全文获取类型
收费全文 | 567篇 |
免费 | 16篇 |
国内免费 | 4篇 |
专业分类
管理学 | 34篇 |
民族学 | 1篇 |
人口学 | 3篇 |
丛书文集 | 15篇 |
理论方法论 | 5篇 |
综合类 | 303篇 |
社会学 | 38篇 |
统计学 | 188篇 |
出版年
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 4篇 |
2020年 | 13篇 |
2019年 | 11篇 |
2018年 | 20篇 |
2017年 | 28篇 |
2016年 | 19篇 |
2015年 | 24篇 |
2014年 | 24篇 |
2013年 | 75篇 |
2012年 | 26篇 |
2011年 | 31篇 |
2010年 | 35篇 |
2009年 | 28篇 |
2008年 | 32篇 |
2007年 | 36篇 |
2006年 | 37篇 |
2005年 | 34篇 |
2004年 | 17篇 |
2003年 | 11篇 |
2002年 | 6篇 |
2001年 | 11篇 |
2000年 | 8篇 |
1999年 | 8篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 12篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1992年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1981年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有587条查询结果,搜索用时 31 毫秒
1.
Cédric Béguin Beat Hulliger 《Journal of the Royal Statistical Society. Series A, (Statistics in Society)》2004,167(2):275-294
Summary. As a part of the EUREDIT project new methods to detect multivariate outliers in incomplete survey data have been developed. These methods are the first to work with sampling weights and to be able to cope with missing values. Two of these methods are presented here. The epidemic algorithm simulates the propagation of a disease through a population and uses extreme infection times to find outlying observations. Transformed rank correlations are robust estimates of the centre and the scatter of the data. They use a geometric transformation that is based on the rank correlation matrix. The estimates are used to define a Mahalanobis distance that reveals outliers. The two methods are applied to a small data set and to one of the evaluation data sets of the EUREDIT project. 相似文献
2.
陈方竞 《北华大学学报(社会科学版)》2008,9(5):84-89
穆木天思想和创作在中国现代文学中是一个十分复杂的现象,其核心体现了与“边缘文化”相联系的左翼文学的精神特征,与30年代左翼文学的灵魂——鲁迅有着一致的精神趋向。以鲁迅为代表的左翼文学体现了中国现代文学的“先锋性”,在这个问题上,穆木天的文艺思想既有重要的价值,又存在着局限性,这种局限是与他的“日本体验”内在相关的。 相似文献
3.
提出了一种基于移动代理的新型分布式入侵检测系统。该系统是针对广域网环境专门设计的,数据的处理通过各节点所设置的代理来进行分布式计算,不仅能实现全网络范围内的入侵检测功能,具有良好的可移植性;而且对网络系统和主机的资源占用较低,减少了出现网络瓶颈的可能。还建立了移动代理的新型分布式入侵检测系统的体系结构和理论分析模型,并讨论了该系统的维护更新机制。 相似文献
4.
本文从CCD图象输入系统误差引起图象检测信号失真的原因分析出发,以降低系统装校误差精度要求和增大元器件离散性的宽容度为目标,讨论朱真校正方法的原理和数学描述。最后,介绍两种失真校正方法。 相似文献
5.
稳频横向塞曼He-Ne激光器作为一种新型光源,具有功率大、频差低、易于相位细分的特点,因而能广泛应用于各种精密测量中.本文介绍了我们研制的稳频横向塞曼激光器,实验结果表明,其激光频率稳定度达4.7×10(-10),再现性达1.8×10(-8). 相似文献
6.
利用互联网环境,从技术的角度出发,对一稿多投、抄袭行为、剽窃行为以及捏造行为等学术不端行为的检测与防范进行研究,提出了各种操作上可行的方法。实践证明,运用这些方法,可有效地防范有学术不端行为的文章在学术期刊上发表。 相似文献
7.
Tao Wang 《统计学通讯:理论与方法》2017,46(14):6947-6958
An outlier is defined as an observation that is significantly different from the others in its dataset. In high-dimensional regression analysis, datasets often contain a portion of outliers. It is important to identify and eliminate the outliers for fitting a model to a dataset. In this paper, a novel outlier detection method is proposed for high-dimensional regression problems. The leave-one-out idea is utilized to construct a novel outlier detection measure based on distance correlation, and then an outlier detection procedure is proposed. The proposed method enjoys several advantages. First, the outlier detection measure can be simply calculated, and the detection procedure works efficiently even for high-dimensional regression data. Moreover, it can deal with a general regression, which does not require specification of a linear regression model. Finally, simulation studies show that the proposed method behaves well for detecting outliers in high-dimensional regression model and performs better than some other competing methods. 相似文献
8.
We study how well individuals in a face-to-face situation can delude others. We exploit data from a laboratory experiment in which participants were asked to assess video-taped statements as being rather truthful or untruthful. The statements are face-to-face tax declarations. The video clips feature each subject twice making the same declaration: One time the subject is reporting honestly, and the other time willingly dishonestly. This allows us to investigate within-subject differences in perceived truthfulness. Our study provides several novel insights. We find that individuals can cover up their lies successfully. On average, a subject is perceived as more truthful if she deceives than if she reports honestly. In particular, individuals with a genuine dishonest appearance manage to increase their perceived truthfulness by up to 14 percent when lying. Moreover, our results show that a subject appears less truthful if she had previously been caught lying. Being detected as a liar previously appears to impair self-confidence and to thereby lower an individual’s ability to deceive. 相似文献
9.
Using a real-world data set encompassing the daily portfolio holdings and exposures of complex investment funds, we derive a set of quantitative attributes to capture essential behavioral features of fund managers. We find the existence and stability of three investment attitudes, namely the conservative, the reactive, and the pro-active profiles, defining communities that respond differently when facing external shocks. The conservative community has behavioral similarities that tend to decrease due to external shocks, the reactive community members greatly increase their activity level especially during turmoil phases, while delegated investors in the pro-active community are more resilient to turbulence and counterbalance the impact of the events by adjusting their portfolio exposures in advance. We show that exogenous shocks only temporarily perturb the behavioral traits of the communities which then go back to their original states once the distress is embedded. 相似文献
10.
This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility. 相似文献