政大機構典藏-National Chengchi University Institutional Repository(NCCUR):依题名浏览
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113324/144300 (79%)
造访人次 : 51150394      在线人数 : 835
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 >  依题名浏览

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目20051-20100 / 144286. (共2886页)
    << < 397 398 399 400 401 402 403 404 405 406 > >>
    每页显示[10|25|50]项目
    日期题名作者
    2019-05 Second language acquisition of Mandarin binding by Korean and English native speakers 陳仲妤; Chen, Chung-Yu
    2019-09 Second language acquisition of Mandarin relative clauses by Korean and English native speakers 陳仲妤; Chen, Chung-Yu
    2019-06 Second Language Identities in Study Abroad Contexts: Case Studies of Taiwanese Exchange Students 陳彩虹; Chen, R.*
    Second Language Learning in Taiwan: A Stocktaking of the Current Situation in Institutional German Instruction Lay, Tristan; 賴漢龍
    2017-10 Second language processing of Mandarin relative clauses: A self-paced reading study 陳仲妤; Chen, Chung-Yu
    2017-06 Second language processing of Mandarin relative clauses: testing the subject-object asymmetry 陳仲妤; Chen, Chung-Yu
    2017-03 Second language processing of relative clauses in Mandarin 陳仲妤; Chen, Chung-Yu
    2014-02 Second Only to the Original: Rhetoric and Practice in the Photographic Reproduction of Art in Early Twentieth-Century China 劉宇珍; Liu, Yu-jen
    1999 Second Order Structures for Synchronized Choice Ordinary Petri Nets 趙玉; Jose A. Nicdao
    2006 Section Introduction: Electronic Waste and Extended Producer Responsibility Leslie Byster; Tu, Wen-ling; 杜文苓
    2013 Secure Certificateless Signature Scheme Supporting Batch Verification 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia
    2018 Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2011-03 Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks Sood, Sandeep K.
    2016-03 Secure WLAN Handoff Scheme with Continuous Authentication Singh, Rajeev; Sharma, Teek P.
    2002-04 Securing Cross-Straits Economic Relations: New Challenges and Opportunities 冷則剛; Leng, Tse-Kang
    2013-09 Securing DNA Information through Public Key Cryptography Tripathi, Shiv P. N.; Jaiswal, Manas; Singh, Vrijendra
    2014-09 Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2014-02 Securing KVM-based cloud systems via virtualization introspection Lee, Sheng Wei; Yu, Fang; 郁方
    2023-12 Securing NLP Systems: A Comprehensive AI-Based Approach 曾一凡; Tseng, Yi-Fan
    2011-10 Securitisation of Crossover Risk in Reverse Mortgages Huang,Hong-Chih; Wang,Chou-Wen; Miao,Yuan-Chi; 黃泓智; 王昭文; 苗莞琦
    Securitisation of Crossover Risk in Reverse Mortgages 黃泓智; 王昭文; 苗莞琦; Huang, Hong-Chih; Wang, Chou-Wen; Miao, Yuan-Chi
    2011 Securitization and Tranching Longevity and House Price Risk for Reverse Mortgage Products 楊曉文; Yang, Sharon S.
    2017-03 Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.) 張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun
    2017-03 Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.) 資產證券化, 房屋價格, 與銀行貸放標準 張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun
    2014-10 Security analysis and improvement of femtocell access control Chen, C.-M.; Wu, T.-Y.; Tso, Ray-Lin; Wu, M.-E.; 左瑞麟
    2013-11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
    2011-12 Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 黃凱彬; 左瑞麟
    2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin; Tso, Ray-Lin; 左瑞麟
    2015-08 Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
    2016-10 Security analysis of a NTRU-based mutual authentication scheme 左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio
    2013-07 Security Analysis of Choi et al.`s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
    2023-05 Security and privacy risks in drone-based last mile delivery 杜雨儒; Tu, Yu-Ju; Piramuthu, Selwyn
    2012 Security balancing for IT-enabled service innovation Wu, Sou-Chein; Chen, A.H.-C.; Chu, H.-C.
    1996-11 Security in East Asia and Taiwan`s Role 何思因; Ho, Szu-Yin
    1996-09 Security in East Asia and Taiwan`s Role Ho, Szu-Yin
    2021-05 Security of lightweight mutual authentication protocols 杜雨儒; Tu, Yu-Ju; Kapoor, Gaurav; Piramuthu, Selwyn
    2008 Security Relations among China, Japan and Taiwan, 1995-2008 羅思婷
    2015-12 Security, Risk, and Trust in Individuals` Internet Banking Adoption: An Integrated Model 林義倫; Lin, Yi-Luen
    2024-06 SEC Comment Letters and Audit Firm Size: Impacts on Disclosure Modification and Market Perception 張祐慈; Chang, Yu-Tzu
    2022-12 Seeing and Hearing through Glass: An Exegesis of the Artificial in Der Sandmann Lee, Feng-Shu
    2023-09 Seeing Far and Balancing Well in Coopetition: The Biotechnology Firms in Taiwan 郭曉玲
    2022-12 Seeing is believing: How Moore`s Law drives semiconductor innovations 陳宗文
    2013-02 Seeing Is Believing: The Direct and Contingent Influence of Pictures in Health Promotion Advertising 張卿卿
    2020-05 Seeing is not always believing: an exploratory study of clickbait in WeChat 彭志宏; Peng, Chih-Hung; Zhang, Wenping; Du, Wei; Bian, Yiyang; Jiang, Qiqi
    2014-11 Seeing or doing? Pitch recognition of batters versus pitchers: A preliminary report Chen, Yin-Hua; Lee, Pei Hong; Lu, Yu Wen; Yen, Nai Shing; 陳尹華; 盧毓文; 顏乃欣
    2004-03 Seeing the Big Picture 王紅纓; Wang, Hongying
    2006-03 Seeing the small picture: Ad-self versus ad-culture congruency in international advertising Chang, Chingching; 張卿卿
    2014-10 Seeking Common Ground While Keeping Differences: Using the Case of the Cross-Strait Relations as A Case 吳崇涵; Wu, Charles Chong-Han
    1995 Seeking the Best Integration: Popular Music in Taiwan 汪琪; Wang, Georgette
    显示项目20051-20100 / 144286. (共2886页)
    << < 397 398 399 400 401 402 403 404 405 406 > >>
    每页显示[10|25|50]项目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈