全文获取类型
收费全文 | 281篇 |
免费 | 11篇 |
专业分类
财政金融 | 16篇 |
工业经济 | 9篇 |
计划管理 | 137篇 |
经济学 | 19篇 |
综合类 | 24篇 |
运输经济 | 1篇 |
贸易经济 | 67篇 |
农业经济 | 6篇 |
经济概况 | 12篇 |
信息产业经济 | 1篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 16篇 |
2020年 | 10篇 |
2019年 | 9篇 |
2018年 | 10篇 |
2017年 | 13篇 |
2016年 | 7篇 |
2015年 | 11篇 |
2014年 | 36篇 |
2013年 | 55篇 |
2012年 | 38篇 |
2011年 | 32篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 5篇 |
2007年 | 4篇 |
2006年 | 6篇 |
2005年 | 6篇 |
2004年 | 1篇 |
2002年 | 1篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有292条查询结果,搜索用时 31 毫秒
91.
Bank size distributions concentrate in a few large banks – the big “grains.” This fact means idiosyncratic shocks at the bank level do not cancel out, thus affecting the business cycle. Here, we present evidence of granularity in the banking market using Brazilian data. We examine the explanatory power of the granular banking residual of the five largest banks on quarterly GDP changes from 2010 to 2019. We conservatively find that shocks to revenues of these top five banks explain nearly one-fifth of GDP fluctuations. 相似文献
92.
自20世纪中期出现人工智能技术以来,智能化科学技术成为当代社会中技术改革的热门话题,不仅为各个领域的发展提供了必要的生产工具,更成为当代社会技术重要的发展趋势。随着技术水平的提高和管理体系的完善,物联网领域获得了快速的发展,在居民生活当中,以信息技术串联居民生活,以互联网技术为核心,将信息技术与物品相结合,尽最大可能提升物联网技术水平,为目前生活和科技带来更多的便利。 相似文献
93.
李印 《吉林省经济管理干部学院学报》2008,22(3):75-77
并行算法设计是实现并行计算的第一步。并行算法设计过程中需要解决任务划分(Partitioning)、通信分析(Communication)、任务组合(Agglomeration)和处理器映射(Mapping)四方面的工作,相应产生的设计方法学就是PCAM。但是在应用PCAM方法设计并行算法时会遇到如何调节数据与算法之间的矛盾的问题,针对这一问题可以使用面向对象的并行算法设计的方法,即OOPCAM方法,在PCAM方法的基础上结合面向对象思想解决原有方法存在的问题。 相似文献
94.
当今世界已进入大数据和云计算时代,引发包括航天测控领域在内的各行业进行工作模式和思维方式的变革。提出了一种用于航天测控站的全站计算环境(TSCE),为整个测控站提供统一的通用计算环境,具有成本低、软件化、综合化、可伸缩、可靠性高等优点。从逻辑视图、物理视图和功能视图三个角度对TSCE的体系结构进行了描述。研究表明,现有实时流计算系统不适用于航天测控信号处理,因此,提出一种层次化并行处理框架(HPPF),可通过调整HPPF的信号块长度和支路数目两个参数,使之满足实时性要求。 相似文献
95.
J. C. Gower 《Statistica Neerlandica》2006,60(2):124-134
This paper comprises general comments on some current statistical issues, inspired in part by some papers that have been published in Statistica Neerlandica. Occasional glimpses of the future are hazarded. 相似文献
96.
Ubiquitous computing and its effects on small businesses 总被引:1,自引:1,他引:0
Much of the previous literature on ubiquitous computing (UbiComp) has been limited to case studies, reporting innovative practices
of specific technologies (e.g., RFID) and social issues. There is a general paucity of research on strategic application of
UbiComp, especially to small businesses. To address this issue, this study provides a broad overview of the current practices
of UbiComp in leading countries and presents possible future directions. Then, the effects of UbiComp on small businesses
are discussed. Through a cross-national comparative analysis, we present four strategies to provide some guidance to the countries
that are currently considering entering into the UbiComp race. 相似文献
97.
Jia-Yen Huang 《Technology Analysis & Strategic Management》2017,29(8):917-931
In this study, we reveal and analyse the hitherto implicit intellectual structure of cloud computing by using the methods of patent clustering and co-word clustering, respectively. In order to enhance the quality of patent clustering, we conduct the Taguchi method, which uses the E–I index as the quality characteristic, to investigate three influential factors to the quality, including the cut-off value for dichotomisation, the number of terms, and the sparsity. In co-word clustering analysis, this study demonstrates how the utilisation of the proposed modified co-word analysis method, factor analysis, multidimensional scaling analysis, and network analysis can efficiently explore the relation between R&D themes and competition between companies. This study reveals the knowledge networks in the area of Software as a Service (SaaS), thereby helping academia and practitioners to reach a richer understanding of the up-to-date studies. 相似文献
98.
本文首先介绍云计算的基本原理,分析了煤炭企业信息化现状。从需求、设计、规划、存储几方面分析,建立基于云计算的煤炭企业信息化体系构建,最后将云计算信息化体系和传统信息化体系进行对比。 相似文献
99.
《Futures》2015
With advancements in quantum computing happening almost weekly it is time to examine the effects this new technology will have on society and current computational systems. Specifically, cryptographic systems need to be carefully analyzed since the introduction of quantum computational resources would render discrete logarithm and factoring based cryptographic systems like those based on Rivest, Shamir, Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms woefully obsolete. These algorithms are widely used in the form of digital certificates, message encryption, and even physical authentication devices like Radio Frequency Identification (RFID) badges. With this technology compromised by quantum computing, governments and other organizations would be able to eavesdrop on private citizens with relative ease. This has the potential to cause a slew of rights violations and atrocities leading to catastrophe. With compromised digital certificates 3rd parties could masquerade as trusted organizations. This would call many types of digital transactions like into question, including those related to stock exchanges, personal banking, and software verification. By eroding this previously solid foundation of trust global scale economic catastrophes are not out of the question. This paper introduces quantum computing to the study of catastrophic threats since the use of quantum technology while existing vulnerable encryption schemes are still in place raises severe safety issues. These issues are addressed here along with a proposed two-fold solution involving the development and maturation of post-quantum cryptographic algorithms coupled with government and international regulation. This regulation would promote the containment and responsible use of quantum computers in order to help alleviate some of the security issues posed by outdated cryptographic systems in a post-quantum environment. 相似文献
100.
为了在施工条件非常恶劣的海况下快速成桩,节约有效的施工时间,根据实际地质情况、设计图纸和海港规范以及打桩设备,计算出钢管桩的摩擦力和最终贯入度。在平潭海峡大桥独立平台钢管桩的打设过程中,圆满完成工作任务,计算公式运用得当。 相似文献