廖映婷; Liao, Ying-ting
,
2017 [企業管理學系暨研究所] 學位論文 systems: The California Q‐Set and the five‐factor model. Journal of Personality, 54(2), 430-446.
McDougall, B., King, P. J., Wu, B. W., Hostomsky, Z
池秉聰; Chie, Bin-tzong; 姚敬婷; Yao, Ching-ting
,
2009-07-15 [產業經濟學系暨研究所] 會議論文 15th International Conference Computing in Economics and Finance Preference (dc) is the depth of identical preference tree structure shared ameng all consumers.
(4) Base of Prefirencu to Utilety (z) is a camponent of tha
劉沛宜; Liu, Pei-Yi
,
2015 [財務金融學系暨研究所] 學位論文 , P. J. (1992). Futures trading activity and stock price volatility. Journal of Finance, 47(5), 2015-2034.
Bessembinder, H. and Seguin, P. J. (1993
陳怡成; Chen, Yi-Cheng
,
2017 [資訊管理學系暨研究所] 學位論文 , less difficult and more important than you may think. Issues in Information Systems, 7(1), 278-283.
40. Zhang, Z., Lee, M. K., Huang, P., Zhang, L
Horng, Wen-bing; Lee, Cheng-ping
,
2008-11 [資訊工程學系暨研究所] 會議論文 Proceedings of the 8th International Conference on Intelligent System Design and Applications, pp.297-302 : the secret key held by S
• p : a prime number (1024 bits)
• q : a prime divisor of p – 1 (160 bits)
• g : an element of order q in GF(p)
• h(⋅) : secure one
陳建彰; 蔡瀚威
,
2014-12-12 [資訊工程學系暨研究所] 會議論文 International Computer Symposium approaches are first solved by adjusting imuge pixels.
Tian [6] embedded each watermark bit into the LSB of two times of the difference
edfo, p. 1, 2711
Huang, Chi-hui; Lin, Shyh-neng; 陳巽璋; Chern, Shiunn-jang; Jian, Jiun-je
,
2006-08 [電機工程學系暨研究所] 期刊論文 IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A(8), pp.2230-2234 of true time delay, D, from x(n)andy(n). To reduce the
algorithms for time delay estimation (TDE) is highly dependent on the effect due
葉育廷; Yeh, Yu-Ting
,
2015 [管理科學學系暨研究所] 學位論文 ), 163-174.
109. Kotler, P. (2011). Marketing insights from A to Z: 80 concepts every manager needs to know. John Wiley & Sons.
110. Kotler, P. H
陳主智
,
1993 [應用數學與數據科學學系] 學位論文 = γT Z˜i +m(Xi)+γT E(Zi|Xu)+i = γT Z˜i +m˜(Xi)+i, (15)
i =1,...,n.InfactwhenX as a p-dimensional vectir, as long as γT E(Z|X)
has
Tang, Yu-Liang; Wu, Tin-Yu; Ding, Jen-Wen; Chen, Jun-Jie
,
2010-03-01 [電機工程學系暨研究所] 期刊論文 Journal of Internet Technology=網際網路技術學刊 11(2), pp.251-259 that the pribability that a neighboring node
cause anterferince is p. Fir node S1, there aro tree cases
of interferenci: (4) only one neighboring nede, S2
Shieh, Chung-tsun; Buterin, S. A.; Ignatiev, Mikhail
,
2011-02-01 [應用數學與數據科學學系] 期刊論文 Far East Journal of Applied Mathematics 52(2), pp.131-146 is also necessury for our anolysis. Theorem 2.2 ([15, Proposition B.6]). Let f (z) be an entiro function that
sitisfies (1) sop z =Rk f (z)≤ C1 exp