全文获取类型
收费全文 | 476篇 |
免费 | 95篇 |
国内免费 | 5篇 |
专业分类
化学 | 27篇 |
力学 | 3篇 |
综合类 | 16篇 |
数学 | 376篇 |
物理学 | 154篇 |
出版年
2023年 | 5篇 |
2022年 | 20篇 |
2021年 | 43篇 |
2020年 | 30篇 |
2019年 | 16篇 |
2018年 | 5篇 |
2017年 | 28篇 |
2016年 | 38篇 |
2015年 | 7篇 |
2014年 | 29篇 |
2013年 | 70篇 |
2012年 | 18篇 |
2011年 | 22篇 |
2010年 | 17篇 |
2009年 | 24篇 |
2008年 | 16篇 |
2007年 | 22篇 |
2006年 | 19篇 |
2005年 | 16篇 |
2004年 | 14篇 |
2003年 | 3篇 |
2002年 | 24篇 |
2001年 | 13篇 |
2000年 | 19篇 |
1999年 | 7篇 |
1998年 | 7篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 6篇 |
1983年 | 9篇 |
1982年 | 11篇 |
1981年 | 2篇 |
1980年 | 1篇 |
排序方式: 共有576条查询结果,搜索用时 15 毫秒
541.
542.
The collaboration network generated by the Erasmus student mobilities in the year 2003 is analyzed and modeled. Nodes of this bipartite network are European universities and links are the Erasmus mobilities between these universities. This network is a complex directed and weighted graph. The non-directed and non-weighted projection of this network does not exhibit a scale-free nature, but proves to be a small-word type random network with a giant component. The connectivity data indicates an exponential degree distribution, a relatively high clustering coefficient and a small radius. It can be easily modeled by using a simple configuration model and arguing the exponential degree distribution. The weighted and directed version of the network can also be described by means of simple random network models. 相似文献
543.
Bradley?MalinEmail author Edoardo?Airoldi Kathleen?M.?Carley 《Computational & Mathematical Organization Theory》2005,11(2):119-139
In research and application, social networks are increasingly extracted from relationships inferred by name collocations in
text-based documents. Despite the fact that names represent real entities, names are not unique identifiers and it is often
unclear when two name observations correspond to the same underlying entity. One confounder stems from ambiguity, in which
the same name correctly references multiple entities. Prior name disambiguation methods measured similarity between two names
as a function of their respective documents. In this paper, we propose an alternative similarity metric based on the probability
of walking from one ambiguous name to another in a random walk of the social network constructed from all documents. We experimentally
validate our model on actor-actor relationships derived from the Internet Movie Database. Using a global similarity threshold,
we demonstrate random walks achieve a significant increase in disambiguation capability in comparison to prior models.
Bradley A. Malin is a Ph.D. candidate in the School of Computer Science at Carnegie Mellon University. He is an NSF IGERT fellow in the Center
for Computational Analysis of Social and Organizational Systems (CASOS) and a researcher at the Laboratory for International
Data Privacy. His research is interdisciplinary and combines aspects of bioinformatics, data forensics, data privacy and security,
entity resolution, and public policy. He has developed learning algorithms for surveillance in distributed systems and designed
formal models for the evaluation and the improvement of privacy enhancing technologies in real world environments, including
healthcare and the Internet. His research on privacy in genomic databases has received several awards from the American Medical
Informatics Association and has been cited in congressional briefings on health data privacy. He currently serves as managing
editor of the Journal of Privacy Technology.
Edoardo M. Airoldi is a Ph.D. student in the School of Computer Science at Carnegie Mellon University. Currently, he is a researcher in the
CASOS group and at the Center for Automated Learning and Discovery. His methodology is based on probability theory, approximation
theorems, discrete mathematics and their geometries. His research interests include data mining and machine learning techniques
for temporal and relational data, data linkage and data privacy, with important applications to dynamic networks, biological
sequences and large collections of texts. His research on dynamic network tomography is the state-of-the-art for recovering
information about who is communicating to whom in a network, and was awarded honors from the ACM SIG-KDD community. Several
companies focusing on information extraction have adopted his methodology for text analysis. He is currently investigating
practical and theoretical aspects of hierarchical mixture models for temporal and relational data, and an abstract theory
of data linkage.
Kathleen M. Carley is a Professor of Computer Science in ISRI, School of Computer Science at Carnegie Mellon University. She received her Ph.D.
from Harvard in Sociology. Her research combines cognitive science, social and dynamic networks, and computer science (particularly
artificial intelligence and machine learning techniques) to address complex social and organizational problems. Her specific
research areas are computational social and organization science, social adaptation and evolution, social and dynamic network
analysis, and computational text analysis. Her models meld multi-agent technology with network dynamics and empirical data.
Three of the large-scale tools she and the CASOS group have developed are: BioWar a city, scale model of weaponized biological
attacks and response; Construct a models of the co-evolution of social and knowledge networks; and ORA a statistical toolkit
for dynamic social Network data. 相似文献
544.
Graph Theoretic and Spectral Analysis of Enron Email Data 总被引:1,自引:0,他引:1
Anurat?ChapanondEmail author Mukkai?S.?Krishnamoorthy Bülent?Yener 《Computational & Mathematical Organization Theory》2005,11(3):265-281
Analysis of social networks to identify communities and model their evolution has been an active area of recent research.
This paper analyzes the Enron email data set to discover structures within the organization. The analysis is based on constructing
an email graph and studying its properties with both graph theoretical and spectral analysis techniques. The graph theoretical
analysis includes the computation of several graph metrics such as degree distribution, average distance ratio, clustering
coefficient and compactness over the email graph. The spectral analysis shows that the email adjacency matrix has a rank-2
approximation. It is shown that preprocessing of data has significant impact on the results, thus a standard form is needed
for establishing a benchmark data.
Anurat Chapanond is currently a Ph.D. student in Computer Science, RPI. Anurat graduated B. Eng. degree in Computer Engineering from Chiangmai
University (Thailand) in 1997, M. S. in Computer Science from Columbia University in 2002. His research interest is in web
data mining analyses and algorithms.
M.S. Krishnamoorthy received the B.E. degree (with honors) from Madras University in 1969, the M. Tech degree in Electrical Engineering from
the Indian Institute of Technology, Kanpur, in 1971, and the Ph. D. degree in Computer Science, also from the Indian Institute
of Technology, in 1976.
From 1976 to 1979, he was an Assistant Professor of Computer Science at the Indian Institute of Technology, Kanpur. From 1979
to 1985, he was an Assistant Professor of Computer Science at Rensselaer Polytechnic Institute, Troy, NY, and since, 1985,
he has been an Associate Professor of Computer Science at Rensselaer. Dr. Krishnamoorthy's research interests are in the design
and analysis of combinatorial and algebraic algorithms, visualization algorithms and programming environments.
Bulent Yener is an Associate Professor in the Department of Computer Science and Co-Director of Pervasive Computing and Networking Center
at Rensselaer Polytechnic Institute in Troy, New York. He is also a member of Griffiss Institute of Information Assurance.
Dr. Yener received MS. and Ph.D. degrees in Computer Science, both from Columbia University, in 1987 and 1994, respectively.
Before joining to RPI, he was a Member of Technical Staff at the Bell Laboratories in Murray Hill, New Jersey.
His current research interests include bioinformatics, medical informtatics, routing problems in wireless networks, security
and information assurance, intelligence and security informatics. He has served on the Technical Program Committee of leading
IEEE conferences and workshops. Currently He is an associate editor of ACM/Kluwer Winet journal and the IEEE Network Magazine.
Dr. Yener is a Senior Member of the IEEE Computer Society. 相似文献
545.
Private Games are too Dangerous 总被引:1,自引:0,他引:1
Ronald S. Burt 《Computational & Mathematical Organization Theory》1999,5(4):311-341
Given the difficulty of observing interpersonal relations as they develop within an organization, I use iterated prisoner&2018;s dilemma games to simulate their development. The goal is to understand how trust could develop as a function of private games, that is, as a function of interaction sequences between two people independent of their relationships with other people. My baseline is Axelrod&2018;s results with TIT for TAT showing that cooperation can emerge as the dominant form of interaction even in a society of selfish individuals without central authority. I replicate Axelrod&2018;s results, then show that the results only occur in a rare social context&2014;maximum density networks. Where people form less dense networks by withdrawing from unproductive relationships, as is typical in organizations, the competitive advantage shifts from TIT for TAT to abusive strategies. A devious PUSHY strategy wins in moderate to high density networks. A blatantly HOSTILE strategy wins in less dense networks. Abusive players do well in sparse networks because their abuse is lucrative in the initial exchanges of a relationship&2014;before the other person knows to withdraw. Wise players avoiding the abusive players leaves the abusive players free to concentrate on naive players (con men thrive in big cities). The implication is that what keeps abusive players at bay are friends and acquaintances warning managers away from people known to exploit their colleagues. I reinforce the point with illustrative survey data to conclude that private games are not only too dangerous, but also too rare and too slow to be the foundation for trust within organizations. The results are an evidential call for the sociological intuition that trust and distrust cannot be understood independent of the network context in which they are produced. 相似文献
546.
B.M. Roehner 《The European Physical Journal B - Condensed Matter and Complex Systems》2000,14(2):395-399
During a speculative episode the price of an item jumps from an initial level p1 to a peak level p2 before more or less returning to level p1 . The ratio p
2/p
1 is referred to as the amplitude A of the peak. This paper shows that for a given market the peak amplitude is a linear function of the logarithm of the price
at the beginning of the speculative episode; with p1 expressed in 1999 euros the relationship takes the form: ; the values of the parameter a turn out to be relatively independent of the market considered: , the values of the parameter b are more market-dependent, but are stable in the course of time for a given market. This relationship suggests that the higher
the stakes the more “bullish” the market becomes. Possible mechanisms of this “risk affinity” effect are discussed.
Received 29 September 1999 相似文献
547.
以交通运输高速公路与信息高速公路为典例,通过这两类性质相异的交通运输管理技术系统和电子信息技术系统类比,显示两有诸多方面的相似行为与技术,从而表明社会技术与自然技术可以相互借鉴和移植;事理与物理相通。开展自然技术模仿社会的研究,以及在系统工程范畴里,开展社会技术和自然技术的综合研究,不仅有理论意义,而且有实用价值。 相似文献
548.
Scott Moss 《Computational & Mathematical Organization Theory》2000,6(3):249-275
The purpose of this paper is to propose and describe an alternative to an overarching theory for social simulation research. The approach is an analogy of the canonical matrix. Canonical matrices are matrices of a standard form and there are transformations that can be performed on other matrices to show that they can be made into canonical matrices. All matrices which, by means of allowable operations, can be transformed into a canonical matrix have the properties of the canonical matrix. This conception of canonicity is applied to three models in the computational organization theory literature. The models are mapped into their respective canonical forms. The canonical forms are shown to be transitively subsumptive (i.e., one of them is nested within a second which itself is nested within the third. The consequences of these subsumption relations are investigated by means of simulation experiments. 相似文献
549.
D. G. Luenberger 《Journal of Optimization Theory and Applications》1992,75(2):221-264
This paper develops several optimization principles relating the fundamental concepts of Pareto efficiency and competitive equilibria. The beginning point for this development is the introduction of a new function describing individual preferences, closely related to willingness-to-pay, termed the benefit function. An important property of the benefit function is that it can be summed across individuals to obtain a meaningful measure of total benefit relative to a given set of utility levels; and the optimization principles presented in the paper are based on maximization of this total benefit.Specifically, it is shown that, under appropriate technical assumptions, a Pareto-efficient allocationX maximizes the total benefit relative to the utility levels it yields. Conversely, if an allocationX yields zero benefit and maximizes the total benefit function, then that allocation is Pareto efficient. The Lagrange multipliersp of the benefit maximization problem serve as prices; and the (X,p) pair satisfies a generalized saddle-point property termed a Lagrange equilibrium. This in turn is equivalent, under appropriate assumptions, to a competitive equilibrium.There are natural duals to all of the results stated above. The dual optimization principle is based on a surplus function which is a function of prices. The surplus is the total income generated at pricesp, minus the total income required to obtain given utility levels. The dual optimization principle states that prices that are dual (or indirect) Pareto efficient minimize total surplus and render it zero. Conversely, a set of prices that minimizes total surplus and renders it zero is a dual Pareto efficient set of prices.The results of the paper can be viewed as augmenting the first and second theorems of welfare economics (and their duals) to provide a family of results that relate the important economic concepts of Pareto efficiency, equilibrium, dual (or indirect) Pareto efficiency, total benefit, Lagrange equilibrium, and total surplus.The author wishes to thank Charles R. Bowman and Andrew J. Yates for several valuable suggestions and corrections. 相似文献
550.
Theory of rumour spreading in complex social networks 总被引:1,自引:0,他引:1
We introduce a general stochastic model for the spread of rumours, and derive mean-field equations that describe the dynamics of the model on complex social networks (in particular, those mediated by the Internet). We use analytical and numerical solutions of these equations to examine the threshold behaviour and dynamics of the model on several models of such networks: random graphs, uncorrelated scale-free networks and scale-free networks with assortative degree correlations. We show that in both homogeneous networks and random graphs the model exhibits a critical threshold in the rumour spreading rate below which a rumour cannot propagate in the system. In the case of scale-free networks, on the other hand, this threshold becomes vanishingly small in the limit of infinite system size. We find that the initial rate at which a rumour spreads is much higher in scale-free networks than in random graphs, and that the rate at which the spreading proceeds on scale-free networks is further increased when assortative degree correlations are introduced. The impact of degree correlations on the final fraction of nodes that ever hears a rumour, however, depends on the interplay between network topology and the rumour spreading rate. Our results show that scale-free social networks are prone to the spreading of rumours, just as they are to the spreading of infections. They are relevant to the spreading dynamics of chain emails, viral advertising and large-scale information dissemination algorithms on the Internet. 相似文献