Showing results 815 to 834 of 1305
< previous
next >
Date | Title | Author(s) |
3-Nov-2016 | Sharing Information in a High Uncertainty Environment: Lessons from the Divergent Differentiation Supply Chain | 洪為璽; Hung, Wei-Hsi;Lin, Chieh-Pin;Ho, Chin-Fu |
3-Nov-2016 | Sharing Information Strategically in a Supply Chain: Antecedents, Content and Impact | 洪為璽; Hung, Wei-Hsi;Ho, Chin-Fu;Jou, Jau-Jeng;Tai, Yi-Ming |
12-Feb-2015 | Simulated annealing and the mapping problem: A computational study | 陳春龍; Hart, Stephen M.;Chen, Chuen-Lung |
15-Apr-2015 | Simulating sharing behavior in social networking sites | Lin, Qing-Feng;Yang, Heng-Li; 楊亨利 |
6-Jun-2016 | Simulating Time-Varying Demand Services with Queuing Models | 郁方; Chu, Hsuan-Kai;Cheny, Wan-Ping;Yu, Fang |
17-Feb-2014 | Skill Requirement of it Professionals in an Outsourced Environment | 季延平; 陳泉錫;季延平 |
23-Jun-2017 | Slow-Paced Persistent Network Attacks Analysis and Detection Using Spectrum Analysis | 陳力銘;蕭舜文;陳孟彰;廖婉君 |
8-Aug-2017 | SNS opinion-based recommendation for eTourism: A Taipei restaurant example | 趙逢毅; Chao, August F.Y.; Lai, Cheng-Yu |
2-Dec-2022 | Social Media and Interactive Affection on Performance: A Perspective from Transparency | 周致遠; Chou, Chih-Yuan; Huang, Jun |
26-Jan-2021 | Social Norms, Information Quality, and Trust | 周致遠; Chou, Chih-Yuan |
24-Oct-2023 | Social Robots for Older Adults in Medical Contexts | 簡士鎰; 呂玟逸; Chien, Shih-Yi;Lu, Wen-I;Chen, Yu-Wei;Shen, Chin-Chen;Tsai, Ping-Hsuan;Chu, Yun-Tung;Hung, Yu-Heng;Lee, Joyce;Chao, Shiau-Fang |
18-Jun-2015 | Software process management of top companies in Taiwan: A comparative study | Li, Eldon Y.;Chen, Houn-Gee;Lee, Tien-Sheng; 李有仁 |
12-May-2014 | Software Quality as Influenced by Informational Diversity, Task Conflict, and Learning in Project Teams | 梁定澎; Liang, T.P.;Jiang, J.;Klein, G.S.;Liu, J.Y.-C. |
17-Dec-2015 | Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services | 郁方; Lin, Chun-Han;Sun, Pei-Yu;Yu, Fang |
11-Jun-2015 | Special issue: Neuroscience in information systems research | Liang, Ting-Peng;Vom, Brocke, J.; 梁定澎 |
29-Jun-2015 | Strategies for leveraging IT-enabled service innovation in intensively competitive market | Shang, Shari S. C.;Chen, Chien Chun; 尚孝純;陳健鈞 |
14-Feb-2014 | Strategy Mapping in the Process of Formulating Digital Divide Strategies | 余千智;王行一; Yu, Chien-Chih ; Wang, Hsing-I |
21-Jul-2021 | Strengthening Existing Internet of Things System Security: Case Study of Improved Security Structure in Smart Health | 洪為璽; Hung, Wei-Hsi; 張智為; Chang, Chih-Wei |
22-Jun-2015 | String abstractions for string verification | Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方 |
17-Aug-2018 | String Analysis for Software Verification and Security | Bultan, Tevfik; 郁方; Yu, Fang; Alkhalaf, Muath |