全文获取类型
收费全文 | 279篇 |
免费 | 11篇 |
专业分类
财政金融 | 15篇 |
工业经济 | 9篇 |
计划管理 | 136篇 |
经济学 | 19篇 |
综合类 | 24篇 |
运输经济 | 1篇 |
贸易经济 | 66篇 |
农业经济 | 6篇 |
经济概况 | 13篇 |
信息产业经济 | 1篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 9篇 |
2018年 | 10篇 |
2017年 | 12篇 |
2016年 | 6篇 |
2015年 | 11篇 |
2014年 | 36篇 |
2013年 | 55篇 |
2012年 | 38篇 |
2011年 | 32篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 5篇 |
2007年 | 4篇 |
2006年 | 6篇 |
2005年 | 6篇 |
2004年 | 1篇 |
2002年 | 1篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有290条查询结果,搜索用时 15 毫秒
41.
42.
云计算是当前互联网领域的一个热点,也成为业界、学界广泛讨论的前沿技术。云计算在其技术不断成熟、应用领域逐渐广泛的发展过程中,对传媒业也产生了非常深远的影响。文章主要通过文献研究、案例分析的方法,讨论了云计算对传统媒体商业模式、成本及效警、与数字媒体融合等方面的影响,并发现了云计算的出现将为传统媒体带来新的生机,同时也可能改变现有的传媒格局。 相似文献
43.
云计算环境下的审计业务模式是未来审计信息化发展的必然趋势。在归纳了IT环境下审计业务模式演变并从IT和审计两个角度诠释“云审计”及其国内外研究应用现状的基础上,以审计业务流程为主线,从云服务与审计结合的技术场景、云计算环境下的审计业务流程实现步骤以及云计算应用所引起的审计业务风险变化三个方面出发,分析云计算环境下的审计业务模式变革,为掌握云计算应用所带来的审计业务流程变革、迎接云审计时代的到来提供理论基础。 相似文献
44.
45.
Mehmet Bilal Ünver 《Telecommunications Policy》2019,43(2):154-170
One of the key factors for a thriving cloud computing market is the ‘interoperability’ between the relevant hardware and software that govern the cloud services. While a complete interoperability means different cloud users being able to exchange the management tools, server images and other software, this is infrequently realised because users are locked into (proprietary) cloud ecosystems. This (problem of vendor lock-in) is potentially accompanied with another problem revolving around the content delivery networks being integrated with the distinct clouds along with possible harms to media pluralism as well as interoperability. In view of these concerns, this study focuses on competition law, standardisation and regulatory policies, and elaborates on to what extent cloud interoperability needs to be secured under EU legal fora. Overall, it is found that vendor lock-in might be attended by ‘coupling’ and complex ‘layering’ strategies, whereas efficiency and/or security based justifications would arise as the counter-balancing reasons. Based on the findings, the study concludes that while focusing on the vertical (i.e., vendor lock-in) concerns, a comprehensive viewpoint needs to be upheld, allowing efficiencies (i.e., proprietary enhancements) based on the architectural design and innovations, obviating narrowly-fashioned (i.e., foreclosure-based) interventions such as in Microsoft case. It is also underlined that cloud interoperability has a content dimension that would require a broader perspective, extending to horizontal concerns and requirements within the context of EU policy making strategies. 相似文献
46.
针对现有的格上身份基线性同态签名方案密钥存储量大、结构复杂导致方案实际运行效率相对偏低的问题,提出了一个NTRU(Number Theory Research Unit)格上高效的身份基线性同态签名方案。首先在密钥生成阶段利用NTRU密钥生成算法产生主密钥,接着采用格基委派算法给出身份签名私钥,最后运行NTRU格上原像抽样算法产生出线性同态签名。对方案的安全性证明与性能分析结果表明,新方案满足正确性,具有弱内容隐私性。在随机预言机模型下,该方案在小整数解问题困难性条件下满足适应性选择身份和选择消息的存在性不可伪造性。同时,由于采用NTRU格的特殊结构,新方案在密钥量与运行效率方面与已有方案相比较均具有显著的优势,这对于计算资源受限环境的同态认证中具有重要的应用价值。 相似文献
47.
《Business Horizons》2020,63(2):205-213
Artificial intelligence applications in cognitive computing systems can be found in organizations across every market, including chatbots that help customers navigate websites, predictive analytics systems used for fraud detection, and augmented decision-support systems for knowledge workers. In this article, we share reflections and insights from our experience with AI projects in the public sector that can add value to any organization. We organized our findings into four thematic domains—(1) data, (2) technology, (3) organizational, and (4) environmental—and examine them relative to the phases of AI. We conclude with best practices for capturing value with cognitive computing systems. 相似文献
48.
Antonio Rico Manuel Noguera José Luis Garrido Kawtar Benghazi Joseph Barjis 《Enterprise Information Systems》2016,10(4):400-421
Multi-tenant architectures (MTAs) are considered a cornerstone in the success of Software as a Service as a new application distribution formula. Multi-tenancy allows multiple customers (i.e. tenants) to be consolidated into the same operational system. This way, tenants run and share the same application instance as well as costs, which are significantly reduced. Functional needs vary from one tenant to another; either companies from different sectors run different types of applications or, although deploying the same functionality, they do differ in the extent of their complexity. In any case, MTA leaves one major concern regarding the companies’ data, their privacy and security, which requires special attention to the data layer. In this article, we propose an extended data model that enhances traditional MTAs in respect of this concern. This extension – called multi-target – allows MT applications to host, manage and serve multiple functionalities within the same multi-tenant (MT) environment. The practical deployment of this approach will allow SaaS vendors to target multiple markets or address different levels of functional complexity and yet commercialise just one single MT application. The applicability of the approach is demonstrated via a case study of a real multi-tenancy multi-target (MT2) implementation, called Globalgest. 相似文献
49.
50.
针对关联规则挖掘算法在处理海量数据的过程中存在效率低、需要反复访问数据库等问题,以及在入侵检测系统产生误报、效率低下等问题,文章提出了基于关联规则挖掘的Q—CFIsL算法,设计了基于Q—CHsL算法的入侵警报检测系统模型。实验证明,Q-CFIsL算法在减少入侵警报的数量和降低误报率等方面明显优于其他算法, 相似文献