首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1843篇
  免费   15篇
  国内免费   2篇
财政金融   120篇
工业经济   146篇
计划管理   283篇
经济学   622篇
综合类   143篇
运输经济   117篇
旅游经济   28篇
贸易经济   255篇
农业经济   27篇
经济概况   118篇
信息产业经济   1篇
  2023年   23篇
  2022年   67篇
  2021年   92篇
  2020年   107篇
  2019年   73篇
  2018年   81篇
  2017年   90篇
  2016年   109篇
  2015年   70篇
  2014年   115篇
  2013年   85篇
  2012年   113篇
  2011年   155篇
  2010年   94篇
  2009年   100篇
  2008年   95篇
  2007年   86篇
  2006年   62篇
  2005年   54篇
  2004年   45篇
  2003年   29篇
  2002年   16篇
  2001年   20篇
  2000年   14篇
  1999年   8篇
  1998年   11篇
  1997年   9篇
  1996年   9篇
  1994年   2篇
  1993年   4篇
  1992年   3篇
  1990年   2篇
  1989年   4篇
  1988年   3篇
  1987年   1篇
  1984年   9篇
排序方式: 共有1860条查询结果,搜索用时 15 毫秒
111.
韩炜  彭靖 《南方经济》2021,40(10):85-102
创业网络对具有新进入缺陷的新创企业以及创业者而言有着至关重要的作用,不仅表现为"知识源"作用,也表现为"印记源"作用。印记理论指出个体或组织在其容易受到影响的时期,外部环境的显著特征将对其产生重大影响,个体和组织将打上环境特征的烙印,并且这种烙印将持续影响个体和组织的行为。基于此,本研究基于印记理论,利用对一家创业企业的归纳式纵向单案例分析探讨创业网络不同的结构属性经由何种印记过程,继而影响创业者学习方式的选择。结果表明:当创业网络表现为封闭、半开放以及开放的不同网络结构时,经由不同结构属性导致的结构印记和认知印记过程差异,影响着创业者实验式学习、观察式学习以及协同式学习的不同选择。  相似文献   
112.
李湛  尧艳珍  汤怀林  张菁 《南方经济》2021,40(12):80-92
文章基于溢出指数和波动溢出网络方法,从静态和动态分别度量我国金融系统不同子市场间的风险联动水平及变动趋势。研究结果表明,我国金融系统风险溢出效应整体水平较高,各市场间联动性较强;市场内部滞后效应大于市场之间溢出效应,两两有向溢出效应具有强不对称性;作为我国金融系统的风险中心,货币市场始终处于风险溢出方,但在金融危机时期,其对外风险溢出效应相对减弱,而大宗商品市场、资本市场、房地产市场等其余市场的风险溢出效应相对增强。值得注意的是,当前我国金融系统整体风险溢出水平较高,市场间风险相关性较强,需要进一步加强系统性风险的监测与防范。  相似文献   
113.
创新柔性对企业在不确定性环境下保持健康稳定发展至关重要,如何提升企业创新柔性受到学界关注。现有文献侧重研究单个因素对创新柔性的净效应,鲜有分析多因素对创新柔性的协同效应。基于组态视角,运用模糊集定性比较分析法(fsQCA),探讨网络能力和知识共创两个层面的5个变量对企业创新柔性的联动效应及其作用路径。结果表明,网络愿景、网络构建、网络管理、联合型知识共创和嵌入型知识共创均不是构成企业高、非高创新柔性的必要条件,且单个前因条件对创新柔性的解释力较弱,说明影响企业创新柔性的因素是多方面的;存在3条提升企业创新柔性的路径,即资源获取型、发展—管理型和单一型;导致企业非高创新柔性的路径有两条,且与高创新柔性路径影响因素存在非对称性关系。研究不仅能丰富创新柔性相关理论,还可为企业提升创新柔性提供思路借鉴。  相似文献   
114.
A multi-echelon inventory system implies the existence of a hierarchy of stocking locations, and the dependence and interaction between them. We consider a multi-echelon, spare-part inventory management problem with outsourcing and backordering. The problem is characterized by deterministic repair time/cost, and supply and demand that lie within prescribed intervals and that vary over time. The objective is to minimize the total inventory and transportation costs. We develop a network model for problem analysis and present a network flow algorithm for solving the problem. We prove that the Wagner-Whitin property, known for the lot-sizing problem, can be extended to the spare-part inventory management problem under study.  相似文献   
115.
Recognizing policy-making process as a communicative process, this study examines who has subsidized information relating to the net neutrality policy debate. Empirical data has been collected from net neutrality stories published in four national newspapers, as well as from hearings by Congress and the Federal Communications Commission (FCC), during the period of February 2004 through January 2009. Study findings reveal that corporate interests have played a significant role in subsidizing information on net neutrality, both to the public through the mainstream media and to legislators through Congressional hearings. Furthermore, study results show that experts played a larger role in defining net neutrality through the mainstream media and FCC hearings than they did through Congressional hearings. Finally, the role of advocacy group representatives was more apparent at Congressional hearings than via the other two available information channels.  相似文献   
116.
This paper studies various modeling approaches to design resilient supply networks (SN) for the location-transportation problem under uncertainty. The future environment of the SN is shaped by random demands, and by disruptions perturbing depots capacity and ship-to-point demand processes. The paper proposes several stochastic programming models incorporating alternative resilience seeking formulations. A generic approach to model SN disruptions, and to elaborate and evaluate SN designs is also proposed. Experiments are made to compare the SN design models formulated, and recommendations are drawn on the approach to use to design effective and robust supply networks.  相似文献   
117.
本文阐述了理实一体化教学,并对其在网络互联教学中(包括课程标准、教学内容、教学实施、教学方法)的应用进行了深入的探索,最后对其在教学实践中收到的良好效果给予了肯定。  相似文献   
118.
Pricing and availability of tickets have always been a source of confusion for customers in transportation industries. What is the best time to buy tickets? Why passengers taking the same flight might pay significantly different prices for the same seat? Why round trip tickets between two cities sometimes become cheaper than the one-way flights between them? Is it fair to buy a ticket for an itinerary cheaper than a ticket for just a part of it? These observations make customers wonder why they pay higher prices for shorter flights. In this paper, we study the airlines’ revenue management systems and explain some of these pricing schemes in travel industries. We develop a simulator to study the decision making process of network revenue management and use a numerical study to explore these questions and address some explanations for them. We relate these observations to the revenue management measurements such as the bid price or the adjustment cost and show how the dynamic of the network get influenced by these measures that eventually results in unusual pricing. We explain how a zero or small bid price of a specific leg may cause the price of an itinerary be cheaper than one segment of it and that the small bid price is caused by low demand in comparison to the available capacity. We exhibit network revenue management system and show the above issues for a small network.  相似文献   
119.
为开展计算机基础课程的双语教学和提学生自主学习能力。作者结合教学实践,提出构建智能化网络学习平台,并对平台的设计思想、教育理念和技术难点进行了论述,供人们进一步开展网络教学研究作参考。  相似文献   
120.
Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security study domains.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号