首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16759篇
  免费   1篇
财政金融   2651篇
工业经济   759篇
计划管理   2558篇
经济学   3867篇
综合类   482篇
运输经济   1篇
旅游经济   1篇
贸易经济   4472篇
经济概况   1353篇
信息产业经济   44篇
邮电经济   572篇
  2019年   1篇
  2018年   2301篇
  2017年   2052篇
  2016年   1205篇
  2015年   92篇
  2014年   84篇
  2013年   61篇
  2012年   435篇
  2011年   1941篇
  2010年   1826篇
  2009年   1517篇
  2008年   1512篇
  2007年   1868篇
  2006年   64篇
  2005年   386篇
  2004年   462篇
  2003年   550篇
  2002年   251篇
  2001年   61篇
  2000年   49篇
  1998年   16篇
  1996年   13篇
  1986年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
103.
104.
105.
106.
107.
108.
When price-cap rules determine the structure of prices for a long period, they suffer a credibility problem and introduce an element of risk especially if a firm’s profits are “too large”. Profit sharing may be seen as a device to pre-determine price adjustments and thus to decrease regulatory risk. We analyse the effects of profit sharing on the incentives to invest, using a real option approach. Absent credibility issues, a well designed profit sharing system may be neutral relative to a pure price cap. With regulatory risk, profit sharing is preferable to a pure price-cap one, if it intervenes for high enough profit levels.
Carlo Scarpa (Corresponding author)Email:
  相似文献   
109.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
110.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号