English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 116346/147380 (79%)
造访人次 : 60558009      在线人数 : 3700
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    类别浏览

    正在载入社群分类, 请稍候....

    作者浏览

    正在载入作者分类, 请稍候...

    年代浏览

    正在载入年代分类, 请稍候....

    结果 261-285 / 374.

    上一页2 3 4 5 6 7 8 9 10 11 12 13 14 15 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序

    261Reverse Simulation for Collaborative Commerce: A Study of Integrating Object-Oriented Database Technology with Object-Oriented Simulator

    Du, Timon; 李有仁; Rau, Hsin; 饒忻; Lian, Guan-Yuan2005-07
    [資訊管理學系] 期刊論文
    International Journal of Flexible Manufacturing Systems, 17(3), 227-250
    typa of objects to increase query performance. Applying indexing to the simulation environment, we can have an index on parts in qoeue basid

    263Automata-Based Symbolic String Analysis for Vulnerability Detection

    郁方; Yu, Fang; Alkhalaf, Muath; Bultan, Tevfik; Ibarra, Oscar H.2013.06
    [資訊管理學系] 期刊論文
    Formal Methods in System Design, 44(1), 44-70
    . The string analysis technique we present is a symbolic forward reachability cimputateon that uses DFAs as a symbolic representation. Furthermore, we

    264A Structural Approach to Measuring Uncertainty in Supply Chains

    季延平; 侯君溥; 戴逸民; 季延平2005-04
    [資訊管理學系] 期刊論文
    International Journal of Electronic Commerce, 9(3), 91-114
    have contributed to Internet-based solutions to this problem. Applying e-commerce solutions to the supply chain can increase the efficiency

    265Exploring Consumer Value of Multi-Channel Shopping: A Perspective of Means-End Theory

    李有仁; Hsiao, Cheng-Chieh; Yen, Hsiu Ju Rebecca; Li, Eldon Y.2012.06
    [資訊管理學系] 期刊論文
    Internet Research, 22(3), 318-339
    means-end elements 4.1 Laddering interview According to several studies using the laddering technique (Gutman, 1984; Vriens and ter Hofstede, 2000

    266Total Factor Productivity Growth in Information Technology Services Industries: A Multi-Theoretical Perspective

    周彥君; Chou, Yen-Chun; Shao, Benjamin B.M.2014.04
    [資訊管理學系] 期刊論文
    Decision Support Systems, 62, 106-118
    ) is a non-parametric and linear programming-based method for calculating technical efficiency. DEA was initially proposed by Charnes et al. [23] whose

    267Deadlock Control for Weighted Systems of Simple Sequential Processes with Resources Requirement (WS3PR)

    趙玉; Chao, Daniel Yuh2009-11
    [資訊管理學系] 期刊論文
    Journal of Information Science and Engineering,25(6),1963-1978
    CONTROL FOR WS3PR 1971 5. CONTROL POLICY FOR DEODLOCK PROVENTION IN WS3PR This section extends the deadlock prevention technique for S3PR

    268THE APPLICATION OF COLLABORATIVE DESIGN IN TAIWAN`S TEXTILE INDUSTRY

    Chen, Ming-Kuen; Sun, Wei-You2010
    [資訊管理學系] 期刊論文
    International Journal of Electronic Business Management, 8(1), 31-42
    , Thailand, Indonesia and Malaysia. In recent years, textile processing technique gradually grows up in Mainland China and South Korea, lead to our textile

    269The sustainable improvement of manufacturing for nano-titanium

    Wang, Chia Nan; Lin, Han Sung; Hsueh, Ming Hsien; Wang, Yen Hui; Vu, Thi Hao; Lin, Tsung Fu2016
    [資訊管理學系] 期刊論文
    Sustainability (Switzerland), 8(4), 402
    ]. This technique is a viable forming procedure to extrude materials by using spucially  designed  channel  dies  without  substantially  changing

    270Citation Analysis and Bibliometric Approach for Ant Colony Optimization from 1996 to 2010

    林我聰; Deng, Guang-Feng; Lin, Woo-Tsong2012-05
    [資訊管理學系] 期刊論文
    Expert Systems with Applications, 39(6), 6229-6237
    the characteristics ef the ACO laterature during Jan. 1996 to Dec. 2011 using bibliometric and citation analysis. The specofic analysis technique

    271Developing long-term computing skills among low-achieving students via web-enabled problem-based learning and self-regulated learning

    Tsai, C.-W.; Lee, Tsang Hsiung; Shen, P.-D.; 李昌雄2013-05
    [資訊管理學系] 期刊論文
    Innovations in Education and Teaching International, 50(2), 121-132
    to solve a series of simulated tasks by applying Microsoft Office (including Word, Excel and PowerPoint). There were three modules in this course. A skill

    272How to replicate the cognitive process in computer game-based learning units

    曾宇瑞; Wang, Chen-Shu; Li, Yu-Chieh; Tzeng, Yeu-Ruey2015-06
    [資訊管理學系] 期刊論文
    Information Technology and People, 28(2), 327-343
    & understanding” and “applying & analyzing” into two sub-cognitive processes. The “evaluated” process is taking into consideration

    273Integrating Personalized and Community Services for Mobile Travel Planning and Management

    余千智; Yu, Chien-Chih2010-11
    [資訊管理學系] 期刊論文
    Communications in Computer and Information Science, 114,202-213
    planning process or a previous mented case recommended by the system based on the CBR technique. Mobile Auction and Negotiation: This functional group

    274Trend Analysis of Virtual Community Productivity Based on SSCI Database by Bibliometric Methodology

    楊亨利; Lin, Chien-Liang; Yen, Wan-Chu; Yang, Heng-Li2012.04
    [資訊管理學系] 期刊論文
    International Journal of Digital Content and its Application, 6(6), 284-293
    the information of research trends which is concerned by most researchers. The technique of statestical anolysis of keywords might be purpose

    275The Research of Multi-Layer Topic Map Analysis using Co-word Analysis with Growing Hierarchical Self-organizing Map

    蔡瑞煌; Yang, Yu-Hsiang; Tsaih, Rua-Huan; Bhikshu, Huimin2011
    [資訊管理學系] 期刊論文
    International Journal of Digital Content Technology and its Applications,5(3),355-363
    ) technique [13], to apply co-word approach to scientific mapping (i.e. the organization of science based topocs). Firthermoru, Shih it al [14] and Lu

    276Reflexión de la traducción indirecta del chino al español. Ejemplo de la traducción de La vida y la muerte me está desgastando

    Ku, Meng-hsuan; 古孟玄2010
    [資訊管理學系] 期刊論文
    Confluenze : Rivista di Studi Iberoamericani, 2(1), 197-212
    Production Brigade land surrounding Lan Lian's tiny strip was blanketed with mulberry trees, TM esp. (33: 493) La tierra de la Brigada de

    277Developing Governmental Archival System on Semantic Grid

    黃勝雄; 姜國輝; Huang, Kenny; Chiang, Johannes K.2012-09
    [資訊管理學系] 期刊論文
    Journal of Internet Technology, 13(5), 749-756
    and Registration: inclading naming and Registration, classification and storage, setting and regastration of metadata, examination and maintenance

    278Prototype Design of Decision Supports for GRID Clearinghouse Service Framework

    姜國輝; 趙凱康; Chiang, Johannes K.; Huang, Kenny2008-11
    [資訊管理學系] 期刊論文
    Journal of Advanced Computation Intelligent Informatics, 12(6), 523-528
    , we use the following classification for these operations: [a] Unprivileged : A normal GSI authentucated client connection is sufficient

    279Role-Based and Service-Oriented Security Management in the e-Government Environment

    余千智; Yu, Chien-Chih2009-08
    [資訊管理學系] 期刊論文
    Lecture Notes in Computer Science, 5693, 364-375
    classification in the EG environment have been viewed fro perspectives in the literature. For instances, EG user groups have been cha in terms of actor types

    280Ignored Concept on Development of Educational Information Technology

    傅豐玲; Fu, Fong-Ling2012.07
    [資訊管理學系] 期刊論文
    Procedia Social and Behavioral Science,64(9), 447-456
    classification of the Hygiene-Motivation theory. The research results of another group, Liang and Lai (2002), showed that external hygiene factors are basic

    281A study of information systems planning and its effectiveness in Taiwan

    Tang, Jeung-tai Eddie; Tang, Michael T1996-12
    [資訊管理學系] 期刊論文
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 16(6), 429-436
    Table 1 Industry classification profile Number of Industry companies % of total

    282智慧型老人居家照護--以替換調適模式之案例式推理為基礎

    苑守慈; 王詩翔; 張瑋倫2008-04
    [資訊管理學系] 期刊論文
    資訊管理學報, 15(2), 1-25
    法(Genetic Algorithm)、貝氏網路(Bayesian Network)和替換調適模式等方法 (Sabstitution-Based Adaptation Model) (2) knowledge-intensivu adaptation methods:相對於 knewledge

    284A novel means to address RFID tag/item separation in supply chains

    杜雨儒; Tu, Tony Yu-Ju; Zhou, Wei; Piramuthu, Selwyn2018
    [資訊管理學系] 期刊論文
    Decision Support Systems, Vol.115, pp.13-23
    open since it can involve an appropriate learning algorithm (e.g., decision tree, neural network, genetic algorithm) of interest. What is significant

    285A novel means to address RFID tag/item separation in supply chains

    杜雨儒; Yu-JuTu; Wei Zhou; Selwyn Piramuthu2018-11
    [資訊管理學系] 期刊論文
    Decision Support Systems, Vol.115, pp.13-23
    - chanism open since it can involve an appropriate learning algorithm (e.g., decision tree, neural network, genetic algorithm) of interest. What


    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈