首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   476篇
  免费   95篇
  国内免费   5篇
化学   27篇
力学   3篇
综合类   16篇
数学   376篇
物理学   154篇
  2023年   5篇
  2022年   20篇
  2021年   43篇
  2020年   30篇
  2019年   16篇
  2018年   5篇
  2017年   28篇
  2016年   38篇
  2015年   7篇
  2014年   29篇
  2013年   70篇
  2012年   18篇
  2011年   22篇
  2010年   17篇
  2009年   24篇
  2008年   16篇
  2007年   22篇
  2006年   19篇
  2005年   16篇
  2004年   14篇
  2003年   3篇
  2002年   24篇
  2001年   13篇
  2000年   19篇
  1999年   7篇
  1998年   7篇
  1997年   2篇
  1996年   2篇
  1995年   2篇
  1992年   1篇
  1991年   2篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1984年   6篇
  1983年   9篇
  1982年   11篇
  1981年   2篇
  1980年   1篇
排序方式: 共有576条查询结果,搜索用时 15 毫秒
541.
542.
The collaboration network generated by the Erasmus student mobilities in the year 2003 is analyzed and modeled. Nodes of this bipartite network are European universities and links are the Erasmus mobilities between these universities. This network is a complex directed and weighted graph. The non-directed and non-weighted projection of this network does not exhibit a scale-free nature, but proves to be a small-word type random network with a giant component. The connectivity data indicates an exponential degree distribution, a relatively high clustering coefficient and a small radius. It can be easily modeled by using a simple configuration model and arguing the exponential degree distribution. The weighted and directed version of the network can also be described by means of simple random network models.  相似文献   
543.
In research and application, social networks are increasingly extracted from relationships inferred by name collocations in text-based documents. Despite the fact that names represent real entities, names are not unique identifiers and it is often unclear when two name observations correspond to the same underlying entity. One confounder stems from ambiguity, in which the same name correctly references multiple entities. Prior name disambiguation methods measured similarity between two names as a function of their respective documents. In this paper, we propose an alternative similarity metric based on the probability of walking from one ambiguous name to another in a random walk of the social network constructed from all documents. We experimentally validate our model on actor-actor relationships derived from the Internet Movie Database. Using a global similarity threshold, we demonstrate random walks achieve a significant increase in disambiguation capability in comparison to prior models. Bradley A. Malin is a Ph.D. candidate in the School of Computer Science at Carnegie Mellon University. He is an NSF IGERT fellow in the Center for Computational Analysis of Social and Organizational Systems (CASOS) and a researcher at the Laboratory for International Data Privacy. His research is interdisciplinary and combines aspects of bioinformatics, data forensics, data privacy and security, entity resolution, and public policy. He has developed learning algorithms for surveillance in distributed systems and designed formal models for the evaluation and the improvement of privacy enhancing technologies in real world environments, including healthcare and the Internet. His research on privacy in genomic databases has received several awards from the American Medical Informatics Association and has been cited in congressional briefings on health data privacy. He currently serves as managing editor of the Journal of Privacy Technology. Edoardo M. Airoldi is a Ph.D. student in the School of Computer Science at Carnegie Mellon University. Currently, he is a researcher in the CASOS group and at the Center for Automated Learning and Discovery. His methodology is based on probability theory, approximation theorems, discrete mathematics and their geometries. His research interests include data mining and machine learning techniques for temporal and relational data, data linkage and data privacy, with important applications to dynamic networks, biological sequences and large collections of texts. His research on dynamic network tomography is the state-of-the-art for recovering information about who is communicating to whom in a network, and was awarded honors from the ACM SIG-KDD community. Several companies focusing on information extraction have adopted his methodology for text analysis. He is currently investigating practical and theoretical aspects of hierarchical mixture models for temporal and relational data, and an abstract theory of data linkage. Kathleen M. Carley is a Professor of Computer Science in ISRI, School of Computer Science at Carnegie Mellon University. She received her Ph.D. from Harvard in Sociology. Her research combines cognitive science, social and dynamic networks, and computer science (particularly artificial intelligence and machine learning techniques) to address complex social and organizational problems. Her specific research areas are computational social and organization science, social adaptation and evolution, social and dynamic network analysis, and computational text analysis. Her models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale tools she and the CASOS group have developed are: BioWar a city, scale model of weaponized biological attacks and response; Construct a models of the co-evolution of social and knowledge networks; and ORA a statistical toolkit for dynamic social Network data.  相似文献   
544.
Graph Theoretic and Spectral Analysis of Enron Email Data   总被引:1,自引:0,他引:1  
Analysis of social networks to identify communities and model their evolution has been an active area of recent research. This paper analyzes the Enron email data set to discover structures within the organization. The analysis is based on constructing an email graph and studying its properties with both graph theoretical and spectral analysis techniques. The graph theoretical analysis includes the computation of several graph metrics such as degree distribution, average distance ratio, clustering coefficient and compactness over the email graph. The spectral analysis shows that the email adjacency matrix has a rank-2 approximation. It is shown that preprocessing of data has significant impact on the results, thus a standard form is needed for establishing a benchmark data. Anurat Chapanond is currently a Ph.D. student in Computer Science, RPI. Anurat graduated B. Eng. degree in Computer Engineering from Chiangmai University (Thailand) in 1997, M. S. in Computer Science from Columbia University in 2002. His research interest is in web data mining analyses and algorithms. M.S. Krishnamoorthy received the B.E. degree (with honors) from Madras University in 1969, the M. Tech degree in Electrical Engineering from the Indian Institute of Technology, Kanpur, in 1971, and the Ph. D. degree in Computer Science, also from the Indian Institute of Technology, in 1976. From 1976 to 1979, he was an Assistant Professor of Computer Science at the Indian Institute of Technology, Kanpur. From 1979 to 1985, he was an Assistant Professor of Computer Science at Rensselaer Polytechnic Institute, Troy, NY, and since, 1985, he has been an Associate Professor of Computer Science at Rensselaer. Dr. Krishnamoorthy's research interests are in the design and analysis of combinatorial and algebraic algorithms, visualization algorithms and programming environments. Bulent Yener is an Associate Professor in the Department of Computer Science and Co-Director of Pervasive Computing and Networking Center at Rensselaer Polytechnic Institute in Troy, New York. He is also a member of Griffiss Institute of Information Assurance. Dr. Yener received MS. and Ph.D. degrees in Computer Science, both from Columbia University, in 1987 and 1994, respectively. Before joining to RPI, he was a Member of Technical Staff at the Bell Laboratories in Murray Hill, New Jersey. His current research interests include bioinformatics, medical informtatics, routing problems in wireless networks, security and information assurance, intelligence and security informatics. He has served on the Technical Program Committee of leading IEEE conferences and workshops. Currently He is an associate editor of ACM/Kluwer Winet journal and the IEEE Network Magazine. Dr. Yener is a Senior Member of the IEEE Computer Society.  相似文献   
545.
Private Games are too Dangerous   总被引:1,自引:0,他引:1  
Given the difficulty of observing interpersonal relations as they develop within an organization, I use iterated prisoner&2018;s dilemma games to simulate their development. The goal is to understand how trust could develop as a function of private games, that is, as a function of interaction sequences between two people independent of their relationships with other people. My baseline is Axelrod&2018;s results with TIT for TAT showing that cooperation can emerge as the dominant form of interaction even in a society of selfish individuals without central authority. I replicate Axelrod&2018;s results, then show that the results only occur in a rare social context&2014;maximum density networks. Where people form less dense networks by withdrawing from unproductive relationships, as is typical in organizations, the competitive advantage shifts from TIT for TAT to abusive strategies. A devious PUSHY strategy wins in moderate to high density networks. A blatantly HOSTILE strategy wins in less dense networks. Abusive players do well in sparse networks because their abuse is lucrative in the initial exchanges of a relationship&2014;before the other person knows to withdraw. Wise players avoiding the abusive players leaves the abusive players free to concentrate on naive players (con men thrive in big cities). The implication is that what keeps abusive players at bay are friends and acquaintances warning managers away from people known to exploit their colleagues. I reinforce the point with illustrative survey data to conclude that private games are not only too dangerous, but also too rare and too slow to be the foundation for trust within organizations. The results are an evidential call for the sociological intuition that trust and distrust cannot be understood independent of the network context in which they are produced.  相似文献   
546.
During a speculative episode the price of an item jumps from an initial level p1 to a peak level p2 before more or less returning to level p1 . The ratio p 2/p 1 is referred to as the amplitude A of the peak. This paper shows that for a given market the peak amplitude is a linear function of the logarithm of the price at the beginning of the speculative episode; with p1 expressed in 1999 euros the relationship takes the form: ; the values of the parameter a turn out to be relatively independent of the market considered: , the values of the parameter b are more market-dependent, but are stable in the course of time for a given market. This relationship suggests that the higher the stakes the more “bullish” the market becomes. Possible mechanisms of this “risk affinity” effect are discussed. Received 29 September 1999  相似文献   
547.
以交通运输高速公路与信息高速公路为典例,通过这两类性质相异的交通运输管理技术系统和电子信息技术系统类比,显示两有诸多方面的相似行为与技术,从而表明社会技术与自然技术可以相互借鉴和移植;事理与物理相通。开展自然技术模仿社会的研究,以及在系统工程范畴里,开展社会技术和自然技术的综合研究,不仅有理论意义,而且有实用价值。  相似文献   
548.
The purpose of this paper is to propose and describe an alternative to an overarching theory for social simulation research. The approach is an analogy of the canonical matrix. Canonical matrices are matrices of a standard form and there are transformations that can be performed on other matrices to show that they can be made into canonical matrices. All matrices which, by means of allowable operations, can be transformed into a canonical matrix have the properties of the canonical matrix. This conception of canonicity is applied to three models in the computational organization theory literature. The models are mapped into their respective canonical forms. The canonical forms are shown to be transitively subsumptive (i.e., one of them is nested within a second which itself is nested within the third. The consequences of these subsumption relations are investigated by means of simulation experiments.  相似文献   
549.
This paper develops several optimization principles relating the fundamental concepts of Pareto efficiency and competitive equilibria. The beginning point for this development is the introduction of a new function describing individual preferences, closely related to willingness-to-pay, termed the benefit function. An important property of the benefit function is that it can be summed across individuals to obtain a meaningful measure of total benefit relative to a given set of utility levels; and the optimization principles presented in the paper are based on maximization of this total benefit.Specifically, it is shown that, under appropriate technical assumptions, a Pareto-efficient allocationX maximizes the total benefit relative to the utility levels it yields. Conversely, if an allocationX yields zero benefit and maximizes the total benefit function, then that allocation is Pareto efficient. The Lagrange multipliersp of the benefit maximization problem serve as prices; and the (X,p) pair satisfies a generalized saddle-point property termed a Lagrange equilibrium. This in turn is equivalent, under appropriate assumptions, to a competitive equilibrium.There are natural duals to all of the results stated above. The dual optimization principle is based on a surplus function which is a function of prices. The surplus is the total income generated at pricesp, minus the total income required to obtain given utility levels. The dual optimization principle states that prices that are dual (or indirect) Pareto efficient minimize total surplus and render it zero. Conversely, a set of prices that minimizes total surplus and renders it zero is a dual Pareto efficient set of prices.The results of the paper can be viewed as augmenting the first and second theorems of welfare economics (and their duals) to provide a family of results that relate the important economic concepts of Pareto efficiency, equilibrium, dual (or indirect) Pareto efficiency, total benefit, Lagrange equilibrium, and total surplus.The author wishes to thank Charles R. Bowman and Andrew J. Yates for several valuable suggestions and corrections.  相似文献   
550.
Theory of rumour spreading in complex social networks   总被引:1,自引:0,他引:1  
We introduce a general stochastic model for the spread of rumours, and derive mean-field equations that describe the dynamics of the model on complex social networks (in particular, those mediated by the Internet). We use analytical and numerical solutions of these equations to examine the threshold behaviour and dynamics of the model on several models of such networks: random graphs, uncorrelated scale-free networks and scale-free networks with assortative degree correlations. We show that in both homogeneous networks and random graphs the model exhibits a critical threshold in the rumour spreading rate below which a rumour cannot propagate in the system. In the case of scale-free networks, on the other hand, this threshold becomes vanishingly small in the limit of infinite system size. We find that the initial rate at which a rumour spreads is much higher in scale-free networks than in random graphs, and that the rate at which the spreading proceeds on scale-free networks is further increased when assortative degree correlations are introduced. The impact of degree correlations on the final fraction of nodes that ever hears a rumour, however, depends on the interplay between network topology and the rumour spreading rate. Our results show that scale-free social networks are prone to the spreading of rumours, just as they are to the spreading of infections. They are relevant to the spreading dynamics of chain emails, viral advertising and large-scale information dissemination algorithms on the Internet.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号