English |
正體中文
|
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238023 Online Users : 447
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
College of Management
Department of Information Management
--Periodical Articles
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
THUIR
>
College of Management
>
Department of Information Management
>
Periodical Articles
>
Browse By Title
Browse By Date
Browse By Authors
Loading...
Siblings
Master's Theses
[
101
/101]
Books
[
0
/1]
National Research Council Report
[
14
/30]
Conference Papers
[
67
/121]
Collection Statistics
Item counts issued in 3 years:0(0.00%)
Items With Fulltext:78(70.27%)
Download counts of the item
Download times greater than 0:78(100.00%)
Download times greater than 100:78(100.00%)
Total Bitstream Download Counts:26772(26.37%)
Last Update: 2024-12-03 20:43
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
Optimal schedule on message broadca...
Animating civic education: Developi...
Exploring anchoring effect and the ...
The atmospheric factors of online s...
An efficient A* algorithm for the d...
The effect of online store atmosphe...
Debiasing the framing effect: The e...
Determinants of users' intention to...
User acceptance of wireless technol...
The joint effect of framing and anc...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 51-75 of 111. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2006
Group key management method for the distributed system
Chung, Y.F., Lai, F., Chen, T.S.
2012
Hierarchical information-protected system with multiple predecessors
Hsiao, T.-C.a , Chung, Y.-F.b , Chen, T.-S.c , Horng, G.a
2011
An ID-based access control in a hierarchical key management for mobile agent
Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
2011-03
An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent.
Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.
;
陳澤雄
2007
ID-based digital signature scheme on the elliptic curve cryptosystem
Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.
2007-06
The influenced factors on buying cell phones by using Grey-Hierarchy selected system
Yu, Y.-L., Cho, L.-C., Chen, T.-S.
2011-04
Intelligent Service-Integrated Platform Based on the RFID Technology and Software Agent System.
Yeh, K. C., Chen, R. S. and Chen, C. C.
;
陳佳楨
2011-03
Internet Users’ Decision Bias: Order Effect in E-Commerce.
Wu, Chin-Shan.
;
吳金山
2010
Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks
姜自強
;
Lin, H.Y. and Chiang, T.C.
2012
Investigating effectiveness and user acceptance of semantic social tagging for knowledge sharing
Huang, S.-L.a , Lin, S.-C.b , Chan, Y.-C.c
2009
Investigating the processes and factors of cross-disciplinary knowledge integration in academic entrepreneurship
林盛程
;
Lin, F.R., Lin, S.C. and Tsai, C.M
2011
The joint effect of framing and anchoring on internet buyers' decision-making
Wu, C.-S., Cheng, F.-F.
2008
Knowledge sharing and creation in a teachers' professional virtual community
Lin, F.-r.a , Lin, S.-c.b, Huang, T.-p.c
2008
Knowledge sharing and Creation in a Teachers’ Professional Virtual Community
Fu-ren Lin, Sheng-cheng Lin and Tzu-ping Huang
;
林盛程
2009
A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets
Chiang, T.-C.ab , Tai, C.-F.a , Hou, T.-W.a
2012
Low cost RFID real lightweight binding proof protocol for medication errors and patient safety
Yu, Y.-C.a , Hou, T.-W.ab , Chiang, T.-C.c
2010
Measurement of angular distribution of cosmic-ray muon fluence rate
Lin, J.-W.a, Chen, Y.-F.b, Sheuc, R.-J.c, Jiang, S.-H.ab
2011
Measurement of natural background radiation intensity on a train
Chen, Y.-F.a, Lin, J.-W.b, Sheu, R.-J.c, Lin, U.-T.d, Jiang, S.-H.a
2012
Mobile agent application and integration in electronic anamnesis system
Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
2011
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Liu, C.-H.a , Chung, Y.-F.b , Chiang, T.-W.c , Chen, T.-S.d , Wang, S.-D.a
2004-11-25
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2007
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Chiang, T.-C., Liu, C.-H., Huang, Y.-M.
2011-02
New Heuristics for Solving the Economic lot Scheduling Problem with Reworks.
Chang, Yu-Jen and Chang, M.-J.
;
張育仁
2009
A Novel Application of Grey System Theory to Information Security
Shen, R. L.,Y. F. Chung and T. S. Chen
;
陳澤雄
2005-11-05
A novel cryptosystem based on grey system theory and genetic algorithm
Shen, V.R.L., Chen, T.-S., Shai, K.-Q.
Showing items 51-75 of 111. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback