首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16777篇
  免费   1篇
财政金融   2651篇
工业经济   760篇
计划管理   2559篇
经济学   3865篇
综合类   483篇
运输经济   1篇
旅游经济   8篇
贸易经济   4480篇
农业经济   1篇
经济概况   1354篇
信息产业经济   44篇
邮电经济   572篇
  2023年   1篇
  2022年   1篇
  2020年   2篇
  2019年   2篇
  2018年   2304篇
  2017年   2054篇
  2016年   1208篇
  2015年   93篇
  2014年   86篇
  2013年   63篇
  2012年   435篇
  2011年   1941篇
  2010年   1825篇
  2009年   1517篇
  2008年   1511篇
  2007年   1868篇
  2006年   64篇
  2005年   387篇
  2004年   462篇
  2003年   550篇
  2002年   251篇
  2001年   61篇
  2000年   49篇
  1999年   1篇
  1998年   16篇
  1996年   13篇
  1986年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
111.
112.
When price-cap rules determine the structure of prices for a long period, they suffer a credibility problem and introduce an element of risk especially if a firm’s profits are “too large”. Profit sharing may be seen as a device to pre-determine price adjustments and thus to decrease regulatory risk. We analyse the effects of profit sharing on the incentives to invest, using a real option approach. Absent credibility issues, a well designed profit sharing system may be neutral relative to a pure price cap. With regulatory risk, profit sharing is preferable to a pure price-cap one, if it intervenes for high enough profit levels.
Carlo Scarpa (Corresponding author)Email:
  相似文献   
113.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
114.
115.
This systematic review analyses literature on the work of hybrid value creation, i.e. the process of generating additional value by innovatively combining products (tangible component) and services (intangible component). A state of the art report on hybrid value creation is delivered by first systematically identifying and then analyzing 169 publications focusing on hybrid value creation. The identified publications are clustered into eight categories based on their links and interactions and thus a mapping of this evolving field is suggested. A discussion and reflection of the findings with respect to the pervasiveness of literature and the research methodologies used is provided. The paper concludes by identifying some dominant strategic gaps in the overall research landscape and provides directions for future research.  相似文献   
116.
117.
The transition of the energy supply system in Germany from fossil-nuclear energy resources to renewable energies is a policy issue and defines a society technics. Society technics takes responsibility for an essential societal need and should be based on an agreement between all actors in all involved systems. According to a society-technics there are benefits for encouraging research, good governance for political support, public understanding of science (PUSH), and academic consultation for politics.Positive implementation will results in optimal coordination as all systems will function and all actors will work for synergy-effects. But a sociological system analyses works out many “dyssynergies”, handling the transition only as technological challenges and failing in underlying this transformation as a socio-technical system. Using renewable energies will not only change the technological system architecture but also modifying social systems and individual attitudes.  相似文献   
118.
The implementation of smart meters in German households by 2032 is a major step in the transition towards an intelligent and connected energy system. Despite of federal legislation providing a structured plan for the nationwide smart meter rollout including basic product requirements, actors within the energy market have the opportunity to take an active part in shaping the market through appealing product offers and hence to create competitive advantage. This study identifies relevant features of smart meters from literature und business practice, and measures customer’s preferences for these features. Results indicate predominantly positive customer evaluations of smart meter features, amongst which the availability of consumption data, the installation price and rental charges as well as time variable tariffs contribute most to overall utility of smart meters. Finally, findings suggest targeting customers by defining strategies to address privacy concerns, to educate about saving potentials as well as to create differentiated pricing schemes.  相似文献   
119.
Abusive supervision has received increasing attention in the field. However, few studies have qualitatively reviewed its latest developments. The current paper reviews 48 studies on abusive supervision using content analysis. We identify six emerging trends of abusive supervision, including inconsistency of abusive behaviors, comparison between perceived and objective behaviors, reciprocity, team-level climate, coworker effects, and comparisons between theoretical perspectives. Based on a review of those six trends and some emerging findings, we identify and validate the possible positive effects of abusive supervision from an integrated analysis. We also determine the moderating role that Asian culture plays in differentiating the negative and positive effects of abusive supervision. Specifically, we identify the differences between Asian and Western cultures, and then explore the moral mechanisms (i.e., violation of moral standards, conflict of moral principles) through which abusive supervision may exert positive effects in the Asian cultural context. Finally, we clarify our theoretical implications and provide suggestions for future research.  相似文献   
120.
Design and problem solving are central to technology and have distinguished learning in technology from other curriculum areas. This research investigated how expert technologists learn design and problem solving through experience. Data was collected from four expert technologists and this information was analysed using learning theories that focus on learning through experience—that is experiential learning theory, situated cognition, distributed cognition and activity theory. This framework of analysis provided evidence that learning through experience is central to these experts’ development and justify a broader construct of experience than normally associated with hard materials. This information supports curriculum development in hard materials technology that employs a wide range of experiences and provides justification for curriculum developers and teachers to justify, inform and develop effective design and problem solving learning programmes focussed on a broadened construct of experience.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号