政大機構典藏-National Chengchi University Institutional Repository(NCCUR):依題名瀏覽
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113451/144438 (79%)
造訪人次 : 51281664      線上人數 : 845
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    政大機構典藏 >  依題名瀏覽

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目20051-20100 / 144424. (共2889頁)
    << < 397 398 399 400 401 402 403 404 405 406 > >>
    每頁顯示[10|25|50]項目
    日期題名作者
    1993-10 Searching a minimal semantically-equivalent subset of a set of partial values 陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D.
    2003 Searching Financial Patterns with Self-Organizing Maps 陳樹衡; Chen,Shu-Heng
    2004-11 Searching Financial Patterns with Self-organizing Maps 陳樹衡; T.Yu; T.-W.Kuo; Chen,Shu-Heng
    2013 Searching for Internet Freedom in China: A Case Study on Google`s China Experience 李治安; LEE, JYH-AN; LIU, CHING-YI; LI,WEIPING
    1996-10 Searching for Peace and Cooperation in Asia-Pacific: View from Taipei 李明
    2019-11 Searching for specific sentence meaning in context: the conceptual relation between participants 賴瑶鍈; Lai, Yao-Ying; Piñango, Maria Mercedes
    2011-01 Searching for the ideal blogger 陳彩虹; Chen, R.
    2017-02 Searching for the Sustainably Profitable Stocks: Evidence on S&P 500 Companies Chiang, Gengnan; Liu, Chin-Chi
    2001 Searching for welfare model(s): Taiwan`s social welfare policy in the millennium 陳小紅
    2007-05 Searching Strict Minimal Siphons for SNC-Based Resource Allocation Systems 趙玉; Chao, Daniel Yuh
    1998-04 Search of Mobile Agents 連耀南
    2002-11 Seasonal Cointegration and Cross-Equation Restrictions on a Forward Looking Buffer Stock Model of Money Demand 黃台心; Huang,Tai-Hsin; Shen,Chung-Hua
    2002 Seasonal cointegration and cross-equation restrictions on a forward-looking buffer stock model of money demand Shen, Chung-Hua; Huang, Tai-Hsin; 沈中華
    2020-11 Seasonal Temperature and Economic Growth in China's Major Cities 黃智聰; Huang, Jr-Tsung; Peng, Congmin; She, Po-Wen
    2024-05 SEC Comment Letters and Audit Firm Size: Impacts on Disclosure Modification and Market Perception 張祐慈; Chang, Yu-Tzu
    1990-01 Secondary Education in Mainland China 范利民
    1990-01 Secondary Education in Mainland China 范利民
    2009-12 Second-harmonic generation with magnetic-field controllability 郭光宇; Ju, Sheng; Cai, Tian-Yi; Wei, Chi-I; Guo, Guang-Yu
    2013-06 Second Language Acquisition of Chinese Conjunction Er (`And`): A Corpus-Based Study 曾逸群; 謝妙玲; Tseng, Yi-Chun; Hsieh, Miao-Ling
    2019-05 Second language acquisition of Mandarin binding by Korean and English native speakers 陳仲妤; Chen, Chung-Yu
    2019-09 Second language acquisition of Mandarin relative clauses by Korean and English native speakers 陳仲妤; Chen, Chung-Yu
    2019-06 Second Language Identities in Study Abroad Contexts: Case Studies of Taiwanese Exchange Students 陳彩虹; Chen, R.*
    Second Language Learning in Taiwan: A Stocktaking of the Current Situation in Institutional German Instruction Lay, Tristan; 賴漢龍
    2017-10 Second language processing of Mandarin relative clauses: A self-paced reading study 陳仲妤; Chen, Chung-Yu
    2017-06 Second language processing of Mandarin relative clauses: testing the subject-object asymmetry 陳仲妤; Chen, Chung-Yu
    2017-03 Second language processing of relative clauses in Mandarin 陳仲妤; Chen, Chung-Yu
    2014-02 Second Only to the Original: Rhetoric and Practice in the Photographic Reproduction of Art in Early Twentieth-Century China 劉宇珍; Liu, Yu-jen
    1999 Second Order Structures for Synchronized Choice Ordinary Petri Nets 趙玉; Jose A. Nicdao
    2006 Section Introduction: Electronic Waste and Extended Producer Responsibility Leslie Byster; Tu, Wen-ling; 杜文苓
    2013 Secure Certificateless Signature Scheme Supporting Batch Verification 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia
    2018 Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2011-03 Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks Sood, Sandeep K.
    2016-03 Secure WLAN Handoff Scheme with Continuous Authentication Singh, Rajeev; Sharma, Teek P.
    2002-04 Securing Cross-Straits Economic Relations: New Challenges and Opportunities 冷則剛; Leng, Tse-Kang
    2013-09 Securing DNA Information through Public Key Cryptography Tripathi, Shiv P. N.; Jaiswal, Manas; Singh, Vrijendra
    2014-09 Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2014-02 Securing KVM-based cloud systems via virtualization introspection Lee, Sheng Wei; Yu, Fang; 郁方
    2023-12 Securing NLP Systems: A Comprehensive AI-Based Approach 曾一凡; Tseng, Yi-Fan
    2011-10 Securitisation of Crossover Risk in Reverse Mortgages Huang,Hong-Chih; Wang,Chou-Wen; Miao,Yuan-Chi; 黃泓智; 王昭文; 苗莞琦
    Securitisation of Crossover Risk in Reverse Mortgages 黃泓智; 王昭文; 苗莞琦; Huang, Hong-Chih; Wang, Chou-Wen; Miao, Yuan-Chi
    2011 Securitization and Tranching Longevity and House Price Risk for Reverse Mortgage Products 楊曉文; Yang, Sharon S.
    2017-03 Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.) 張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun
    2017-03 Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.) 資產證券化, 房屋價格, 與銀行貸放標準 張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun
    2014-10 Security analysis and improvement of femtocell access control Chen, C.-M.; Wu, T.-Y.; Tso, Ray-Lin; Wu, M.-E.; 左瑞麟
    2013-11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
    2011-12 Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 黃凱彬; 左瑞麟
    2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin; Tso, Ray-Lin; 左瑞麟
    2015-08 Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
    2016-10 Security analysis of a NTRU-based mutual authentication scheme 左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio
    顯示項目20051-20100 / 144424. (共2889頁)
    << < 397 398 399 400 401 402 403 404 405 406 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋