全文获取类型
收费全文 | 10368篇 |
免费 | 384篇 |
国内免费 | 185篇 |
专业分类
财政金融 | 1361篇 |
工业经济 | 426篇 |
计划管理 | 3242篇 |
经济学 | 1378篇 |
综合类 | 1496篇 |
运输经济 | 96篇 |
旅游经济 | 131篇 |
贸易经济 | 1533篇 |
农业经济 | 442篇 |
经济概况 | 832篇 |
出版年
2024年 | 54篇 |
2023年 | 180篇 |
2022年 | 133篇 |
2021年 | 235篇 |
2020年 | 261篇 |
2019年 | 211篇 |
2018年 | 192篇 |
2017年 | 229篇 |
2016年 | 221篇 |
2015年 | 298篇 |
2014年 | 650篇 |
2013年 | 899篇 |
2012年 | 734篇 |
2011年 | 908篇 |
2010年 | 744篇 |
2009年 | 554篇 |
2008年 | 734篇 |
2007年 | 741篇 |
2006年 | 683篇 |
2005年 | 646篇 |
2004年 | 460篇 |
2003年 | 336篇 |
2002年 | 230篇 |
2001年 | 173篇 |
2000年 | 143篇 |
1999年 | 77篇 |
1998年 | 56篇 |
1997年 | 29篇 |
1996年 | 27篇 |
1995年 | 16篇 |
1994年 | 16篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1986年 | 6篇 |
1985年 | 5篇 |
1984年 | 8篇 |
1983年 | 13篇 |
1982年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
131.
132.
21世纪是一个信息技术高度发达的时代。信息的全球化,使得信息产品、信息服务成了每个国家,每个人必不可少的一部分。掌握信息技术,成了每个人生存的基础。小学作为个人成长的重要时期,信息技术教育应成为小学教育中重要的一部分。本文从小学信息技术对提高学生学习兴趣、快速掌握现代信息、开发小学生智力等方面作了探讨。 相似文献
133.
二十一世纪是信息化的时代,加快信息化发展已成为当今社会不可缺少的方面。然而,科学技术是一把双刃剑,在引起人类社会生活及生产的历史性变革的同时也引发了一些信息安全问题。由于网络自身存在的缺陷,网络安全已成为社会关注的焦点,随着新的入侵攻击手段的出现,网络安全技术手段也不断涌现,这对于提高其安全性和可靠性非常重要。本论文就当前计算机信息安全教育方面所面临的问题,以及计算机网络本身所存在的问题进行了探讨,并对信息安全问题提出了安全解决策略。 相似文献
134.
The impact of information technologies on manufacturing operations and performance is well established. However, scant research has been devoted to examining information technology (IT) investment among hospitals and how it influences patient care and financial performance. Using the lens of the Theory of Swift Even Flow (TSEF), we present an operations management-based perspective on the effect of IT in streamlining hospital operations. Specifically, we examined the role of IT on patient flow and its consequences for improved hospital efficiency and performance. 相似文献
135.
《Enterprise Information Systems》2013,7(3):325-339
In order to offer new services and gain competitive advantages, e-commerce has been widely adopted, particularly in the banking industry. Unfortunately, despite the growing adoption of e-commerce in the banking industry, the issue that web-based B2C e-commerce functionality adoption varies between banks or a bank's branches across nations has not received sufficient attention. Many factors affect e-commerce functionality adoption. However, two national environmental factors (information infrastructure and demographics) are particularly important because they relate to the availability of technologies in use and the characteristics of customers, respectively. This research conducts a cross-country case study of a global bank's Beijing (China), Chicago (USA), and Dubai (UAE) branches to investigate how the two national environmental factors affect e-commerce functionality adoption. The specific objectives are to discover how information infrastructure (measured by number of PCs per 1000 people and Internet access cost) and demographics (measured by population composition and income) affect e-commerce functionality adoption of the global bank's three branches. Secondary data were collected for information infrastructure and demographics; additionally, focused interviews with these three branches' IT and business managers provided sources for answering ‘how’. The key finding demonstrates that the differences in e-mail ordering and online shopping adoptions between these branches are mainly attributed to proposed factors of population composition and Internet access cost, and the new factor of individual credit reference system. This research contributes to theory development in this emerging important research subject. 相似文献
136.
《Enterprise Information Systems》2013,7(3):309-324
In recent years, information systems in telecommunication enterprises have been characterised by boundary expansion and increase of departmental-level applications. These changes increase the complexity of security evaluation and pose new challenges to enterprises' information security. Taking into account the behaviour characters of system users, we put forward a system security evaluation approach based on access paths. This approach can help evaluators and users find out potential security risks without figuring out the boundary of systems explicitly. It has no special requirements for system scale and can be used in the evaluation of enterprise-level and departmental-level systems. This paper also presents the formal definition of access path and related evaluation rules. 相似文献
137.
《Enterprise Information Systems》2013,7(4):409-424
General purpose enterprise resource planning (ERP) systems have problems such as complex configuration processes, low adaptation to specific industries, and an extensive implementation time period. In order to alleviate these issues, this paper proposes the concept of industry-oriented ERP (IERP) and a component-based approach to IERP development. This paper also presents the framework of developing IERP in which business process modelling and software reuse are employed as primary methods to improve the operability of component-based IERP. The framework consists of five layers including server layer, team work supporting layer, IERP construction and customisation layer, reusable assets and toolset layer, and the IERP system instance layer. These layers as well as their relationship with each other are also discussed. 相似文献
138.
《Enterprise Information Systems》2013,7(2):219-234
Among distribution centre operations, order picking has been reported to be the most labour-intensive activity. Sophisticated storage assignment policies adopted to reduce the travel distance of order picking have been explored in the literature. Unfortunately, previous research has been devoted to locating entire products from scratch. Instead, this study intends to propose an adaptive approach, a Data Mining-based Storage Assignment approach (DMSA), to find the optimal storage assignment for newly delivered products that need to be put away when there is vacant shelf space in a distribution centre. In the DMSA, a new association index (AIX) is developed to evaluate the fitness between the put away products and the unassigned storage locations by applying association rule mining. With AIX, the storage location assignment problem (SLAP) can be formulated and solved as a binary integer programming. To evaluate the performance of DMSA, a real-world order database of a distribution centre is obtained and used to compare the results from DMSA with a random assignment approach. It turns out that DMSA outperforms random assignment as the number of put away products and the proportion of put away products with high turnover rates increase. 相似文献
139.
《Enterprise Information Systems》2013,7(3):359-383
Business process modelling (BPM) has become fundamental for modern enterprises due to the increasing rate of organisational change. As a consequence, business processes need to be continuously (re-)designed as well as subsequently aligned with the corresponding enterprise information systems. One major problem associated with the design of business processes is reusability. Reuse of business process models has the potential of increasing the efficiency and effectiveness of BPM. This article critically surveys the existing literature on the problem of BPM reusability and more specifically on that State-of-the-Art research that can provide or suggest the ‘elements’ required for the development of a methodology aimed at discovering reusable conceptual artefacts in the form of patterns. The article initially clarifies the definitions of business process and business process model; then, it sets out to explore the previous research conducted in areas that have an impact on reusability in BPM. The article concludes by distilling directions for future research towards the development of apatterns-based approach to BPM; an approach that brings together the contributions made by the research community in the areas of process mining and discovery, declarative approaches and ontologies. 相似文献
140.
《Enterprise Information Systems》2013,7(4):419-432
Information retrieval (IR) is essential to enterprise systems along with growing orders, customers and materials. In this article, an enhanced dynamic hash TRIE (eDH-TRIE) algorithm is proposed that can be used in a lexicon search in Chinese, Japanese and Korean (CJK) segmentation and in URL identification. In particular, the eDH-TRIE algorithm is suitable for Unicode retrieval. The Auto-Array algorithm and Hash-Array algorithm are proposed to handle the auxiliary memory allocation; the former changes its size on demand without redundant restructuring, and the latter replaces linked lists with arrays, saving the overhead of memory. Comparative experiments show that the Auto-Array algorithm and Hash-Array algorithm have better spatial performance; they can be used in a multitude of situations. The eDH-TRIE is evaluated for both speed and storage and compared with the naïve DH-TRIE algorithms. The experiments show that the eDH-TRIE algorithm performs better. These algorithms reduce memory overheads and speed up IR. 相似文献