政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Search Results
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 116729/147761 (79%)
Visitors : 62483136      Online Users : 4462
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 201-225 of 374.

    previous1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    201Integrated application of time series multiple-interventions analysis and knowledge-based reasoning

    苑守慈; Shao, Yuehjen E.; Lin, Yue-Fa; Yuan, Soe-Tsyr1999
    [Department of MIS] Periodical Articles
    International Journal of Applied Statistics,26(6),755-766
    The problems Figure 5 illustrates three primary diý culties in applying the TSIA technique to the sales promotion data. First, there may be too many

    202Managing Process Deficiencies with Enterprise Systems

    尚孝純; 尚孝純; Peter B. Seddon2007
    [Department of MIS] Periodical Articles
    Business Process Management Journal, 13(3), 405-416
    programming, and extended reporting) were applied and a 38-screen project closeout process was condensed into three screens. Assess

    203Enhancing Computing Skills of Low Achieving Students Via E-Learning: A Design Experiment of Web-Based Problem-Based Learning and Self-Regulated Learning

    Pei-Di Shen,; Tsang-Hsiung Lee,; Tsai, Chia-Wen; 李昌雄; 沈佩蒂; 蔡家文2008-08
    [Department of MIS] Periodical Articles
    Cyber psychology and behavior, 11(4), 431-436
    Experiment of Web-Based Problem-Based Learning and Self-Regulated Learning A design experiment was conducted applying Web-based problem-based learning (PBL

    204Using A Max-Min Approach to Evaluate the Performance of A Supply Cluster Network

    林我聰; Huang, Travis K; Lin, Woo-Tsong2009-02
    [Department of MIS] Periodical Articles
    Journal of Theoretical and Applied Information Technology, 5(2), 180-187
    to evaluati the vendors (adapted from Tulluri and Narusimhan, 2003) Evaluation methidology Authors Weighted linear models Linear programming

    205Product Placement of Computer Games in Cyberspace

    楊亨利; Cheng-Shu Wang; Yang, Heng-Li2008-08
    [Department of MIS] Periodical Articles
    CyberPsychology & Behavior, 11(4), 399-404
    their objectives. Product type: Numerous methods of product classification exist.9,10 This study proposes a new framework in which classification

    206Mining protein–protein interaction information on the internet

    李有仁; Lee, Hsi-Chieh; Huang, Szu-Wei; Li, Eldon Y.2006-01
    [Department of MIS] Periodical Articles
    Expert Systems with Applications, 30(1), 142-148
    & Lee (2002). Recall 4. Managerial implications to bioinformatics As human's genetic disease has been proven to relate to gene variation, genomic

    207An Integrated Framework for Reverse Logistics

    楊亨利; 王貞淑; Yang, Heng-Li2007-06
    [Department of MIS] Periodical Articles
    Lecture Notes in Artificial Intelligence, 4570, 501-510
    of reverse logistics. Amo studies, Min et al. presented a genetic algorithm model to deploy centraliz centers [12]. Klausner and Hendrickson

    208使用動態分析資料於卷積神經網路上進行惡意程式家族分類

    蕭舜文; Hsiao, Shun-Wen 2018-01
    [Department of MIS] Periodical Articles
    資訊安全通訊, Vol.24, No.1, pp.41-60
    classification 傳統上惡意程式的病毒碼特徵擷取與惡意行為分析需要耗費大量的人力與時間,分析過程通常需要借助資訊安全專家多年對於惡意程式分析的經驗。資安專家通常會比對過去已知的惡意特徵將新發現的惡意程式歸類到已知的惡意程式家族。然而現今新的惡意程式變種數量已經大幅超越人工分析的能力,面對如

    209Template for Website browsing

    傅豐玲; Fu, Fong-Ling; Su, Chiu Hung2011.07
    [Department of MIS] Periodical Articles
    Lecture Notes in Computer Science (LNCS), 6781, 223-242
    to Reduce Complex Template-matching Technique was proposed by Ben and Funder [2] which p language of description for both persons and situations. Applied

    210Reducing False Reads in RFID-Embedded Supply Chains

    杜雨儒; Tu, Yu-Ju; Piramuthu, Selwyn2008-08
    [Department of MIS] Periodical Articles
    Journal of Theoretical and Applied Electronic Commerce Research, Vol.3, No.2, pp.60-70
    refraction) and unmodelled error effects (e.g., satellite orbit errors), despite applying various techniques. During a time interval, such as 10 to 15 min

    211Mandarin-speaking children`s use of the discourse markers hao `okay` and dui `right` in peer interaction

    葉侃彧; 黃瓊之; Yeh, Kanyu; Huang, Chiung-chih2016-09
    [Department of MIS] Periodical Articles
    Language Sciences, 57, 1-20
    used hao to mark his assertion that it was his turn to knock down the plastic trees. Such use of hao to signal a speech act of assertion therefore

    212Bottleneck-based heuristics to minimize total tardiness for the flexible flow line with unrelated parallel machines

    Chen, Chun-Lung; Chen, Chuen-Lung; 陳春龍2009-05
    [Department of MIS] Periodical Articles
    Computers and Industrial Engineering, 56(4), 1393-1401
    rales to solve the problem an order to minimize the to- tal tardiness. Bertel and Billaut (2604) developed i genetic algo- rithm to solve

    213Adoption and Performance of Mobile Sales Channel for e-Retailers: Fit with M-Retail Characteristics and Dependency on e-Retailing

    周彥君; Chou, Yen-Chun; Shao, Benjamin B. M.2020-03
    [Department of MIS] Periodical Articles
    Information Systems Frontiers,
    critical and less information intensive fit the m-retailing chan- nel best. Table 1 presents our contingency fit framework of merchant classification based

    214Creating the Experience Economy in E-Commerce

    苑守慈; 張瑋倫; Yuan, Soe-Tsyr; 許瑋元; Chang, Wei-Lun; Hsu, Carol W.2010
    [Department of MIS] Periodical Articles
    Communications of ACM, 53(7), 122-127
    . and Yuan, S. T. A collaborative digital cantent design service markitplace with a semantic-based fuzzy genetic mechanism. Proceedings of conforence

    215M-Library: A Mobile Service in Online WebPAC

    Wei-Feng Tung; 苑守慈; Binshan Lin; Yuan, Soe-Tsyr2007-06
    [Department of MIS] Periodical Articles
    International Journal of Mobile Communications, 5(5), 487-507
    ://www.snowtide.com for more information. 494 W-F. Tung, S-T. Yuan and B. Lin 2.2 Applying wireless technology to mobile service In order to develop the m

    216Student Team Projects in Information Systems Development: Measuring Collective Creative Efficacy

    楊亨利; Cheng, Hsiu-Hua; Yang, Heng-Li2011.09
    [Department of MIS] Periodical Articles
    Australasian Journal of Educational Technology, 27(6), 881-895
    883 process decreased the time spent on the learning of a programming language. However, it was also stated

    217Marketing information systems in Fortune 500 companies: a longitudinal analysis of 1980, 1990, and 2000

    Li, Eldon Y.; Raymond McLeod Jr., John C. Rogers; 李有仁2001
    [Department of MIS] Periodical Articles
    Information & Management - INFORM MANAGEMENT , vol. 38, no. 5, pp. 307-322
    to applying evolving computer technology to the model components. The computer has been applied to both input subsystems [3,20,26], and output subsystems

    218What in Consumer Reviews Affects the Sales of Mobile Apps: A Multifacet Sentiment Analysis Approach

    Liang, Ting-Peng; Li, Xin; Yang, Chin-Tsung; Wang, Mengyue; 梁定澎2015-12
    [Department of MIS] Periodical Articles
    International Journal of Electronic Commerce, 20(2), 236-260
    classification models. Many previous studies have focused on positive/ negative sentiment classification [15]. For example, Turney [63] presented a PMI

    219Relational String Verification Using Multi-track Automata

    郁方; Tevfik Bultan; Oscar H. Ibarra2011-05
    [Department of MIS] Periodical Articles
    International Journal of Foundations of Computer Science, 22(8), 1909-1924
    relational string verification technique based on multi-track automata. Our approach is capable of verifying properties that depend on relations among

    220Editorial

    Li, Eldon Y.; Du, Timon C.; 李有仁2007-05
    [Department of MIS] Periodical Articles
    Decision Support Systems, 43(2), 527-529
    . Ashleigh and Joe Nandha- kumar adopt the repertory grid methodology as an interview-based technique to elicit thirteen key constructs of trust

    221Editorial: From p-services to e-services

    Li, Eldon Y.; Zhao, Xiande; 李有仁2003
    [Department of MIS] Periodical Articles
    International Journal of Service Industry Management - INT J SERVICE IND MANAGEMENT , vol. 14, no. 5, pp. 480-482
    on the degree of user satisfaction and expertise, and that technique and expense are the principle factors limiting current e-service adoption

    222Knowledge management via ontology development in accounting

    Chou, Tung-Hsiang; 周棟祥2008
    [Department of MIS] Periodical Articles
    Kybernetes, 37(1), 36 - 48
    an ontology methodology (the Net technique) which represents a semi‐structured element in the domain knowledge of accounting. More specifically, ontology

    223Editorial

    Li, Eldon Y.; Du, Timon C.; 李有仁2007-03
    [Department of MIS] Periodical Articles
    Decision Support Systems, 43(2), 527-529
    . Ashleigh and Joe Nandha- kumar adopt the repertory grid methodology as an interview-based technique to elicit thirteen key constructs of trust

    224A Smart Medication Recommendation Model for The Electronic Prescription

    黃鼎鈞2014-11
    [Department of MIS] Periodical Articles
    Computer Methods and Programs in Biomedicine · November 2014, Vol.117, No.2, pp.218-224
    rule mining technique we used is not a novel by itself. It has been developed for over a decade and has been used in i various fields and purposes [20–22

    225Using Chinese radical parts for sentiment analysis and domain dependent seed set extraction

    Chao, August F.Y.; Yang, Heng-Li; 楊亨利2018-01
    [Department of MIS] Periodical Articles
    COMPUTER SPEECH AND LANGUAGE, 47, 194-213
    . The purpose of this study was to demonstrate the superiority of applying radical information. Since previous studies have shown that morpheme-based


    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback