首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   2篇
财政金融   10篇
工业经济   2篇
计划管理   17篇
经济学   11篇
综合类   4篇
运输经济   1篇
旅游经济   1篇
贸易经济   8篇
经济概况   4篇
  2023年   1篇
  2022年   1篇
  2021年   1篇
  2019年   1篇
  2018年   3篇
  2017年   3篇
  2015年   2篇
  2014年   5篇
  2013年   6篇
  2012年   2篇
  2011年   5篇
  2010年   5篇
  2009年   3篇
  2008年   6篇
  2007年   3篇
  2006年   1篇
  2004年   1篇
  2003年   2篇
  2002年   4篇
  2000年   1篇
  1999年   1篇
  1993年   1篇
排序方式: 共有58条查询结果,搜索用时 15 毫秒
31.
This paper shows that the approach followed by Tamborini (2015) in analyzing and interpreting the euro area public debt crisis, based on the role played by agents characterized by heterogeneous market beliefs, can be applied also to the case of currency crises. By doing so, rather than considering the private sector as an atomistic player endowed with perfect information, and by considering a central bank that optimizes the amount of unsterilized inflow of foreign reserves in a Mundell-Fleming type speculative attack model, allows to explain the interest rates convex non-linearity that characterized, for example, a country like Italy during the 1992–93 EMS crisis.  相似文献   
32.
但随着网络的普及,病毒的防治变得更加重要了。在2007年各种新型病毒频繁发作,除了熊猫烧香病毒外,AV终结者及ARP病毒在网络上也非常猖獗,肆无忌惮,特别是在局域网上传播更加迅速,本文就AV终结者及ARP病毒的的症状及解决方案进行了详细的阐述。  相似文献   
33.
计算机网络安全面临的问题及防范措施   总被引:1,自引:0,他引:1  
张玉扣 《价值工程》2012,31(31):217-218
随着计算机网络技术的飞速发展和应用,计算机网络系统给用户带来了很多不安全的隐患,计算机网络安全已经越来越受到人们的高度重视,为此,本文从计算网络安全面临的主要问题进行分析,提出了有效的防范措施,目的是为了计算机网络为人们发挥出更大更好的作用。  相似文献   
34.
随着计算机网络技术的不断发展,局域网安全问题越来越受到人们的重视和关注,局域网内病毒的传播严重影响着网络信息的安全性,其中最具代表性的病毒就是ARP病毒。由于ARP病毒在局域网内的传播及对其他计算机的攻击性,为了确保信息的安全与畅通,ARP病毒的预防及清除工作已经成为了网络安全中的重要事情。  相似文献   
35.
孙忠良 《魅力中国》2010,(22):72-72
ARP地址欺骗类病毒(以下简称ARP病毒)是一类特殊的病毒,该病毒一般属于木马(Trojan)病毒,不具备主动传播的特性,不会自我复制。但是由于其发作的时候会向全网发送伪造的ARP数据包,干扰全网的运行,因此它的危害比一些蠕虫还要严重得多。  相似文献   
36.
This paper extends the currency crisis models in Obstfeld [Obstfeld, M., 1994. The logic of currency crises. Cahiers Economiques et Monetaries], [Obstfeld, M., 1996. Models of currency crises with self-fulfilling features. European Economic Review 40, 1037–1047] by modeling both the government's side and speculators' side and introducing uncertainty about each party's payoff. We argue that a speculative attack (defense) can be well modeled as a war of attrition between the government and speculators under asymmetric information. We then solve for a pure strategy, weakly perfect, Bayesian rational expectation equilibrium in which each party's time until concession depends on her benefits from winning and her costs of fighting. Using this model, we are able to explain important facts of currency crises. First, the model shows that failed defenses (attacks) can be ex-ante rational for governments (speculators). Second, the model predicts systematic variations in the durations of defenses. Finally, we also show that currency crises can be self-fulfilling in the sense that there exist multiple rational expectation equilibria in our model.  相似文献   
37.
该文针对蔓延泛滥的ARP病毒,特别近期使校园网用户经常掉线,影响正常的学习、工作和生活,同时给网络管理带来了极大的不便.文章从中心路由器、交换机到用户电脑主机,阐述了ARP病毒的预防与清除方法.  相似文献   
38.
This paper studies the role of a large trader in a dynamic currency attack model based on Abreu and Brunnermeier (2003), who study stock market bubbles and crashes in a dynamic model with a continuum of rational small traders. We introduce a large trader into their model and apply it to currency attacks. In an attack against a fixed exchange rate regime with a gradually overvalued currency, traders lack common knowledge about the time when the overvaluation starts and need to coordinate to break a peg. Both the inability of traders to synchronize their attack and their incentive to time the collapse of the regime lead to the persistent overvaluation of the currency. We find that the presence of a large trader with perfect information induces small traders to attack sooner and leads to an accelerated collapse of the regime. But the presence of a large trader with noisy information may delay the collapse of the regime ex post. Moreover, a large trader with precise information tends to be at the rear of an attack. With noisy information, he could attack earlier or later than small traders. In both cases, the large trader affects market dynamics of the attack substantially.  相似文献   
39.
This paper demonstrates that the implications of first-generation speculative attack models do not hold if there is a rational, forward-looking policy maker. The policy maker will be able to avoid predictable speculative attacks by introducing uncertainty into the decisions of speculators. This changes the sudden attack into a prolonged period of increasing speculation and uncertainty. In addition, the model provides useful insights into the viability of temporary nominal anchor policies, and a theoretical foundation for a useful empirical methodology.  相似文献   
40.
Many Latin American countries engaged in disinflation programs based on both exchange rate management and fiscal reforms. In most of the cases, part of the fiscal reform was not implemented and the program had to be abandoned. The aftermath of these programs is not encouraging. In this paper we show that, if the reform process is uncertain and inflation has welfare costs, the optimal exchange rate policy indeed implies the initiation of a disinflation program at the announcement of the fiscal reform, even if it implies the possibility of a balance of payments crisis. Finally, we show that it is optimal to engage in a sequence of stabilization programs until one of them is successful.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号