首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17220篇
  免费   33篇
财政金融   2715篇
工业经济   773篇
计划管理   2668篇
经济学   3965篇
综合类   482篇
运输经济   3篇
旅游经济   11篇
贸易经济   4591篇
农业经济   25篇
经济概况   1404篇
信息产业经济   44篇
邮电经济   572篇
  2024年   3篇
  2023年   17篇
  2022年   15篇
  2021年   29篇
  2020年   43篇
  2019年   45篇
  2018年   2341篇
  2017年   2094篇
  2016年   1238篇
  2015年   106篇
  2014年   109篇
  2013年   108篇
  2012年   463篇
  2011年   1960篇
  2010年   1836篇
  2009年   1523篇
  2008年   1521篇
  2007年   1873篇
  2006年   70篇
  2005年   392篇
  2004年   465篇
  2003年   553篇
  2002年   253篇
  2001年   66篇
  2000年   53篇
  1999年   5篇
  1998年   20篇
  1997年   2篇
  1996年   13篇
  1995年   2篇
  1994年   1篇
  1992年   2篇
  1991年   3篇
  1989年   2篇
  1987年   3篇
  1986年   14篇
  1985年   2篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1976年   1篇
  1974年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
112.
113.
114.
When price-cap rules determine the structure of prices for a long period, they suffer a credibility problem and introduce an element of risk especially if a firm’s profits are “too large”. Profit sharing may be seen as a device to pre-determine price adjustments and thus to decrease regulatory risk. We analyse the effects of profit sharing on the incentives to invest, using a real option approach. Absent credibility issues, a well designed profit sharing system may be neutral relative to a pure price cap. With regulatory risk, profit sharing is preferable to a pure price-cap one, if it intervenes for high enough profit levels.
Carlo Scarpa (Corresponding author)Email:
  相似文献   
115.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
116.
This paper considers the combination of pollution taxes and abatement subsidies when some polluting firms procure their abatement goods and services from an oligopolistic eco-industry. The regulator must here cope with two simultaneous price distortions: one that comes from pollution and the other which is caused by the eco-industry’s market power. In this context, we show that taxing emissions while subsidizing polluters’ abatement efforts cannot lead to first-best, but the opposite occurs provided it is the eco-industry’s output which is subsidized. When public transfers also create distortions, welfare can be higher if the regulator uses only an emission tax, but subsidizing abatement suppliers while taxing emissions remains optimal when the eco-industry is concentrated.  相似文献   
117.
118.
This systematic review analyses literature on the work of hybrid value creation, i.e. the process of generating additional value by innovatively combining products (tangible component) and services (intangible component). A state of the art report on hybrid value creation is delivered by first systematically identifying and then analyzing 169 publications focusing on hybrid value creation. The identified publications are clustered into eight categories based on their links and interactions and thus a mapping of this evolving field is suggested. A discussion and reflection of the findings with respect to the pervasiveness of literature and the research methodologies used is provided. The paper concludes by identifying some dominant strategic gaps in the overall research landscape and provides directions for future research.  相似文献   
119.
120.
Engineering education is an emerging field of research. Due to its applied nature, recent theoretical developments have been followed by empirical evidence and interdisciplinary research. The present study attempted to describe the team roles assumed by members of project teams composed of young engineering students. The study was conducted in Pakistan by using the Belbin Team Role Self Perception Inventory. It was found that young Pakistani engineers assumed the roles of implementer, coordinator, shaper and team worker. This study attempts to understand role choices through the framework of national cultural dimensions proposed by Hofstede and engineering education culture offered by Godfrey and Parker. The study strongly recommends that engineering curriculum should incorporate activities which could foster creativity among engineers. Moreover, engineering students should be motivated to innovate through collaboration in a problem and project based environment, which is seriously lacking in engineering education of Pakistan.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号