首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   281篇
  免费   11篇
财政金融   16篇
工业经济   9篇
计划管理   137篇
经济学   19篇
综合类   24篇
运输经济   1篇
贸易经济   67篇
农业经济   6篇
经济概况   12篇
信息产业经济   1篇
  2023年   1篇
  2022年   3篇
  2021年   16篇
  2020年   10篇
  2019年   9篇
  2018年   10篇
  2017年   13篇
  2016年   7篇
  2015年   11篇
  2014年   36篇
  2013年   55篇
  2012年   38篇
  2011年   32篇
  2010年   10篇
  2009年   11篇
  2008年   5篇
  2007年   4篇
  2006年   6篇
  2005年   6篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
  1985年   1篇
排序方式: 共有292条查询结果,搜索用时 31 毫秒
91.
Bank size distributions concentrate in a few large banks – the big “grains.” This fact means idiosyncratic shocks at the bank level do not cancel out, thus affecting the business cycle. Here, we present evidence of granularity in the banking market using Brazilian data. We examine the explanatory power of the granular banking residual of the five largest banks on quarterly GDP changes from 2010 to 2019. We conservatively find that shocks to revenues of these top five banks explain nearly one-fifth of GDP fluctuations.  相似文献   
92.
自20世纪中期出现人工智能技术以来,智能化科学技术成为当代社会中技术改革的热门话题,不仅为各个领域的发展提供了必要的生产工具,更成为当代社会技术重要的发展趋势。随着技术水平的提高和管理体系的完善,物联网领域获得了快速的发展,在居民生活当中,以信息技术串联居民生活,以互联网技术为核心,将信息技术与物品相结合,尽最大可能提升物联网技术水平,为目前生活和科技带来更多的便利。  相似文献   
93.
并行算法设计是实现并行计算的第一步。并行算法设计过程中需要解决任务划分(Partitioning)、通信分析(Communication)、任务组合(Agglomeration)和处理器映射(Mapping)四方面的工作,相应产生的设计方法学就是PCAM。但是在应用PCAM方法设计并行算法时会遇到如何调节数据与算法之间的矛盾的问题,针对这一问题可以使用面向对象的并行算法设计的方法,即OOPCAM方法,在PCAM方法的基础上结合面向对象思想解决原有方法存在的问题。  相似文献   
94.
当今世界已进入大数据和云计算时代,引发包括航天测控领域在内的各行业进行工作模式和思维方式的变革。提出了一种用于航天测控站的全站计算环境(TSCE),为整个测控站提供统一的通用计算环境,具有成本低、软件化、综合化、可伸缩、可靠性高等优点。从逻辑视图、物理视图和功能视图三个角度对TSCE的体系结构进行了描述。研究表明,现有实时流计算系统不适用于航天测控信号处理,因此,提出一种层次化并行处理框架(HPPF),可通过调整HPPF的信号块长度和支路数目两个参数,使之满足实时性要求。  相似文献   
95.
This paper comprises general comments on some current statistical issues, inspired in part by some papers that have been published in Statistica Neerlandica. Occasional glimpses of the future are hazarded.  相似文献   
96.
Ubiquitous computing and its effects on small businesses   总被引:1,自引:1,他引:0  
Much of the previous literature on ubiquitous computing (UbiComp) has been limited to case studies, reporting innovative practices of specific technologies (e.g., RFID) and social issues. There is a general paucity of research on strategic application of UbiComp, especially to small businesses. To address this issue, this study provides a broad overview of the current practices of UbiComp in leading countries and presents possible future directions. Then, the effects of UbiComp on small businesses are discussed. Through a cross-national comparative analysis, we present four strategies to provide some guidance to the countries that are currently considering entering into the UbiComp race.  相似文献   
97.
In this study, we reveal and analyse the hitherto implicit intellectual structure of cloud computing by using the methods of patent clustering and co-word clustering, respectively. In order to enhance the quality of patent clustering, we conduct the Taguchi method, which uses the E–I index as the quality characteristic, to investigate three influential factors to the quality, including the cut-off value for dichotomisation, the number of terms, and the sparsity. In co-word clustering analysis, this study demonstrates how the utilisation of the proposed modified co-word analysis method, factor analysis, multidimensional scaling analysis, and network analysis can efficiently explore the relation between R&D themes and competition between companies. This study reveals the knowledge networks in the area of Software as a Service (SaaS), thereby helping academia and practitioners to reach a richer understanding of the up-to-date studies.  相似文献   
98.
赵美芳 《价值工程》2014,(22):162-163
本文首先介绍云计算的基本原理,分析了煤炭企业信息化现状。从需求、设计、规划、存储几方面分析,建立基于云计算的煤炭企业信息化体系构建,最后将云计算信息化体系和传统信息化体系进行对比。  相似文献   
99.
With advancements in quantum computing happening almost weekly it is time to examine the effects this new technology will have on society and current computational systems. Specifically, cryptographic systems need to be carefully analyzed since the introduction of quantum computational resources would render discrete logarithm and factoring based cryptographic systems like those based on Rivest, Shamir, Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms woefully obsolete. These algorithms are widely used in the form of digital certificates, message encryption, and even physical authentication devices like Radio Frequency Identification (RFID) badges. With this technology compromised by quantum computing, governments and other organizations would be able to eavesdrop on private citizens with relative ease. This has the potential to cause a slew of rights violations and atrocities leading to catastrophe. With compromised digital certificates 3rd parties could masquerade as trusted organizations. This would call many types of digital transactions like into question, including those related to stock exchanges, personal banking, and software verification. By eroding this previously solid foundation of trust global scale economic catastrophes are not out of the question. This paper introduces quantum computing to the study of catastrophic threats since the use of quantum technology while existing vulnerable encryption schemes are still in place raises severe safety issues. These issues are addressed here along with a proposed two-fold solution involving the development and maturation of post-quantum cryptographic algorithms coupled with government and international regulation. This regulation would promote the containment and responsible use of quantum computers in order to help alleviate some of the security issues posed by outdated cryptographic systems in a post-quantum environment.  相似文献   
100.
王志红 《价值工程》2015,(6):118-119
为了在施工条件非常恶劣的海况下快速成桩,节约有效的施工时间,根据实际地质情况、设计图纸和海港规范以及打桩设备,计算出钢管桩的摩擦力和最终贯入度。在平潭海峡大桥独立平台钢管桩的打设过程中,圆满完成工作任务,计算公式运用得当。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号