English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113160/144130 (79%)
Visitors : 50759883      Online Users : 538
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    國科會研究計畫 [262/262]
    學位論文 [1186/1214]
    專利 [1/1]
    專書/專書篇章 [57/58]
    期刊論文 [1139/1284]
    校務發展計畫 [1/1]
    研究報告 [16/137]
    考古題 [73/73]

    Collection Statistics

    近3年內發表的文件:70(6.33%)
    含全文筆數:486(43.98%)

    文件下載次數統計
    下載大於0次:486(100.00%)
    下載大於100次:465(95.68%)
    檔案下載總次數:355142(8.11%)

    最後更新時間: 2024-11-14 14:14


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 621-630 of 1105. (111 Page(s) Totally)
    << < 58 59 60 61 62 63 64 65 66 67 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2023-07 Strategies for Coping with Targeted Advertising on Social Media to Alleviate Technostress at an Individual Level 周致遠; Chou, Chih-Yuan; Su, Yu-Ting
    2010 Strategies for leveraging IT-enabled service innovation in intensively competitive market Shang, Shari S. C.; Chen, Chien Chun; 尚孝純; 陳健鈞
    2011 String abstractions for string verification Yu, Fang; Bultan, T.; Hardekopf, B.; 郁方
    2016 String analysis via automata manipulation with logic circuit representation 郁方; Wang, Hung En; Tsai, Tzung Lin; Lin, Chun Han; Yu, Fang; Jiang, Jie-Hong Roland
    2005 Substitution-Based Case Adaptation CBR for Quality Aging in Place 苑守慈
    2024-04 Sugar-coated poison defense on deepfake face-swapping attacks 郁方; Yu, Fang; Guo, Cheng-Yao
    1995-10 Synchronized Choice Ordinary Petri Net 趙玉
    1986-10 Synthesis and Performance Evaluation of Two-Party Error-Recoverable Protocols 趙玉
    2008-12 System Design and Implementation of Location-based Mobile Tourism Services 余千智
    2019-07 Tagging a Malware’s Intentions by using Attention-based Sequence-to-Sequence Neural Network 蕭舜文; Hsiao, Shun-Wen; Huang, Yi-Ting; Chen, Yu-Yuan; Yang, Chih-Chun; Sun, Yeali S.; Chen, Meng Chang

    Showing items 621-630 of 1105. (111 Page(s) Totally)
    << < 58 59 60 61 62 63 64 65 66 67 > >>
    View [10|25|50] records per page

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback