首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21451篇
  免费   149篇
  国内免费   31篇
财政金融   3152篇
工业经济   1060篇
计划管理   3574篇
经济学   4721篇
综合类   1013篇
运输经济   44篇
旅游经济   23篇
贸易经济   5030篇
农业经济   262篇
经济概况   2122篇
信息产业经济   45篇
邮电经济   585篇
  2024年   10篇
  2023年   32篇
  2022年   104篇
  2021年   149篇
  2020年   116篇
  2019年   63篇
  2018年   2354篇
  2017年   2157篇
  2016年   1296篇
  2015年   224篇
  2014年   284篇
  2013年   348篇
  2012年   841篇
  2011年   2463篇
  2010年   2259篇
  2009年   1846篇
  2008年   1885篇
  2007年   2232篇
  2006年   428篇
  2005年   700篇
  2004年   557篇
  2003年   648篇
  2002年   320篇
  2001年   117篇
  2000年   91篇
  1999年   20篇
  1998年   30篇
  1997年   2篇
  1996年   19篇
  1995年   1篇
  1994年   3篇
  1993年   4篇
  1992年   4篇
  1991年   3篇
  1990年   2篇
  1988年   3篇
  1987年   1篇
  1986年   15篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
142.
The main question of this paper is how actors in strategic communication constellations deal with seemingly hopeless situations. The thesis presented here is that actors in such situations make a strategic communication play. Basically, this facilitates the continuation of communication. The concept of strategic communication plays is developed theoretically in this paper. It is shown that strategic communication plays come across in direct interpersonal communication as well as in mass medial mediated communication. In the communication-sociological approach, it is used as the theoretical basis of a difference theory and paradoxical term of play based on Bateson (1956, 1985), embedded in the frame analysis of Goffmann (1980). On this basis, two functions of strategic communication plays are worked out. On the one hand, it is an extension of freedom of action and on the other hand increases the probability of sympathy and credibility attributions through self-thematization.  相似文献   
143.
144.
145.
146.
147.
When price-cap rules determine the structure of prices for a long period, they suffer a credibility problem and introduce an element of risk especially if a firm’s profits are “too large”. Profit sharing may be seen as a device to pre-determine price adjustments and thus to decrease regulatory risk. We analyse the effects of profit sharing on the incentives to invest, using a real option approach. Absent credibility issues, a well designed profit sharing system may be neutral relative to a pure price cap. With regulatory risk, profit sharing is preferable to a pure price-cap one, if it intervenes for high enough profit levels.
Carlo Scarpa (Corresponding author)Email:
  相似文献   
148.
We describe the regulatory regime under which international trucking operated in Western Europe until the mid-1980s, the deregulatory process that followed, and the effect of this deregulation. We find that deregulation had a large positive effect on the growth of international trucking. We also find that shippers shifted toward more outsourcing of their trucking needs, but this occurred to an even greater extent in local and national road transport. We conclude that other factors beside the deregulation of international trucking affected the organization of the industry at the time. Finally, despite concerns voiced by member countries, we find no evidence that deregulation disproportionately favored carriers of countries that were initially more (or less) involved in international trucking, nor that it has favored low-wage countries.   相似文献   
149.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
150.
In this paper, we give a sufficient and almost necessary condition for the existence of optimal strategies in linear multisector models when time is continuous.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号