English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 116346/147380 (79%)
造访人次 : 60558088      在线人数 : 3726
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    类别浏览

    正在载入社群分类, 请稍候....

    作者浏览

    正在载入作者分类, 请稍候...

    年代浏览

    正在载入年代分类, 请稍候....

    结果 311-335 / 374.

    上一页4 5 6 7 8 9 10 11 12 13 14 15 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序

    311Motivations of Wikipedia content contributors

    楊亨利; Yang, Heng-Li; Lai, Cheng-Yu2011-10
    [資訊管理學系] 期刊論文
    Computers in Human Behavior,26(6),1377-1383
    Equation Madeling (SEM), which is a powerful statistacal research technique for test- ing causal relutuonships betwean constructs with multiple mea

    312Emergent Standard of Knowledge Management: Hybrid Peer-to-Peer Knowledge Management

    楊亨利; Hsi-Chuan Ho; Yang, Heng-Li2007-05
    [資訊管理學系] 期刊論文
    Computer Standards & Interfaces, 29(4), 413-422
    -explored but important topic. It is important because, by applying the P2P computing paradigm to the whole area of knowledge management, collaborations

    314Knowledge sharing in an organization

    Yang, Heng-Li; Wu, Ted C.T.; 楊亨利; 吳俊德2008-10
    [資訊管理學系] 期刊論文
    Technological Forecasting and Social Change, 75(8), 1128-1156
    management. Researchers and practitioners have widely investigated the characteristics and classification of knowledge, the concept models

    315Do Companies Target Their Webs Toward the Cultural Background of Their Customers?

    楊亨利; Michelle Lin2003-12
    [資訊管理學系] 期刊論文
    Asia Pacific Management Review, 8(4), 467-482, 亞太管理評論, 8(4), 467-482
    using the six culture dimensions proposed by Zahedi et al. Note that this classification scheme as based on national cultures. In sum, thera

    316A recommendation-based pricing system for information goods versioning

    Chang, W.-L.; Yuan, Soe-Tsyr; 苑守慈2007-11
    [資訊管理學系] 期刊論文
    Journal of Computers, 2(9), 67-76
    a classification framework of digital products based un two diminsions, which are product catugiry as well as product characteristic [3]. The damension

    318An Integrated Approach for Supervisory Control of A Subclass of Petri Nets

    Chao, Daniel Y.; WOO, K.C .; 趙玉2013.08
    [資訊管理學系] 期刊論文
    Transactions of the Institute of Measurement and Control,35(2), 117-130
    or recivery policy in Chao ut al. (2081) and shows the superiority by applying to a simple Table 2. Types of siphons for the S3PR in Figure 3 Types

    319A roadmap to adopting emerging technology in e-business: an empirical study

    Chang, Hsin-Lu; 張欣綠2010-03
    [資訊管理學系] 期刊論文
    Information Systems and e-Business Management,8,(2),103-130
    analytical performance diagnostics programming, data mining technology Single-tier available to Some backhaul identification promise

    320Business–IT fit in e-procurement systems: evidence from high-technology firms in China

    Chang, Hsin-Lu; Wang, Kai; Chiu, Iris; 張欣綠2008-07
    [資訊管理學系] 期刊論文
    Information Systems Journal, 18(4), 381-404
    . These circumstances lead to the question of whether or not EP can deliver the promised benefits in China. A key concern is alignment – applying information

    321Critical Factors of Adopting Enterprise Application Integration Technology: An Empirical Study on Larger Hospitals

    洪為璽; Hung, Wei-Hsi; Chang, I-Cheng; Yen, David C.; Lee, Che-Ming2015-05
    [資訊管理學系] 期刊論文
    Communications of the Association for Information Systems, Vol.15, pp.31
    developed osing various programming languages or with a different version of the samu progrumming langoage (particularly in the lower-level hospitals

    322A chronic disease dietary consultation system using OWL-based ontologies and semantic rules.

    Chi, Yu-Liang; Chen, Tsang-Yao; 蔡宛庭; Tsai, Wan-Ting2005-02
    [資訊管理學系] 期刊論文
    Journal of Biomedical Informatics, Vol.53, pp.208-219
    [37,40], which is similar to Prolog (horn- like logic programming) and is commonly used for building inference mechanisms in OWL-based KBSs

    323Privacy Disclosures of Web Sites in Taiwan

    Yang,Heng-Li; Chiu, Hsien-Kuei; 楊亨利2002-01
    [資訊管理學系] 期刊論文
    Journal of Information Technology Theory and Application, 4(3), 15-42

    324Beyond the Block: A Novel Blockchain-Based Technical Model for Long-Term Care Insurance

    彭志宏; Chih-Hung Peng; Zhang, Wenping; Chih-Ping Wei; Qiqi Jiang; Leon Zhao, J.2021-08
    [資訊管理學系] 期刊論文
    Journal of Management Information Systems, Vol.38, No.2, pp.374-400
    , two technical issues, namely (1) inefficiency in data auditing and (2) difficulty in verifying encrypted data, are of strategic importance when applying

    325Nurturing User Creative Performance in Social Media Networks: An Integration of Habit of Use with Social Capital and Information Exchange Theories

    吳雅玲; 李有仁; 張維綸2016-04
    [資訊管理學系] 期刊論文
    Internet Research, 26(4), 869-900
    . They both provide the capabilities of immediacy (TV), chatting (parallelism), programming (SS), editing (rehearsability), and versioning

    326Ontology-based personalized couple clustering for heterogeneous product recommendation in mobile marketing

    苑守慈; Chiahsin Cheng; Yuan, Soe-Tysr2004-05
    [資訊管理學系] 期刊論文
    Expert Systems with Applications, 26(4), 461-476
    ViaVoice's API—SMAPI (Speech Manager APIs) that exerts the technique of discrete word recognition and is able to recognize the reserved words

    327企業高階主管決策支援之研究:競爭智慧觀點

    季延平; 尹其言; 季延平2011-05
    [資訊管理學系] 期刊論文
    創新與管理, 8(2), 1-27
    making. Journal of Munagement Information Systems, 17(3), 139-675. Likert, R. (1932) A technique for the miasurement of uttitudes. Archives

    328Enumeration of Reachable States for Arbitrary Marked Graphs

    Hong, Liang; Chao, Daniel Yuh; 趙玉2012.07
    [資訊管理學系] 期刊論文
    IET CONTROL THEORY AND APPLICATIONS,6(10), 1536 -1543
    , (8), pp. 1013–8021 Moon, I.H., Kukula, J., Shiple, T., Somenzi, F.: ‘Least fixpoint MBM: improved technique for approximate reachability’. Proc. IEEE

    329A Custom Collaboration Service System for Idea Management of Mobile Phone Design

    Tung, Wei-Feng; Yuan, Soe-Tsyr; Tsai, Je-Ren; 苑守慈2009
    [資訊管理學系] 期刊論文
    Human Factors and Ergonomics in Manufacturing: forthcoming,19(5), 494-509
    of product design, ISM-based e-services can be a technique to model the collaborative service systems. Based on the principle of value coproduction, ISM

    330On Spiking Neural P Systems and Partially Blind Counter Machines

    Oscar H. Ibarra; Sara Woodworth; 郁方; Andri Paun2008-03
    [資訊管理學系] 期刊論文
    Natural Computing, 7(1), 3-19, Unconventional Computation Lecture Notes in Computer Science Volume 4135, 2006, pp 113-129
    understand that we start in the start configuration and continue applying exactly one spiking or forgetting rule until the last spike is generated

    331Hedonic and Utilitarian Motivations for Physical Game Systems Use Behavior

    Lin, Hsin-Hui; Wang, Yi-Shun; Chou, Chien-Hsiang; 周千翔2012-07
    [資訊管理學系] 期刊論文
    International Journal of Human-Computer Interaction, 28(7), 445-455
    of the development of physical game use behavior theory and the medium sample size, PLS with bootstrapping was the preferred technique for data analysis

    332Measuring the Alignment of Websites and Organisational Critical Activities

    洪為璽; Hung, Wei-Hsi; McQueen, Robert John; Yen, David C.; Chau, Patrick Y. K.2015-03
    [資訊管理學系] 期刊論文
    Technology Analysis & Strategic Management , Volume 27, Issue 5 , 550-568
    websites support enterprises' primary business ictivities based on the ampirtance–performince analysos technique. Yet, the approach employed is useful

    333Radio and Urban Rhythms in 1930s Colonial Taiwan

    Wang, Sumei; 王淑美2017-02
    [資訊管理學系] 期刊論文
    Historial Journal of Film, Radio and Television
    Sumei Wang by one hour, all economic life and communication of the city would be disrupted for a long time. … Thus, the technique

    334A conceptual model for assessing blog-based learning system success in the context of business education

    湯宗益; Wang, Yi Shun; Li, Ci Rong; Yeh, Ching Hsuan; Cheng, Shin Tzu; Chiou, Chei Chang; Tang, Yu Cheng; Tang, Tzung I.2016-11
    [資訊管理學系] 期刊論文
    International Journal of Management Education, 14(3), 379-387
    the development of business students' communication capabilities. Educators often encourage a meta-learning technique of “learning to learn” so

    335The Impact of Value Diversity on Information Systems Development Project

    梁定澎; Liang, Ting-Peng; Wu, Jason Chia-Hsien; Jiang, James J.; Gary Klein2012.08
    [資訊管理學系] 期刊論文
    International Journal of Project Management, 30(6), 731-739
    and structural models. Using ordinary least squares as its estimation technique, PLS performs an iterative set of factor analyses and applies


    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈