首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16789篇
  免费   4篇
财政金融   2655篇
工业经济   760篇
计划管理   2564篇
经济学   3878篇
综合类   482篇
运输经济   2篇
旅游经济   3篇
贸易经济   4479篇
经济概况   1354篇
信息产业经济   44篇
邮电经济   572篇
  2024年   2篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   1篇
  2018年   2303篇
  2017年   2054篇
  2016年   1206篇
  2015年   92篇
  2014年   85篇
  2013年   66篇
  2012年   437篇
  2011年   1945篇
  2010年   1825篇
  2009年   1520篇
  2008年   1511篇
  2007年   1869篇
  2006年   65篇
  2005年   388篇
  2004年   462篇
  2003年   552篇
  2002年   251篇
  2001年   61篇
  2000年   49篇
  1999年   2篇
  1998年   16篇
  1996年   13篇
  1986年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
We describe the regulatory regime under which international trucking operated in Western Europe until the mid-1980s, the deregulatory process that followed, and the effect of this deregulation. We find that deregulation had a large positive effect on the growth of international trucking. We also find that shippers shifted toward more outsourcing of their trucking needs, but this occurred to an even greater extent in local and national road transport. We conclude that other factors beside the deregulation of international trucking affected the organization of the industry at the time. Finally, despite concerns voiced by member countries, we find no evidence that deregulation disproportionately favored carriers of countries that were initially more (or less) involved in international trucking, nor that it has favored low-wage countries.   相似文献   
92.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
93.
In this paper, we give a sufficient and almost necessary condition for the existence of optimal strategies in linear multisector models when time is continuous.  相似文献   
94.
This paper considers the combination of pollution taxes and abatement subsidies when some polluting firms procure their abatement goods and services from an oligopolistic eco-industry. The regulator must here cope with two simultaneous price distortions: one that comes from pollution and the other which is caused by the eco-industry’s market power. In this context, we show that taxing emissions while subsidizing polluters’ abatement efforts cannot lead to first-best, but the opposite occurs provided it is the eco-industry’s output which is subsidized. When public transfers also create distortions, welfare can be higher if the regulator uses only an emission tax, but subsidizing abatement suppliers while taxing emissions remains optimal when the eco-industry is concentrated.  相似文献   
95.
96.
This systematic review analyses literature on the work of hybrid value creation, i.e. the process of generating additional value by innovatively combining products (tangible component) and services (intangible component). A state of the art report on hybrid value creation is delivered by first systematically identifying and then analyzing 169 publications focusing on hybrid value creation. The identified publications are clustered into eight categories based on their links and interactions and thus a mapping of this evolving field is suggested. A discussion and reflection of the findings with respect to the pervasiveness of literature and the research methodologies used is provided. The paper concludes by identifying some dominant strategic gaps in the overall research landscape and provides directions for future research.  相似文献   
97.
98.
Ansgar Steland 《Metrika》2004,60(3):229-249
Motivated in part by applications in model selection in statistical genetics and sequential monitoring of financial data, we study an empirical process framework for a class of stopping rules which rely on kernel-weighted averages of past data. We are interested in the asymptotic distribution for time series data and an analysis of the joint influence of the smoothing policy and the alternative defining the deviation from the null model (in-control state). We employ a certain type of local alternative which provides meaningful insights. Our results hold true for short memory processes which satisfy a weak mixing condition. By relying on an empirical process framework we obtain both asymptotic laws for the classical fixed sample design and the sequential monitoring design. As a by-product we establish the asymptotic distribution of the Nadaraya-Watson kernel smoother when the regressors do not get dense as the sample size increases.Acknowledgements The author is grateful to two anonymous referees for their constructive comments, which improved the paper. One referee draws my attention to Lifshits paper. The financial support of the Collaborative Research Centre Reduction of Complexity in Multivariate Data Structures (SFB 475) of the German Research Foundation (DFG) is greatly acknowledged.  相似文献   
99.
100.
In this article we measure the effects of events on risk and return and analyze the persistence of the influencing variables on German energy companies. Therefore, we refer to event-study methods by means of the Capital Asset Pricing Model, GARCH-Modeling and Kalman filters. We find that the discussed events do not affect all companies in an equal manner. Moreover, we show that the impact on risk and returns is not persistent and does not lead to an increase in the overall systematic risk for the considered utility operators in Germany.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号