首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   134篇
  免费   12篇
  国内免费   1篇
  2022年   2篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   6篇
  2017年   7篇
  2016年   4篇
  2015年   3篇
  2014年   20篇
  2013年   19篇
  2012年   7篇
  2011年   12篇
  2010年   9篇
  2009年   8篇
  2008年   13篇
  2007年   10篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   4篇
  2002年   4篇
  2001年   1篇
  1996年   1篇
  1993年   1篇
排序方式: 共有147条查询结果,搜索用时 859 毫秒
101.
We consider the single‐server constant retrial queue with a Poisson arrival process and exponential service and retrial times. This system has not waiting space, so the customers that find the server busy are forced to abandon the system, but they can leave their contact details. Hence, after a service completion, the server seeks for a customer among those that have unsuccessfully applied for service but left their contact details, at a constant retrial rate. We assume that the arriving customers that find the server busy decide whether to leave their contact details or to balk based on a natural reward‐cost structure, which incorporates their desire for service as well as their unwillingness to wait. We examine the customers' behavior, and we identify the Nash equilibrium joining strategies. We also study the corresponding social and profit maximization problems. We consider separately the observable case where the customers get informed about the number of customers waiting for service and the unobservable case where they do not receive this information. Several extensions of the model are also discussed. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
102.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here.  相似文献   
103.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
104.
伴随着互联网规模的不断扩展,信息过载问题越来越突出。信息推荐系统被视为解决信息过载问题的最有效方法。然而目前的方法大多数仅考虑用户独立的反馈,而忽略用户的社会属性对推荐的重要作用,这对信息推荐系统的性能会造成巨大的影响。为此,本文提出了基于朋友关系预测的信息推荐算法,将用户的社会关系预测引入信息推荐过程中,分别基于用户的拓扑信息及历史交互信息建立用户社会关系的存在性判定及关系类型判定,并利用线性回归分析方法和逻辑回归分析方法实现了基本特征的融合。最后,通过在Epinions和Slashdot真实数据集上的实验证明,本方法能够有效提高用户社会关系预测的准确性。  相似文献   
105.
在社会转型时期的学校教育受到许多挑战,加上一直以来对学校在道德教育中的作用被过分放大,使学校面临巨大的压力。实际上,真正的、有效的道德教育需要一个广泛的支持系统。我国需要结合学校、家庭、社区及社会的综合力量,营造"大德育"的环境,建立起道德教育的社会支持系统。  相似文献   
106.
为了检测无线局域网MAC层的6种DOS攻击方式,提出一种基于Hybrid特征选择和支持向量机的入侵检测算法.该算法先用混合器模式的Hybrid特征选择算法提取8个识别攻击的流量统计特征,然后利用支持向量机对待检测对象进行识别分类.通过建立仿真环境对检测模型的检测效果进行统计验证,表明检测模型在具有较高检测准确率和较低的虚警率,能够有效地检测MAC层DOS攻击,具有实用价值.  相似文献   
107.
中国当代的社会转型 ,决不是笼统地从“传统社会”转向“现代社会” ,而是从初级阶段的社会主义向发达社会主义的转型。这样定位 ,有着充分的理论根据 ,其中最重要的就是我国在转型目标和价值取向、转型道路、途径和方法以及转型所处时代背景和国际环境等方面 ,都有自己的特殊性。只有这样认识我国的社会转型 ,才能与“西化”划清界限  相似文献   
108.
随着网络技术的发展,网络语言作为一种新的语言媒体和社会方言,越来越得到人们的重视。在不同的学术领域,专家对网络语言作出不同的诠释和研究。主要从构词、句法、非语言符号三个角度来分析经济原则在网络语言中的普遍使用,并从聊天室中收集、归纳、分析相关语料来证明经济原则的存在,及在网络空间中普遍使用的原因。对网络语言的深入研究,将更有助于人们了解语言在以高科技为背景条件下发展趋势。当网络语言冲击传统语言时,要树立正确的态度面对语言的发展。  相似文献   
109.
构建和谐社会与青少年犯罪预防   总被引:1,自引:0,他引:1  
当前我国正处于改革开放的关键时期。由于社会转型,社会矛盾突出,各种不良现象滋生,犯罪问题日益严重,尤其是青少年犯罪已达到令人堪忧的地步,与构建社会主义和谐社会极不相称。就社会转型时期青少年犯罪的特点、原因进行深入分析,并提出了在构建和谐社会重要理论指导下青少年犯罪的预防对策。  相似文献   
110.
This article explores the dynamics of social cohesion on the frontline. It attempts to show how micro-level solidarities largely depend on macro level organisational processes. I argue that frontline social cohesion is often the product of social development linked with the organisational structure. This general argument is applied to the case studies of two armed forces involved in the 1991–1995 Wars of Yugoslav Succession – the Croatian Army (HV) and the Bosnian Serb Army (VRS). Drawing on in-depth interviews with the former combatants I show how HV social cohesion played an important role in winning the war and how these networks of micro-level solidarity were shaped by long term organisational development.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号