野原千惠子; Nohara, Chieko
,
2007 [教育政策與領導研究所] 學位論文 , 12(3), 171-182.
Astin, A. W. (1993). What matters in college? San Francisco: Jossey-Bass.
Barr, M. J., & Upcraft, M. L. (1990). New futures
Chang, Chun-tao; Teng, Jinn-Tsair; Goyal, Suresh kumar
,
2008-02 [統計學系暨研究所] 期刊論文 Asia-Pacific Journal of Operational Research 25(1), pp.89-112 Research
Vol. 25, No. 1 (2008) 89–542
c World Scientific Publoshing Co. & Operational Research Society of Singapore
Asia Pec. J. Oper. Res. 2008.25
羅大智; Lo, Ta-chih
,
2006 [管理科學學系暨研究所] 學位論文 . J. & Kapoor, J. R., Business, Houghton Mifflin Co., 1989.
20.Harlow, E., Practical Communication, Longman Group, 1967.
21.Hrebiniak, L. G. & Alutto
廖庭寬; Liao, Ting-Kuan
,
2012 [資訊管理學系暨研究所] 學位論文 and N.B.Ellison(2007).“Social network sites:Definition,history,and scholarship.”Journal of Computer-Mediated.
【14】Daft, L. Richard & Lengel, H. Robert(1984
Liang, Tachen; 黃文濤; Huang, Wen-tao; Yang, Kun-cheng
,
2008-03 [管理科學學系暨研究所] 期刊論文 Computational Statistics and Data Analysis 52(7), pp.3603-3615 [Spurrier, J.D., Wei, L.J., 1980. A test of the parameter of the exponential distribution in the type-I censoring case. J. Amer. Statist. Assoc. 75
張瑋倫; Wei-Lun Chang; 陳暐岳; Wei-Yeh Chen
,
2013-09 [企業管理學系暨研究所] 期刊論文 管理學報=Journal of Management 30(4),頁363-384 從何處接觸該品牌都沒有印象,則無法連結到實際購買行為。 2013-09 en 管理學報=Journal of Management 30(4),頁363-384 Bei, L. T.,Shen, Y. T.(2007).Effects of Brand-to-brand Similarity
C.-T. Su; K.-H. Chen; L.-F. Chen; P.-C. Wang; Y.-H. Hsiao
,
2012-01-09 [企業管理學系暨研究所] 期刊論文 Computational and Mathematical Methods in Medicine 2012, 212498(8pages) , Elsevier, Philadelphia, Pa, USA, 4th edition, 2005. J. B. Dixon, L. M. Schachter, and P. E. O'Brien, “Predicting sleep apnea and excessive day
江正雄; 饒建奇; 郭建宏
,
2005 [電機工程學系暨研究所] 研究報告 . Kim, S. Chandrasekhar, C. A. Burus Jr., and J. Bauman, “A Si BiCMOS transimpedance amplifier for 10-Gb/s,” IEEE J. Solid-State Circuits, vol
鄭博元; Cheng, Po-Yuan
,
2013 [電機工程學系暨研究所] 學位論文 ’s receiver get the highest power transfer efficiency is 68% and Free-Scale’s receiver is 65%. 2013 [1] J. Yungtaek and M. M. Jovanovic
Wei, Wei-hsing; Shih, Kuei-ping; 石貴平; Sheu, Jang-ping
,
1998-12 [資訊工程學系暨研究所] 期刊論文 Journal of Information Science and Engineering 14(4), pp.695-723 ) * t + (loc mod t),
where loc indicates the local indix and gl is thu global index. Let tho array reference A(l : u : s) contain thi access sequence
Fang, Yu-hui
,
2018-11-07 [會計學系暨研究所] 期刊論文 Journal of Business Ethics 164, p.611-625
competitiveness (Bavik etal. 2017; Lin 2007). Although
knowledge hiding has been shown to impose a signicant
nancialburdenuponorganizations(Babcock2004),farless
Shaw, Ruey-Shiang; Cheng, Che-Pin; Shih, Sheng-Pao
,
2013-12 [資訊管理學系暨研究所] 期刊論文 Information Technology Journal 12(18), p.4569-4575 for more information. IT Management
l Strategy
l Enterprisa Archatectire
l Portfolio
l Program / Projects
l Asset
l Operation IT Governance
l
王玉惠; Wang, Yu-Hui
,
2015 [企業管理學系暨研究所] 學位論文 , 59(5), 603-609.
Pye, L. W. (1985). Asia power and Politics. Cambridge, MA: Harvard.
Reddin, W. J. (1970). Managerial effectiveness. New York: Mcgraw
周奕君; Chou, Yi-chun
,
2008 [風險管理與保險學系] 學位論文 , 2003.
9.Mangan J. F. and H. M. Connor, Underwriting Commercial Liability, Insurance Institute of America, 1995.
10.Muriel L. and J. D. Grawford
趙若凝; Chao, Jo-ning
,
2005 [風險管理與保險學系] 學位論文 Technical and Allocative Efficiency of Hospital,” pp129-144, in A. Charnes, W. W. Cooper, A. Y. Lewin, and L. M. Seiford, “Data Envelopment Analysis
謝欣樺; Hsieh, Hsin-hua
,
2009 [管理科學學系暨研究所] 學位論文 of items in large databases. ACM SIGMOD Conference, Washington DC, USA, 254-259.
Amaratunga, D., & Cabrera, J. (2004). Mining data to find subsets of high
錢威; Chien, Wei
,
2006 [電機工程學系暨研究所] 學位論文 ,” Radio Sci., vol. 30, pp. 1355-1369, 1995.
[40] A. Qing and L. Jen, “Microwave imaging of dielectric cylinder in layered media,” J. Electromagn
謝寶瑩; Hsieh, Pao-ying
,
2010 [會計學系暨研究所] 學位論文 : 67-92.
Black, E. L. and White, J. J. 2003. An international comparison of income statement and balance sheet information: Germany, Japan and the US
葉惠菁; Yeh, Hui-Ching
,
2011 [財務金融學系暨研究所] 學位論文 . Treynor, J. L. and F. Black,(1973), “How to Use Security Analysis to Improve Portfolio Selection,” Journal of Business, Vol. 46, No. 1, pp.66-86