Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Marn-Ling Shing"'
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 5, Pp 81-86 (2007)
The field of information security includes diverse contents such as network security and computer forensics which are highly technical-oriented topics. In addition, information forensic requires the background of criminology. The information security
Externí odkaz:
https://doaj.org/article/67e20fcaad974354a65f7fb0aaa4a4a8
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 5, Pp 53-58 (2007)
In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will tr
Externí odkaz:
https://doaj.org/article/fe45a7dc958542a8a920cfb40074f7e3
Autor:
Lee Hur Shing, Chen-Chi Shing, Marn-Ling Shing, Tzu-Chieh Lu, Meng Chu Chiang, Lee Pin Shing, Che Wei Yang
Publikováno v:
International Journal of Electronics and Electrical Engineering. :346-350
Publikováno v:
Proceedings of the 2018 3rd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2018).
Publikováno v:
International Journal of Electronic Commerce Studies. 6:233-242
The most commonly used data integrity models today are Bibba, Wilson-Clark and Chinese models. These models are designed for both data integrity protection and confidentiality. Many optimization problems are related to linear programming. In practice
A Quality Outcome Assessment of Learning Discrete Mathematics Course The Case of University Students
Publikováno v:
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY. 2:9-23
Teaching a mathematics foundation course such as Discrete Mathematics for an information technology curriculum is always a challenge. The challenge may be identifying students mathematical backgrounds early and then using different teaching technique
Publikováno v:
Communications of the IIMA. 9
Publikováno v:
Communications of the IIMA. 7
Publikováno v:
Advances in Sport Science and Computer Science.
Autor:
Marn-Ling Shing, Chen-Chi Shing
Publikováno v:
Informatics in Control, Automation and Robotics ISBN: 9783642258985
This paper uses game theory to model the strategies against the threats based on the cost.If the frequencies of threats occurrence are known, the optimal pure strategy can be found by expected effectiveness. However, if those frequencies are unknown,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c96e3eff6351941de4c64081b857e2d4
https://doi.org/10.1007/978-3-642-25899-2_15
https://doi.org/10.1007/978-3-642-25899-2_15