首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   279篇
  免费   13篇
财政金融   16篇
工业经济   9篇
计划管理   137篇
经济学   19篇
综合类   24篇
运输经济   1篇
贸易经济   67篇
农业经济   6篇
经济概况   12篇
信息产业经济   1篇
  2023年   1篇
  2022年   3篇
  2021年   16篇
  2020年   10篇
  2019年   9篇
  2018年   10篇
  2017年   13篇
  2016年   7篇
  2015年   11篇
  2014年   36篇
  2013年   55篇
  2012年   38篇
  2011年   32篇
  2010年   10篇
  2009年   11篇
  2008年   5篇
  2007年   4篇
  2006年   6篇
  2005年   6篇
  2004年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1995年   1篇
  1985年   1篇
排序方式: 共有292条查询结果,搜索用时 15 毫秒
1.
One of the key factors for a thriving cloud computing market is the ‘interoperability’ between the relevant hardware and software that govern the cloud services. While a complete interoperability means different cloud users being able to exchange the management tools, server images and other software, this is infrequently realised because users are locked into (proprietary) cloud ecosystems. This (problem of vendor lock-in) is potentially accompanied with another problem revolving around the content delivery networks being integrated with the distinct clouds along with possible harms to media pluralism as well as interoperability. In view of these concerns, this study focuses on competition law, standardisation and regulatory policies, and elaborates on to what extent cloud interoperability needs to be secured under EU legal fora. Overall, it is found that vendor lock-in might be attended by ‘coupling’ and complex ‘layering’ strategies, whereas efficiency and/or security based justifications would arise as the counter-balancing reasons. Based on the findings, the study concludes that while focusing on the vertical (i.e., vendor lock-in) concerns, a comprehensive viewpoint needs to be upheld, allowing efficiencies (i.e., proprietary enhancements) based on the architectural design and innovations, obviating narrowly-fashioned (i.e., foreclosure-based) interventions such as in Microsoft case. It is also underlined that cloud interoperability has a content dimension that would require a broader perspective, extending to horizontal concerns and requirements within the context of EU policy making strategies.  相似文献   
2.
存储在云计算服务器上的数据可能被篡改或删除,查询完整性验证的作用是确保查询用户能够验证查询结果中的数据是真实的,且包含所有满足条件的数据。提出了一种基于签名链结构的查询完整性验证机制。方案使用代数签名机制替代数字签名实现校验值的计算,从而有效降低计算和查询验证开销。此外,通过维护一种新的、简单的索引结构实现了仅需下载少量数据即可实现校验值的更新。实验结果表明,所提方案比基于数字签名的签名链方案具有更小的更新开销和更高的验证效率。  相似文献   
3.
针对现有的格上身份基线性同态签名方案密钥存储量大、结构复杂导致方案实际运行效率相对偏低的问题,提出了一个NTRU(Number Theory Research Unit)格上高效的身份基线性同态签名方案。首先在密钥生成阶段利用NTRU密钥生成算法产生主密钥,接着采用格基委派算法给出身份签名私钥,最后运行NTRU格上原像抽样算法产生出线性同态签名。对方案的安全性证明与性能分析结果表明,新方案满足正确性,具有弱内容隐私性。在随机预言机模型下,该方案在小整数解问题困难性条件下满足适应性选择身份和选择消息的存在性不可伪造性。同时,由于采用NTRU格的特殊结构,新方案在密钥量与运行效率方面与已有方案相比较均具有显著的优势,这对于计算资源受限环境的同态认证中具有重要的应用价值。  相似文献   
4.
The context to be addressed is the digitalization of industry and industrial processes. Digitalization brings enhanced customer relationships and value‐chain integration, which are effective instruments to meet increasing competition and slimmer margins for productivity and profitability. Digitalization also brings more pronounced requirements for effective planning, problem solving and decision making in an increasingly complex and fast‐changing environment. Decision analytics will meet the challenges from the growing global competition that major industrial corporations face and will help solve the problems of big data/fast data that digitalization is generating as a by‐product. A mantra is appearing in business magazines – that powerful, intelligent systems will be effective tools for the digitalization of industrial processes – but much less attention appears to be paid to the fact that users need advanced knowledge and skills to benefit from the intelligent systems. First, an effective transfer of knowledge from developers, experts and researchers to users (including management) will be needed; second, the daily use and operations of the systems need to be supported, as automated, intelligent industrial systems are complex to operate. We look at this transfer as knowledge mobilization and will work out how the mobilization can be supported with coaching; this coaching needs to be digital, as human coaches are both scarce and too expensive to employ in large numbers.  相似文献   
5.
《Business Horizons》2020,63(2):205-213
Artificial intelligence applications in cognitive computing systems can be found in organizations across every market, including chatbots that help customers navigate websites, predictive analytics systems used for fraud detection, and augmented decision-support systems for knowledge workers. In this article, we share reflections and insights from our experience with AI projects in the public sector that can add value to any organization. We organized our findings into four thematic domains—(1) data, (2) technology, (3) organizational, and (4) environmental—and examine them relative to the phases of AI. We conclude with best practices for capturing value with cognitive computing systems.  相似文献   
6.
针对智能化作战对军事电子信息系统计算能力提升的迫切需求,结合云计算的资源虚拟化、大数据的分布式计算等技术,提出了基于嵌入式CPU+ALL(DSP、FPGA、PPC、GPU、AI处理器等)的异构处理的信号级协同计算平台架构,包括弹性、轻量级异构资源虚拟化模型、分布式实时计算框架和智能计算框架等,形成了一套架构统一、资源共用、使用简便的协同计算和智能计算环境。通过战术级无线电认知和智能信号与信息处理两个典型应用场景,探讨了该信号级协同计算平台可能带来的颠覆性效用。  相似文献   
7.
Zika virus is a mosquito-borne disease that spreads very quickly in different parts of the world. In this article, we proposed a system to prevent and control the spread of Zika virus disease using integration of Fog computing, cloud computing, mobile phones and the Internet of things (IoT)-based sensor devices. Fog computing is used as an intermediary layer between the cloud and end users to reduce the latency time and extra communication cost that is usually found high in cloud-based systems. A fuzzy k-nearest neighbour is used to diagnose the possibly infected users, and Google map web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each Zika virus (ZikaV)-infected user, mosquito-dense sites and breeding sites on the Google map that help the government healthcare authorities to control such risk-prone areas effectively and efficiently. The proposed system is deployed on Amazon EC2 cloud to evaluate its performance and accuracy using data set for 2 million users. Our system provides high accuracy of 94.5% for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment.  相似文献   
8.
The rapidly expanding market for wearable computing devices (wearables), driven by advances in information and communication technologies (ICT), wireless access, and public acceptance of a design aesthetic, is indicative of the near limitless potential for changing the relationship of users to information context(s). As the adoption of wearable devices spreads, there are cultural and social impacts that represent both barriers and opportunities, with subsequent policy ramifications. All too often designers, technologists, and policymakers operate independently developing products that are out of sync, lack interoperability, or are hindered by well meaning, but obstructive policy. This paper proposes a futures-based, iterative policy-informed design framework for developing wearable devices that guides interdisciplinary collaborators early in the process of designing a research & development plan. This approach allows for the development of “images of the future” through which various potential implications and effects of device design in social, technological, and regulatory contexts can be explored.  相似文献   
9.
教育信息化程度成为了国家教育现代化程度的风向标,本文以"云计算"技术为抓手,从教育工作的流程出发,设计教育资源及教育管理两个平台。通过两个云平台的建设,夯实智慧教育基础,为智慧教育的应用开发提供强有力地保障。  相似文献   
10.
何康乐 《价值工程》2014,(31):233-234
云计算是计算机科学技术与网络互联技术结合创新发展的产物,已经成为引领未来世界信息产业的关键性技术和手段。云计算在教育领域体现出了很大优势,改进学习方式,改造学习环境,同时可以降低IT成本,对于提高高校现有资产的效率、利用率和灵活性具有重要影响意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号