:基于鲁棒调度优化的二次资源冲突消除策略及设计的关键链鲁棒性指标在项目实施中具有较好的稳定性效果. 相似文献
9.
Dorin Drignei 《统计学通讯:模拟与计算》2016,45(9):3281-3293
Computer models with functional output are omnipresent throughout science and engineering. Most often the computer model is treated as a black-box and information about the underlying mathematical model is not exploited in statistical analyses. Consequently, general-purpose bases such as wavelets are typically used to describe the main characteristics of the functional output. In this article we advocate for using information about the underlying mathematical model in order to choose a better basis for the functional output. To validate this choice, a simulation study is presented in the context of uncertainty analysis for a computer model from inverse Sturm-Liouville problems. 相似文献
10.
A knowledge-based system supporting managerial problem diagnosis is described. The system provides the capability to monitor values of selected variables for problem situations. When problems are located, a list of problem symptoms is delivered to a problem processor for structuring and diagnosis. Problem structuring is based on a combination of concepts from expert systems and structural modeling. User assertions about cause-effect relationships between pairs of variables are maintained in a semantic network. Problem diagnosis uses the relationships in the semantic network to construct causation trees, the branches of which represent potential explanations of the problem symptoms. Mathematical models are constructed based on causation-tree branches, and values from the data base are used to test whether the model confirms the diagnosis. If so, the source of the problem has been located and it is then up to the user to resolve the problem. If the model fails to explain the problem, the model apparently is deficient and the user may perform “what if…” type scenarios in attempts to improve the model and search for problem causes. Realistic applications in the accounting and health care areas are discussed. 相似文献