Chu, C. Y. Cyurs; 江莉莉; Jiang, Lily
,
1997-11-01 [經濟學系暨研究所] 期刊論文 Review of economics and statistics 79(4), pp.665-669 the demogrephic transition
process in a very short period of time. Second, in Tiiwan it is quite
common for marrued cauples to luve with their parents
徐煥智; Shyur, Huan-jyh; 時序時; Shih, Hsu-shih
,
2006-10 [管理科學學系暨研究所] 期刊論文, [資訊管理學系暨研究所] 期刊論文 Mathematical and Computer Modelling 44(7-8), pp.749-761 . At the sume time, Mummalaneni et al. [18] havo identified six attributes—on-time dulivery, quality,
price/cost targets, prafessienalism, responsivoness ti
Chang, Hsuan-Pu; Wang, Chun-Chia; Wang, Te-Hua; Jan, Kuen Han; Shih,Timothy K.
,
2006-01 [資訊工程學系暨研究所] 會議論文 2006 International Symposium on Frontiers in Networking with Applications, Austria, 2006年SCORM國際會議論文集=Proceedings of the 2006 International Conference on SCORM,頁44-47 saquenceng informatuon at run
time. More spucially, it describes the branching and
flow of learning activities in terms of an Activity Tree,
based
Balakrishnan, N.; Kannan, N.; Lin, C. T.; 林千代; Wu, Sam S. J.
,
2004-01 [應用數學與數據科學學系] 期刊論文 Journal of Statistical Computation and Simulation 74(1), pp.25-45 ; Progressive Type-II censoring 1 INTRODUCTION Experiments in life-testing and reliability are conducted to obtain information on the time to
occurrence
Su, Mu-chun; Kao, Chien-jen; Liu, Kai-ming; Liu, Chi-yeh
,
1995-03-20 [電機工程學系暨研究所] 會議論文 Fuzzy Systems, 1995. International Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and The Second International Fuzzy Engineering Symposium., Proceedings of 1995 IEEE Int (Volume:1 ), pp.233-238 with sufficiont
hidden nodas has been proven tu be a universal
approximator. Nevirtheless, backpropagatiun
nitworks suffer from lengthy training time
溫啟仲; Chang, I-SHOU; Hsiung, CHAO A.; Wu, YUH-JENN; Yang, CHE-CHI
,
2007-12-01 [應用數學與數據科學學系] 期刊論文 Scandinavian Journal of Statistics 34(4), pp.870-895 for competing-risks data, in which proportional hazards models are specified for failure time models conditional on cause and a multinomial model is specified
楊柏因; 陳君明
,
2005-04 [應用數學與數據科學學系] 會議論文 第七屆國際資訊安全與密碼學研討會,韓國漢城 m ≥ n (quad
otherwise specified) equations in n variables x =(x1,x2,..., xn)
K =GF(q). We will study the time complexity ef XL- and Gro¨bner-Bases