English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 74913/106084 (71%)
造訪人次 : 19417200      線上人數 : 436
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    子類別

    期刊論文 [95/95]

    社群統計


    近3年內發表的文件:4(4.21%)
    含全文筆數:95(100.00%)

    文件下載次數統計
    下載大於0次:95(100.00%)
    下載大於100次:52(54.74%)
    檔案下載總次數:10051(0.01%)

    最後更新時間: 2017-11-20 05:01

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目26-50 / 95. (共4頁)
    << < 1 2 3 4 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2011-09 A Graph Theoretic Approach to Sustainable Steganography Kumar, Vinay; Muttoo, Sunil Kumar
    2014-03 Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2009-09 The Impact of Cultural Difference on Online Text-based Negotiation Behaviour: Integrating Qualitative and Quantitative Research Methods Lin, Wan-Jung; Lai, Hsiang-Chu; Lin, Juin-Yi
    2011-03 The Impact of Operational Criteria on Customer Satisfaction and Loyalty in E-commerce Environments: An Exploratory Study of Customer Ratings and Risk Ramanathan, Ramakrishnan
    2013-03 The Impact of Strategic IT Partnerships on IT Security Deane, Jason K.; Rakes, Terry R.; Rees, Loren Paul; Baker, Wade H.
    2015-03 Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem Adebayo, Olawale S.; Olalere, Morufu; Ugwu, Joel N.
    2014-09 Insights into Motivation to Participate in Online Surveys Foster, Mary K.; Michon, Richard
    2012-09 Insights into Online Auction Market Structure of eBay in 2006-2007: A Historical Perspective Tu, Yan-Bin; Clinton, Steven R.; Holstein, Adora
    2009-09 An Integrated Analysis of Technology Acceptance Behaviour Models: Comparison of Three Major Models Jen, William; Lu, Tim; Liu, Po-Ting
    2002-12 An Integrated Approach for Workflow Process Modeling and Analysis Using UML and Petri Nets 楊鎮華; 陳群奇; Yang, Stephen J.H.; Chen, Chyun-Chyi
    1998-12 Interaction between Manufacturing and Marketing from an Information Technology Perspective – A Case Study 許麗玲; Hsu, Li-Ling
    2012-09 Key Management Scheme for Cumulative Member Removal and Bursty Behavior in Secure Group Communication Using m-ary Tree Aparna, R.; Amberker, B.B.
    2014-03 Modelling e-Health Systems Security Requirements: A Business Process Based Approach Alahmadi, Ahmed H.; Soh, Ben; Ullah, Azmat
    2010-03 A Multidisciplinary Design Model for New Service Offering Transfers and Internal Integration in Retail Chain Services Roth, Aleda V.; Shockley, Jeff
    2010-03 Non Homogenous Poisson Process Model for Optimal Software Testing Using Fault Tolerance Srivastava, Praveen Ranjan; Mittal, Chetan; Rungta, Ajay; Malhotra, Vaibhav; Raghurama, G
    2013-09 On Measuring and Increasing the Effectiveness of Banner Advertising Ghosh, Haren; Bhatnagar, Amit
    2013-03 Optimal Software Release Policy Approach Using Test Point Analysis and Module Prioritization Srivastava, Praveen Ranjan; Sankaran, Subrahmanyan; Pandey, Pushkar
    2010-09 Perceptions of Information Privacy in Outsourcing among Healthcare Executives: An Empirical Analysis Mariott, Russell; Raisinghani, Mahesh S.
    2000-12 A Petri Net Approach for Performance Measurement of Supply Chain in Agile Virtual Enterprise Davidrajuh, Reggie
    2013-09 Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive Theory Yen, Yung-Shen
    2012-03 Revisiting Software Requirements Specifications-What Could We Learn Johansson, Bjorn; Rolandsson, Tanja
    2012-09 The Right Format of Web Advertisement: Case Study in Iran Hanafizadeh, Payam; Behboudi, Mehdi
    2011-03 Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks Sood, Sandeep K.
    2013-09 Securing DNA Information through Public Key Cryptography Tripathi, Shiv P. N.; Jaiswal, Manas; Singh, Vrijendra
    2014-09 Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi

    顯示項目26-50 / 95. (共4頁)
    << < 1 2 3 4 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋