|
[1] 巫和懋、夏珍,2002,賽局高手,台北,臺灣時報文化 [2] 李秉翰,2006,人臉識別最新發展現況,電腦識別監控產學研聯盟電子報,2006年1月第7期 [3] 陳芳毓,2014,「五力分析」不夠用?策略大師麥可‧波特這麼說!,遠見雜誌,網址:http://www.gvm.com.tw/webonly_content_3535_1.html,上網日期:2016年7月10日 [4] Baron, R. J. 1981. Mechanisms of human facial recognition. Int. J. Man-Machine Studies. [5] Brandenburger, A. M. and Nalebuff, B. J. 1996. Co-Opetition: A Revolution Mindset that Combines Competition and Cooperation. New York, NY: Currency Doubleday. [6] Chang, S. 2015. How to Implement Face Authentication in Windows 10. https://sec.ch9.ms/sessions/winhec/slides/WinHEC-2015Nov-System-Win10NewFeaturesSessionDemo-WindowsHellow-FaceAuthentication.pdf. Accessed Jul 8, 2016. [7] Chang, S. 2016. Windows Hello. http://sec.ch9.ms/slides/winHEC/2_01_WindowsHello.pdf. Accessed Jul 8, 2016. [8] Grant, R. M. 2007. Contemporary strategy analysis. John Wiley & Sons, Ltd. [9] Li S. Z., Chu, R., Liao, S. and Zhang, L. 2007. Illumination Invariant Face Recognition Using Near-Infrared Images. IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume: 29, Issue: 4. [10] Microsoft. 2015. IR camera face authentication. https://msdn.microsoft.com/en-us/library/windows/hardware/mt282188.aspx. Accessed Jul 8, 2016. [11] Microsoft. 2015. Windows Hello biometric requirements. https://msdn.microsoft.com/en-us/library/windows/hardware/mt587095(v=vs.85).aspx. Accessed Jul 8, 2016. [12] Microsoft. 2016. Microsoft by the Numbers. http://news.microsoft.com/bythenumbers/windows-ten. Accessed Jul 8, 2016. [13] Net Market Share. 2016. Operating system market share. https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&qpcustomd=0. Accessed Jul 8, 2016. [14] O''Toole, A. J., et al, 2007. Face Recognition Algorithms Surpass Humans Matching Faces Over Changes in Illumination. IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume: 29, Issue: 9. [15] Porter, M. E. 1979. How Competitive Forces Shape Strategy. Harvard Business Review, March-April. [16] Porter, M. E. 2008. The Five Competitive Forces That Shape Strategy. Harvard Business Review, January. [17] Porter, N. 2015. Secure Authentication with Windows Hello. Microsoft Ignite. http://video.ch9.ms/sessions/ignite/2015/decks/BRK2324_Porter.pptx. Accessed Jul 8, 2016.
|