Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4242429      Online Users : 748
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:3610(80.03%)

    Download counts of the item
    Download times greater than 0:3503(97.04%)
    Download times greater than 100:3073(85.12%)
    Total Bitstream Download Counts:1887341(12.15%)

    Last Update: 2024-12-04 13:12

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 376-400 of 4503. (181 Page(s) Totally)
    << < 11 12 13 14 15 16 17 18 19 20 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1998-05 How useful is the leading indicator in forecasting future GDP in Taiwan? 陳仕偉; Chen, Shyh-Wei; 林金龍; Lin, Jin-Lung
    2007 HOWTODRIVECLUBMEMBERS’EXTRA-ROLEBEHAVIORS?THEROLEOFENVIRONMENTALCUES,SATISFACTIONANDAFFECTIVEORGANIZATIONALCOMMITMENT 劉瑞香; Liu, Jui-Shiang
    2008 Human resources for science and technology: Analyzing competitiveness using the analytic hierarchy process Chou, Y.-C., Hsu, Y.-Y., Yen, H.-Y.
    1999 HYBRIDAPPROXIMATECONFIDENCEINTERVALSFORTHEPROPORTIONOFSUCCESS 黃淑貞; Huang, Sui-Chen
    2019 ICT技術在科學園區安全控管之運用 黃順發; HUANG,SHUN-FA
    2011 An ID-based access control in a hierarchical key management for mobile agent Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
    2011-03 An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent. Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.; 陳澤雄
    2007 ID-based digital signature scheme on the elliptic curve cryptosystem Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.
    2011-05 Identification of the minimum effective dose based on weighted Kaplan-Meier Statistics. Chang, Y.M. and Chen, Y.I.; 張玉媚
    2012 Identifying inventory problems in the aerospace industry using the theory of constraints Chou, Y.-C., Lu, C.-H., Tang, Y.-Y.
    2000-09 Identifying turning points and business cycles in Taiwan: A multivariate dynamic Markov-switching factor model approach 陳仕偉; Chen, Shyh-Wei; 林金龍; Lin, Jin-Lung
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2009 The Impact of Legal Infrastructure and Public Health on Taiwan Life Insurance Development under Japanese Colonial Rule. Tseng, Yao-Fen.; 曾耀鋒
    2008 The impact of management credibility on price reactions around stock repurchasing accouchements in Taiwan 許書偉; Lee, J. Z., S.W. HsuH. J. Lin, and H. J. Lee
    2008 The impact of management credibility on price reactions around stock repurchasing announcements in Taiwan 林秀鳳; Lee, J. Z., S. W. Hsu, H. F. Linand H. L. Lee
    2010 The Impact of Repurchasing Track Records on the Price Reactions of Subsequent Repurchasing announcements of companies in Taiwan. Hsu, S.W.; 許書偉
    2009 The Impact of Service-Oriented Organizational Citizenship Behavior on Brand Performance: The Mediating Effects of Industrial Brand Equity and Brand Image 曾俊堯; Tseng, Chun-Yao; Liu, Yu-Hsiu; Pai, Da-Chang
    2009 Implementation of Conjugate Gradient Method into an Imaging Estimator of Prior Knowledge Shieh, H. M., J. G. Li and H. C. Yu; 余心淳
    2009 Implied deterministic volatility functions: an empirical test for Euribor options Kuo, I-Doun and Kai-Li Wang; 郭一棟、王凱立
    2009 Implied deterministic volatility functions: An empirical test for Euribor options Kuo I.-D., Wang K.-L.
    2002-10-28 An improvement of cryptographic key assignment scheme in a user hierarchy?? Chen, T.-S., Huang, G.-S., Tasi, C.-C., Chang, N.-T.
    2011-03 Inertia: spurious loyalty or action 1oyalty? 吳立偉
    2011-03 Inertia: Spurious Loyalty or Action Loyalty 吳立偉; Wu, Li-Wei
    2011-04 The influence of personal characteristics on helping behavior in virtual community. Wu, Chin-Shan Cheng, Fei-Fei Yang, Yinlin Lee,Chia Jung and Chiu, Kailin.; 吳金山

    Showing items 376-400 of 4503. (181 Page(s) Totally)
    << < 11 12 13 14 15 16 17 18 19 20 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback