English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51718577      Online Users : 610
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    期刊論文 [100/100]

    Community Statistics


    近3年內發表的文件:0(0.00%)
    含全文筆數:100(100.00%)

    文件下載次數統計
    下載大於0次:100(100.00%)
    下載大於100次:100(100.00%)
    檔案下載總次數:57079

    最後更新時間: 2024-12-24 16:25

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目31-40 / 100. (共10頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2012-03 From CAATTs Adoption to Continuous Auditing Systems Implementation: An Analysis Based on Organizational Routines Theories Sun, Chia-Ming
    2014-03 Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2015-03 Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem Adebayo, Olawale S.; Olalere, Morufu; Ugwu, Joel N.
    2014-09 Insights into Motivation to Participate in Online Surveys Foster, Mary K.; Michon, Richard
    2012-09 Insights into Online Auction Market Structure of eBay in 2006-2007: A Historical Perspective Tu, Yan-Bin; Clinton, Steven R.; Holstein, Adora
    1998-12 Interaction between Manufacturing and Marketing from an Information Technology Perspective – A Case Study 許麗玲; Hsu, Li-Ling
    2012-09 Key Management Scheme for Cumulative Member Removal and Bursty Behavior in Secure Group Communication Using m-ary Tree Aparna, R.; Amberker, B.B.
    2016-03 Metamorphic Malware Detection Using Function Call Graph Analysis Deshpande, Prasad; Stamp, Mark
    2014-03 Modelling e-Health Systems Security Requirements: A Business Process Based Approach Alahmadi, Ahmed H.; Soh, Ben; Ullah, Azmat
    2010-03 Non Homogenous Poisson Process Model for Optimal Software Testing Using Fault Tolerance Srivastava, Praveen Ranjan; Mittal, Chetan; Rungta, Ajay; Malhotra, Vaibhav; Raghurama, G

    顯示項目31-40 / 100. (共10頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋