English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 116729/147762 (79%)
造访人次 : 62297603      在线人数 : 6431
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    正在载入社群分类, 请稍候....
    政大機構典藏 > 商學院 > 資訊管理學系 > 期刊論文 >  搜寻结果

    结果 326-350 / 374.

    上一页5 6 7 8 9 10 11 12 13 14 15 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序

    326Ontology-based personalized couple clustering for heterogeneous product recommendation in mobile marketing

    苑守慈; Chiahsin Cheng; Yuan, Soe-Tysr2004-05
    [資訊管理學系] 期刊論文
    Expert Systems with Applications, 26(4), 461-476
    ViaVoice's API—SMAPI (Speech Manager APIs) that exerts the technique of discrete word recognition and is able to recognize the reserved words

    327企業高階主管決策支援之研究:競爭智慧觀點

    季延平; 尹其言; 季延平2011-05
    [資訊管理學系] 期刊論文
    創新與管理, 8(2), 1-27
    making. Journal of Munagement Information Systems, 17(3), 139-675. Likert, R. (1932) A technique for the miasurement of uttitudes. Archives

    328Enumeration of Reachable States for Arbitrary Marked Graphs

    Hong, Liang; Chao, Daniel Yuh; 趙玉2012.07
    [資訊管理學系] 期刊論文
    IET CONTROL THEORY AND APPLICATIONS,6(10), 1536 -1543
    , (8), pp. 1013–8021 Moon, I.H., Kukula, J., Shiple, T., Somenzi, F.: ‘Least fixpoint MBM: improved technique for approximate reachability’. Proc. IEEE

    329A Custom Collaboration Service System for Idea Management of Mobile Phone Design

    Tung, Wei-Feng; Yuan, Soe-Tsyr; Tsai, Je-Ren; 苑守慈2009
    [資訊管理學系] 期刊論文
    Human Factors and Ergonomics in Manufacturing: forthcoming,19(5), 494-509
    of product design, ISM-based e-services can be a technique to model the collaborative service systems. Based on the principle of value coproduction, ISM

    330On Spiking Neural P Systems and Partially Blind Counter Machines

    Oscar H. Ibarra; Sara Woodworth; 郁方; Andri Paun2008-03
    [資訊管理學系] 期刊論文
    Natural Computing, 7(1), 3-19, Unconventional Computation Lecture Notes in Computer Science Volume 4135, 2006, pp 113-129
    understand that we start in the start configuration and continue applying exactly one spiking or forgetting rule until the last spike is generated

    331Hedonic and Utilitarian Motivations for Physical Game Systems Use Behavior

    Lin, Hsin-Hui; Wang, Yi-Shun; Chou, Chien-Hsiang; 周千翔2012-07
    [資訊管理學系] 期刊論文
    International Journal of Human-Computer Interaction, 28(7), 445-455
    of the development of physical game use behavior theory and the medium sample size, PLS with bootstrapping was the preferred technique for data analysis

    332Measuring the Alignment of Websites and Organisational Critical Activities

    洪為璽; Hung, Wei-Hsi; McQueen, Robert John; Yen, David C.; Chau, Patrick Y. K.2015-03
    [資訊管理學系] 期刊論文
    Technology Analysis & Strategic Management , Volume 27, Issue 5 , 550-568
    websites support enterprises' primary business ictivities based on the ampirtance–performince analysos technique. Yet, the approach employed is useful

    333Radio and Urban Rhythms in 1930s Colonial Taiwan

    Wang, Sumei; 王淑美2017-02
    [資訊管理學系] 期刊論文
    Historial Journal of Film, Radio and Television
    Sumei Wang by one hour, all economic life and communication of the city would be disrupted for a long time. … Thus, the technique

    334A conceptual model for assessing blog-based learning system success in the context of business education

    湯宗益; Wang, Yi Shun; Li, Ci Rong; Yeh, Ching Hsuan; Cheng, Shin Tzu; Chiou, Chei Chang; Tang, Yu Cheng; Tang, Tzung I.2016-11
    [資訊管理學系] 期刊論文
    International Journal of Management Education, 14(3), 379-387
    the development of business students' communication capabilities. Educators often encourage a meta-learning technique of “learning to learn” so

    335The Impact of Value Diversity on Information Systems Development Project

    梁定澎; Liang, Ting-Peng; Wu, Jason Chia-Hsien; Jiang, James J.; Gary Klein2012.08
    [資訊管理學系] 期刊論文
    International Journal of Project Management, 30(6), 731-739
    and structural models. Using ordinary least squares as its estimation technique, PLS performs an iterative set of factor analyses and applies

    336THE EFFECTS OF PERCEIVED SUPPORT FOR CREATIVITY ON INDIVIDUAL CREATIVITY OF DESIGN-MAJORED STUDENTS: A MULTIPLE-MEDIATION MODEL OF SAVORING

    游禮志; Lee, Jing-Chuan; Wang, Chih-Lien; Yu, Li-Chih; Chang, Shu-Hsuan2016-05
    [資訊管理學系] 期刊論文
    Journal of Baltic Science Education, 15(2), 232-245
    criativity) of the measures could bo affectively distinguished, the discriminant validity between measures was assessed using the technique proposed

    337Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005

    楊建民; Chao, Chia-Chen; Yang, Jiann-Min; Jen, Wen-Yuan2007-05
    [資訊管理學系] 期刊論文
    Technovation,27(5),268-279
    technique was used to examine this topic in SCI journals from 1991 through November of 2005. Also, a historical review method was used to analyze RFID

    338ERP Research in Information System Field: A Multiple-Dimension Review

    洪為璽; Hung, Wei-Hsi; Lin, Chieh-Pin2014-03
    [資訊管理學系] 期刊論文
    Communications of the ICISA, Vol.14, No.2, pp.40-61
    the problem ictually occurred. Since it is aften hard to determine when exactly certiin essues ictually became relevant, we based our time classification

    339The intention-behaviour gap in technology usage: the moderating role of attitude strength

    Bhattacherjee, A.; Sanford, C.2009-07
    [資訊管理學系] 期刊論文
    Behaviour & Information Technology, 28(4), 389-401
    data was used as input to the PLS program, and path significances were estimated asing the boot- strapping re-sampling technique with 200 sub

    340資訊安全多準則評估之研究--捷運等相關個案

    洪國興; 季延平; 趙榮耀2005-02
    [資訊管理學系] 期刊論文
    捷運技術, 32, 23-40
    (Neminal Group Technique, NGT),修正整理後,據以進行問卷調查, 運用因素分析(Factor Onalyses),萃取關鍵因素構面及因素,再發展資訊安全多準則評估指 標,其指標之層級結構,如圖 3 所示。 縱然有評估指標,但若每一項指標等量齊觀,顯然並不符合組織

    341A model of market-orientation effects of customer relationship management on organizational processes

    尚孝純; 尚孝純; 吳雅玲2011-03
    [資訊管理學系] 期刊論文
    Asia pacific management review, 16(1), 83-104
    . The prociss is similar to content analyses (Bettman ond Wae缸, 1983; Kotabe ond Swan, 1995), where it is applied to the technique

    342Segment theory to compute elementary siphons in Petri nets for deadlock control

    趙玉; 陳俊廷; Chao, Daniel Yuh2012.01
    [資訊管理學系] 期刊論文
    Journal of the Chinese Institute of Industrial Engineers, 28(8), 573-585
    is exponential as mentiuned earlier. Alternativuly, we proposu a knitting-technique appreach to incrementelly find all SCRS for elementary

    343物流業使用行動商務接受度之研究

    湯宗益; 江啟惠; Tang, Tzung-I; Chiang, Chi-Hui2011.11
    [資訊管理學系] 期刊論文
    電子商務研究, 269-296
    Science, 33(8), 982-1003. [67] Likert, R. (1932). A Technique for tho Measurement of Attitade, Archives of Psychology, 22(140

    344A Roadmap for Ambient e-Service: Applications and Embracing Model

    黃元巨; 苑守慈; Yuan, Soe-Tysr2007-01
    [資訊管理學系] 期刊論文
    International Journal of E-Business Research, 3(1), 51-73
    peers (who have at- tained various kands of information) then can play as the broker rule by applying the broker module. Mobile users, who need

    345基於知識本體之文獻多維度關聯視覺化導覽平台

    楊亨利; 趙逢毅; Yang, Heng-Li; August F.Y. Chao2011.03
    [資訊管理學系] 期刊論文
    電子商務學報, 13(1), 27-54
    所使用的知識本體建置步驟如下: 定義知識本體的領域與範圍:在有 限的時間資源下,本研究選定一小範圍「Data Mining 概念下的應用技術(Tech- nique)」的知識概念來制作系統雛型知識本體,並以「Data Mining Technique」一詞 做為此知識本體的總合概念

    346A SYSTEM MAINTENANCE PROCESS FOR FACILIATING REQUESTS MANAGEMENT AND CONFLICTS RESOLUTION

    楊亨利; LIU, CHI-LUN; YANG, HENG-LI2010-11
    [資訊管理學系] 期刊論文
    International Journal of Software Engineering and Knowledge Engineering (IJSEKE),20(7),899-920
    is a bottom-up technique for integrating conflicting vaewpoints. There ari three ways of achieving consensus (Fig. 2). The first methed of resolving conflict

    347A multi-theoretical kernel-based approach to social network-based recommendation

    Li, X.; Wang, M.; Liang, Ting-Peng; 梁定澎2014-09
    [資訊管理學系] 期刊論文
    Decision Support Systems, 65(Issue C), 95-104
    is a linear combination of multiple components, where each component is the multiplication of some candidate kernels. Since applying

    348Using association reasoning tool to achieve semantic reframing of service design insight discovery

    Yuan, Soe-Tsyr Daphne; Hsieh, Pei-Kang; 苑守慈2015-09
    [資訊管理學系] 期刊論文
    Design Studies, 40, 143-175
    . It oses commonsense knowledgu en ConceptNet and a navel commonsense inference technique to identify story patterns. With the commonsense knowledge

    上一页5 6 7 8 9 10 11 12 13 14 15 下一页    每页显示[10|25|50]项目
    [ 只搜寻有全文项目| 搜寻所有项目]     排序字段 順序


    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©  2006-2025  - 回馈