English
|
正體中文
|
简体中文
|
Post-Print筆數 : 27 |
Items with full text/Total items : 94586/125118 (76%)
Visitors : 30491834 Online Users : 381
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of 政大典藏
學術期刊
資管評論
--期刊論文
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
政大機構典藏
>
學術期刊
>
資管評論
>
期刊論文
>
Browse By Title
Browse By Authors
Browse By Date
Browse By Data Type
Loading...
Collection Statistics
近3年內發表的文件:0(0.00%)
含全文筆數:100(100.00%)
文件下載次數統計
下載大於0次:100(100.00%)
下載大於100次:100(100.00%)
檔案下載總次數:31658(100.00%)
最後更新時間: 2021-04-11 20:35
上傳排行
資料載入中.....
下載排行
資料載入中.....
最近上傳
An Analysis of Trust, Distrust, and...
Secure WLAN Handoff Scheme with Con...
Metamorphic Malware Detection Using...
Probabilistic Approach of Improved ...
Editor's Introduction
Development of an In-House Grid Tes...
Implementation of N-Cryptographic M...
Antecedents and Consequences of Tru...
Exploring the Role of Culture in eW...
Securing E-Commerce Business Using ...
跳至:
(選擇年份)
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1985
1980
1975
1970
1960
1950
(選擇月份)
January
February
March
April
May
June
July
August
September
October
November
December
或輸入年份:
由新到舊排序
由最舊的開始
顯示項目1-25 / 100. (共4頁)
1
2
3
4
>
>>
每頁顯示[
10
|
25
|
50
]項目
日期
題名
作者
2016-03
Editor's Introduction
Li, Eldon Y.
2016-03
Probabilistic Approach of Improved Binary PSO Algorithm Using Mobile Sink Nodes
Anand, S. Raj
;
Kannan, E.
2016-03
Metamorphic Malware Detection Using Function Call Graph Analysis
Deshpande, Prasad
;
Stamp, Mark
2016-03
Secure WLAN Handoff Scheme with Continuous Authentication
Singh, Rajeev
;
Sharma, Teek P.
2016-03
An Analysis of Trust, Distrust, and Their Antecedents: Development of a Comprehensive Model of Consumer Intentions in Technology-Driven Transactions
Simon, Steven John
;
Cagle, Carol J.
2015-03
Exploring the Role of Culture in eWOM Adoption
Pentina, Iryna
;
Basmanova, Oksana
;
Zhang, Lixuan
;
Ukis, Yuliya
2015-03
Antecedents and Consequences of Trust in Using Mobile Banking
Yu, Chian-Son
2015-03
Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem
Adebayo, Olawale S.
;
Olalere, Morufu
;
Ugwu, Joel N.
2015-03
Development of an In-House Grid Testbed Supporting Scheduling and Execution of Scientific Workflows
Prajapati, Harshadkumar B.
;
Shah, Vipul A.
2014-09
Insights into Motivation to Participate in Online Surveys
Foster, Mary K.
;
Michon, Richard
2014-09
Data Management Issues and Data Mining of Real Time System Application for Environment Monitoring
Saini, Dinesh Kumar
;
Maskari, Sanad Al
2014-09
A Discrete Formulation of Successive Software Releases Based on Imperfect Debugging
Singh, Jagvinder
;
Anand, Adarsh
;
Kumar, Avneesh
;
Khatri, Sunil Kumar
2014-09
Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm
Kuppuswamy, Prakash
;
Saeed, Q. Y. Al-Khalidi
2014-03
Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm
Kuppuswamy, Prakash
;
Saeed, Q. Y. Al-Khalidi
2014-03
Exploring Donation Appeals in Top Not-for-Profit Websites
Pitts, Robert E.
;
Blose, Julia E.
;
Mack, Rhonda W.
2014-03
Detection and Analysis of Security Vulnerabilities in Java
Kumar, Ch. Aswani
;
Charitha, M. Sai
2014-03
Modelling e-Health Systems Security Requirements: A Business Process Based Approach
Alahmadi, Ahmed H.
;
Soh, Ben
;
Ullah, Azmat
2013-09
Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive Theory
Yen, Yung-Shen
2013-09
On Measuring and Increasing the Effectiveness of Banner Advertising
Ghosh, Haren
;
Bhatnagar, Amit
2013-09
Securing DNA Information through Public Key Cryptography
Tripathi, Shiv P. N.
;
Jaiswal, Manas
;
Singh, Vrijendra
2013-09
An Effective Pareto Optimality Based Fusion Technique for Information Retrieval
Batri, Krishnan
2013-03
Facilities and Service Models for Electric Scooter Recharge Stations
Wu, Hsu-Che
;
Wang, Pei-Wen
2013-03
Optimal Software Release Policy Approach Using Test Point Analysis and Module Prioritization
Srivastava, Praveen Ranjan
;
Sankaran, Subrahmanyan
;
Pandey, Pushkar
2013-03
A Simultaneous Business Design Method Utilizing G-RD
Saito, Tetsu
;
Udagawa, Kingo
;
Mitsukuni, Koshichiro
2013-03
The Impact of Strategic IT Partnerships on IT Security
Deane, Jason K.
;
Rakes, Terry R.
;
Rees, Loren Paul
;
Baker, Wade H.
顯示項目1-25 / 100. (共4頁)
1
2
3
4
>
>>
每頁顯示[
10
|
25
|
50
]項目
著作權政策宣告
1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(
nccur@nccu.edu.tw
),維護人員將立即採取移除該數位著作等補救措施。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
回饋