English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113648/144635 (79%)
造访人次 : 51617860      在线人数 : 476
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    子类别

    期刊論文 [100/100]

    社群统计


    近3年内发表的文件:0(0.00%)
    含全文笔数:100(100.00%)

    文件下载次数统计
    下载大于0次:100(100.00%)
    下载大于100次:100(100.00%)
    全文下载总次数:56744

    最后更新时间: 2024-12-20 14:12

    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目1-50 / 100. (共2页)
    1 2 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2010-09 A CMM Assessment of Information Systems Maturity Levels in Botswana Uzoka, Faith-Michael E.
    2014-09 A Discrete Formulation of Successive Software Releases Based on Imperfect Debugging Singh, Jagvinder; Anand, Adarsh; Kumar, Avneesh; Khatri, Sunil Kumar
    2011-09 A Graph Theoretic Approach to Sustainable Steganography Kumar, Vinay; Muttoo, Sunil Kumar
    2010-03 A Multidisciplinary Design Model for New Service Offering Transfers and Internal Integration in Retail Chain Services Roth, Aleda V.; Shockley, Jeff
    2016-03 An Analysis of Trust, Distrust, and Their Antecedents: Development of a Comprehensive Model of Consumer Intentions in Technology-Driven Transactions Simon, Steven John; Cagle, Carol J.
    2013-09 An Effective Pareto Optimality Based Fusion Technique for Information Retrieval Batri, Krishnan
    2009-09 An Integrated Analysis of Technology Acceptance Behaviour Models: Comparison of Three Major Models Jen, William; Lu, Tim; Liu, Po-Ting
    2002-12 An Integrated Approach for Workflow Process Modeling and Analysis Using UML and Petri Nets 楊鎮華; 陳群奇; Yang, Stephen J.H.; Chen, Chyun-Chyi
    2015-03 Antecedents and Consequences of Trust in Using Mobile Banking Yu, Chian-Son
    2000-12 A Petri Net Approach for Performance Measurement of Supply Chain in Agile Virtual Enterprise Davidrajuh, Reggie
    2010-03 Applying a Service Mindset When Thinking and Communicating about Systems and Projects Alter, Steven
    2013-03 A Simultaneous Business Design Method Utilizing G-RD Saito, Tetsu; Udagawa, Kingo; Mitsukuni, Koshichiro
    2011-09 Assessing the Effectiveness of E-learning via User Profile Analysis: An AHP-based Dynamic Programming Approach Fazlollahtabar, Hamed; Mahdavi, Iraj; Nezam, Mahdavi-Amiri
    2002-12 A Study on Managers’ Perception of is Management Issues in CHINA Chen, Jim; Zhang, Jeff Yue; Xiang, Baohua
    2010-03 A Symbiosis-Based Value Co-Creation Framework for Service Delivery Design 苑守慈; Tung, Wei-Feng; Yuan, Soe-Tysr
    2002-12 Compositional Transformation of Message Sequence Charts into High-level Petri Boxes Gurovič, Daniel; Fengler, W.
    2012-09 Data Hiding Technique Based on LSB Matching towards High Imperceptibility Mohamed, Marghny H.; Naziha, M. Al-Aidroos; Bamatraf, Mohamed A.
    2014-09 Data Management Issues and Data Mining of Real Time System Application for Environment Monitoring Saini, Dinesh Kumar; Maskari, Sanad Al
    2011-03 Demographic Differences and Internet Banking Acceptance Li, Hong-Lei; Lai, Min-Mei
    2014-03 Detection and Analysis of Security Vulnerabilities in Java Kumar, Ch. Aswani; Charitha, M. Sai
    2015-03 Development of an In-House Grid Testbed Supporting Scheduling and Execution of Scientific Workflows Prajapati, Harshadkumar B.; Shah, Vipul A.
    2004-12 DS-CDMA無基礎行動式群播通訊網路之設計 龔旭陽; 陳素滿; 許啟裕; Kung, Hsu-Yang; Chen, Su-Man; Hsu, Chi-Yu
    2003-06 Dynamic Programming Variant in Evolution Strategies for Production Allocation Problems 侯永昌; 張應華; Hou, Young-Chang; Chang, Ying-Hua
    2016-03 Editor`s Introduction Li, Eldon Y.
    2011-09 Effect of Manufacturer Reputation, Retailer Reputation and Seller Reputation in China`s Online Shopping Market Tong, Xiao
    2004-12 ERP對企業產銷互動價值性產出之影響 許麗玲; 王曉梅; Hsu, Li-Ling; Wang, Hsiao-Mei
    2014-03 Exploring Donation Appeals in Top Not-for-Profit Websites Pitts, Robert E.; Blose, Julia E.; Mack, Rhonda W.
    2009-09 Exploring E-learning Effectiveness Based on Activity Theory: An Example of Asynchronous Distance Learning Hung, Shin-Yuan; Yu, Wen-Ju; Liou, Kuang-Long; Hsu, Shih-Chieh
    2015-03 Exploring the Role of Culture in eWOM Adoption Pentina, Iryna; Basmanova, Oksana; Zhang, Lixuan; Ukis, Yuliya
    2013-03 Facilities and Service Models for Electric Scooter Recharge Stations Wu, Hsu-Che; Wang, Pei-Wen
    2012-03 From CAATTs Adoption to Continuous Auditing Systems Implementation: An Analysis Based on Organizational Routines Theories Sun, Chia-Ming
    2014-03 Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2015-03 Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem Adebayo, Olawale S.; Olalere, Morufu; Ugwu, Joel N.
    2014-09 Insights into Motivation to Participate in Online Surveys Foster, Mary K.; Michon, Richard
    2012-09 Insights into Online Auction Market Structure of eBay in 2006-2007: A Historical Perspective Tu, Yan-Bin; Clinton, Steven R.; Holstein, Adora
    1998-12 Interaction between Manufacturing and Marketing from an Information Technology Perspective – A Case Study 許麗玲; Hsu, Li-Ling
    2012-09 Key Management Scheme for Cumulative Member Removal and Bursty Behavior in Secure Group Communication Using m-ary Tree Aparna, R.; Amberker, B.B.
    2016-03 Metamorphic Malware Detection Using Function Call Graph Analysis Deshpande, Prasad; Stamp, Mark
    2014-03 Modelling e-Health Systems Security Requirements: A Business Process Based Approach Alahmadi, Ahmed H.; Soh, Ben; Ullah, Azmat
    2010-03 Non Homogenous Poisson Process Model for Optimal Software Testing Using Fault Tolerance Srivastava, Praveen Ranjan; Mittal, Chetan; Rungta, Ajay; Malhotra, Vaibhav; Raghurama, G
    2013-09 On Measuring and Increasing the Effectiveness of Banner Advertising Ghosh, Haren; Bhatnagar, Amit
    2013-03 Optimal Software Release Policy Approach Using Test Point Analysis and Module Prioritization Srivastava, Praveen Ranjan; Sankaran, Subrahmanyan; Pandey, Pushkar
    2010-09 Perceptions of Information Privacy in Outsourcing among Healthcare Executives: An Empirical Analysis Mariott, Russell; Raisinghani, Mahesh S.
    2013-09 Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive Theory Yen, Yung-Shen
    2016-03 Probabilistic Approach of Improved Binary PSO Algorithm Using Mobile Sink Nodes Anand, S. Raj; Kannan, E.
    2012-03 Revisiting Software Requirements Specifications-What Could We Learn Johansson, Bjorn; Rolandsson, Tanja
    2011-03 Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks Sood, Sandeep K.
    2016-03 Secure WLAN Handoff Scheme with Continuous Authentication Singh, Rajeev; Sharma, Teek P.
    2013-09 Securing DNA Information through Public Key Cryptography Tripathi, Shiv P. N.; Jaiswal, Manas; Singh, Vrijendra
    2014-09 Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi

    显示项目1-50 / 100. (共2页)
    1 2 > >>
    每页显示[10|25|50]项目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈