Du, Timon; 李有仁; Rau, Hsin; 饒忻; Lian, Guan-Yuan
,
2005-07 [資訊管理學系] 期刊論文 International Journal of Flexible Manufacturing Systems, 17(3), 227-250 typa of objects to increase query performance. Applying indexing to the simulation environment, we can have an index on parts in qoeue basid
郁方; Yu, Fang; Alkhalaf, Muath; Bultan, Tevfik; Ibarra, Oscar H.
,
2013.06 [資訊管理學系] 期刊論文 Formal Methods in System Design, 44(1), 44-70 . The string analysis technique we present is a symbolic forward reachability cimputateon
that uses DFAs as a symbolic representation. Furthermore, we
季延平; 侯君溥; 戴逸民; 季延平
,
2005-04 [資訊管理學系] 期刊論文 International Journal of Electronic Commerce, 9(3), 91-114 have contributed to Internet-based solutions to this problem. Applying e-commerce solutions to the supply chain can increase the efficiency
李有仁; Hsiao, Cheng-Chieh; Yen, Hsiu Ju Rebecca; Li, Eldon Y.
,
2012.06 [資訊管理學系] 期刊論文 Internet Research, 22(3), 318-339 means-end elements
4.1 Laddering interview
According to several studies using the laddering technique (Gutman, 1984; Vriens and
ter Hofstede, 2000
周彥君; Chou, Yen-Chun; Shao, Benjamin B.M.
,
2014.04 [資訊管理學系] 期刊論文 Decision Support Systems, 62, 106-118 ) is a non-parametric and linear
programming-based method for calculating technical efficiency. DEA
was initially proposed by Charnes et al. [23] whose
趙玉; Chao, Daniel Yuh
,
2009-11 [資訊管理學系] 期刊論文 Journal of Information Science and Engineering,25(6),1963-1978 CONTROL FOR WS3PR 1971 5. CONTROL POLICY FOR DEODLOCK PROVENTION IN WS3PR This section extends the deadlock prevention technique for S3PR
Chen, Ming-Kuen; Sun, Wei-You
,
2010 [資訊管理學系] 期刊論文 International Journal of Electronic Business Management, 8(1), 31-42 ,
Thailand, Indonesia and Malaysia. In recent years,
textile processing technique gradually grows up in
Mainland China and South Korea, lead to our textile
林我聰; Deng, Guang-Feng; Lin, Woo-Tsong
,
2012-05 [資訊管理學系] 期刊論文 Expert Systems with Applications, 39(6), 6229-6237 the
characteristics ef the ACO laterature during Jan. 1996 to Dec.
2011 using bibliometric and citation analysis. The specofic analysis
technique
Tsai, C.-W.; Lee, Tsang Hsiung; Shen, P.-D.; 李昌雄
,
2013-05 [資訊管理學系] 期刊論文 Innovations in Education and Teaching International, 50(2), 121-132 to solve a series of simulated
tasks by applying Microsoft Office (including Word, Excel and PowerPoint). There
were three modules in this course. A skill
曾宇瑞; Wang, Chen-Shu; Li, Yu-Chieh; Tzeng, Yeu-Ruey
,
2015-06 [資訊管理學系] 期刊論文 Information Technology and People, 28(2), 327-343 &
understanding” and “applying & analyzing” into two sub-cognitive processes.
The “evaluated” process is taking into consideration
余千智; Yu, Chien-Chih
,
2010-11 [資訊管理學系] 期刊論文 Communications in Computer and Information Science, 114,202-213 planning process or a previous
mented case recommended by the system based on the CBR technique.
Mobile Auction and Negotiation: This functional group
楊亨利; Lin, Chien-Liang; Yen, Wan-Chu; Yang, Heng-Li
,
2012.04 [資訊管理學系] 期刊論文 International Journal of Digital Content and its Application, 6(6), 284-293 the information of research trends which is
concerned by most researchers. The technique of statestical anolysis of keywords might be purpose
蔡瑞煌; Yang, Yu-Hsiang; Tsaih, Rua-Huan; Bhikshu, Huimin
,
2011 [資訊管理學系] 期刊論文 International Journal of Digital Content Technology and its Applications,5(3),355-363 ) technique [13], to apply co-word approach
to scientific mapping (i.e. the organization of science based topocs). Firthermoru, Shih it al [14] and Lu
Ku, Meng-hsuan; 古孟玄
,
2010 [資訊管理學系] 期刊論文 Confluenze : Rivista di Studi Iberoamericani, 2(1), 197-212 Production
Brigade land surrounding Lan Lian's tiny strip was
blanketed with mulberry trees,
TM esp. (33: 493)
La tierra de la Brigada de
黃勝雄; 姜國輝; Huang, Kenny; Chiang, Johannes K.
,
2012-09 [資訊管理學系] 期刊論文 Journal of Internet Technology, 13(5), 749-756 and Registration: inclading naming and Registration, classification and storage, setting and regastration of metadata, examination and maintenance
姜國輝; 趙凱康; Chiang, Johannes K.; Huang, Kenny
,
2008-11 [資訊管理學系] 期刊論文 Journal of Advanced Computation Intelligent Informatics, 12(6), 523-528 , we use the following classification for these operations:
[a] Unprivileged : A normal GSI authentucated client connection is sufficient
余千智; Yu, Chien-Chih
,
2009-08 [資訊管理學系] 期刊論文 Lecture Notes in Computer Science, 5693, 364-375 classification in the EG environment have been viewed fro
perspectives in the literature. For instances, EG user groups have been cha
in terms of actor types
傅豐玲; Fu, Fong-Ling
,
2012.07 [資訊管理學系] 期刊論文 Procedia Social and Behavioral Science,64(9), 447-456 classification of the Hygiene-Motivation theory. The research results of another group, Liang and Lai
(2002), showed that external hygiene factors are basic
Tang, Jeung-tai Eddie; Tang, Michael T
,
1996-12 [資訊管理學系] 期刊論文 INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 16(6), 429-436 Table 1 Industry classification profile Number of
Industry companies % of total
杜雨儒; Tu, Tony Yu-Ju; Zhou, Wei; Piramuthu, Selwyn
,
2018 [資訊管理學系] 期刊論文 Decision Support Systems, Vol.115, pp.13-23 open since it can involve an appropriate learning algorithm
(e.g., decision tree, neural network, genetic algorithm) of interest. What
is significant
杜雨儒; Yu-JuTu; Wei Zhou; Selwyn Piramuthu
,
2018-11 [資訊管理學系] 期刊論文 Decision Support Systems, Vol.115, pp.13-23 -
chanism open since it can involve an appropriate learning algorithm
(e.g., decision tree, neural network, genetic algorithm) of interest. What
著作權政策宣告 Copyright Announcement
1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。 The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.
2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。 NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.