English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4231252      在线人数 : 499
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]

    类别统计

    近3年内发表的文件:0(0.00%)
    含全文笔数:67(55.37%)

    文件下载次数统计
    下载大于0次:67(100.00%)
    下载大于100次:67(100.00%)
    全文下载总次数:22310(22.02%)

    最后更新时间: 2024-12-03 02:15


    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目1-50 / 121. (共3页)
    1 2 3 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2009 3D互動式語言課後實習與情境式學習模組之?差模型 張嘉?、姜自強、?東平、黃惠敏
    2006 Adapted DP based algorithm with distance-based approach in ad hoc networks Chiang, T.-C.ab , Jiunn-Yin, J.L.a , Huang, Y.-M.a
    2006-05-28 Adaptive clustering with virtual subnets support in ad hoc networks Chiang, T.-C.ab , Tsai, M.-H.c , Huang, Y.-M.
    2006-09-03 Adaptive power-A ware clustering and multicasting protocol for mobile ad hoc networks Leu, J.J.Y.a, Tsai, M.-H.a, Chiang, T.-C.b, Huang, Y.-M.
    2009 An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce 陳澤雄; Chung, Y. F., T. S. Chen, Y. T. Chen, C. C. Lee and S. W. Wang
    2009-06-08 An agent-based english auction protocol using elliptic curve cryptosystem for mobile commerce Chung, Y.-F.a , Chen, T.-S.b, Chen, Y.-T.b, Lee, C.-C.b, Wang, S.-W.
    2006-10-08 Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem?? Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
    2011 Application of FES for hemiplegia in extremity coordination training Chou, C.H.a, Chen, S.b, Hwang, Y.S.a, Ho, C.S.d, Chen, C.C.b, Chen, S.C.c, Chen, Y.L.d
    2009 Applying semantic social tagging to improve the quality of content search. Huang, S.L., Lin, S.C. and Chan, Y.C; 林盛程
    2011 An auxiliary unicode Han character lookup service based on glyph shape similarity Lin, J.-W.a , Lin, F.-S.b
    2012-11-02 Bed site health care video-phone system Chung, Y.-F.; Tsai, M.-Y.; Wu, E.-P.; Chiang, D.-L.; Lee, C.-C.; Hsiao, T.-C.; Chen, T.-S.
    2010 Bio-signal analysis system design with support vector machines based on cloud computing service architecture Shen, C.-P.a , Chen, W.-H.a , Chen, J.-M.b, Hsu, K.-P.a, Lin, J.-W.c, Chiu, M.-J.d, Chen, C.-H.a, Lai, F.a
    2010-09 Bio-signal Analysis System Design with Support Vector Machines based on Cloud Computing Service. Architecture. Shen, Chia-Ping, Chen, Wei-Hsin, Chen, Jia-Ming, Hsu, Kai-Ping, Lin, Jeng-Wei, Chiu, Ming-Jang and Lai, Feipei.; 林正偉
    2009-08-25 A blind signature scheme based on elliptic curve cryptosystem Jeng, F.-G.a , Chen, T.-L.b , Chen, T.-S.
    2009 A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. Jeng, F.G., Chen, T.L. and Chen, T.S.; 陳澤雄
    2008 Broadcast scheduling for a P2P spanning tree ( Conference Paper ) Lin, J.-W.
    2011-04 A Classification Framework of Internet Rumors. Cheng, Fei-Fei and Wu, Chin-Shan .; 吳金山
    2013-07-03 Classification of schizophrenia using Genetic Algorithm-Support Vector Machine (GA-SVM) Hiesh, M.-H.; Lam, Andy, Y.-Y.; Shen, C.-P.; Chen, W.; Lin, F.-S.; Sung, H.-Y.; Lin, J.-W.; Chiu, M.-J.; Lai, F.
    2011-03 A Comparison of Thailand and Taiwan Bottled Tea Markets Based on Consumption Values Theory. Cheng, Fei-Fei, Wu, Chin-Shan and Paranee Pihakaendr.; 吳金山
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009 Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. Hua, Yi Lin and Chiang, Tzu-Chiang.; 姜自強
    2011-07 Designing an Expert Location System Combing Semantic Similarly and Social Capital. Huang, Shiu-li, Hsieh, Ren-jie and Lin, Sheng-cheng; 林盛程
    2008 Determinants Affecting Consumer Adoption of Contactless Credit Card: An Empirical Study 林盛程; Wang, Y. M. and S. C. Lin
    2002-10-28 Digital signature scheme resulted from identification: Protocol by elliptic curve cryptosystem? Chen, T.-S., Huang, G.-S., Liu, T.-P., Chung, Y.-F.
    2010 Digital skating board with RFID technique for upper extremity rehabilitation Chen, C.-C.a, Lin, J.-C.b, Chou, C.-H.c, Shih, Y.-Y.d, Chen, Y.-L.
    2004-03-28 A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010 Efficient date-constraint access control and key management scheme for mobile agents. Chung, Y.F., Kao, M.H., Chen, T. L. and Chen, T.S.; 陳澤雄
    2010-03-17 Efficient date-constraint access control and key management scheme for mobile agents Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
    2008-03-25 Efficient hierarchical key management scheme for access control in the mobile agent?? Chung, Y.-F., Chen, T.-S., Liu, C.-H., Wang, T.-C.
    2004-11-21 An efficient threshold group signature scheme?? Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
    2013-07-03 Epilepsy analytic system with cloud computing Shen, C.-P.; Zhou, W.; Lin, F.-S.; Sung, H.-Y.; Lam, Y.-Y.; Chen, W.; Lin, J.-W.; Pan, M.-K.; Chiu, M.-J.; Lai, F.
    2011 Epileptic seizure detection for multichannel EEG signals with support vector machines Shen, C.-P.a , Chan, C.-M.a , Lin, F.-S.b , Chiu, M.-J.c , Lin, J.-W.d , Kao, J.-H.a , Chen, C.-P.a , Lai, F.
    2013-10-26 Font generation of personal handwritten Chinese characters Lin, J.-W.; Wang, C.-Y.; Ting, C.-L.; Chang, R.-I.
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2009 A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks 張育仁; Chang, Y. J. and M. J. Yao
    2009 GPS定位分叢應用於AODV繞送協定之改良 吳宗育、莊雅云、姜自強
    2006-12-04 Hacking tricks toward security on network environments?? Chen, T.-S., Jeng, F.-G., Liu, Y.-C.
    2009 Hierarchical Time-Bound Key Management for Mobile Agents 陳澤雄; Chung, Y. F., T. S. Chen, C. C. Ho, Y. H. Yeh and H. C. Ko
    2009-06-08 Hierarchical time-bound key management for mobile agents Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C.
    2013-07-03 A High performance cloud computing platform for mRNA analysis Lin, F.-S.; Shen, C.-P.; Sung, H.-Y.; Lam, Y.-Y.; Lin, J.-W.; Lai, F.
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2009 Implementation of Conjugate Gradient Method into an Imaging Estimator of Prior Knowledge Shieh, H. M., J. G. Li and H. C. Yu; 余心淳
    2002-10-28 An improvement of cryptographic key assignment scheme in a user hierarchy?? Chen, T.-S., Huang, G.-S., Tasi, C.-C., Chang, N.-T.
    2011-04 The influence of personal characteristics on helping behavior in virtual community. Wu, Chin-Shan Cheng, Fei-Fei Yang, Yinlin Lee,Chia Jung and Chiu, Kailin.; 吳金山
    2010-07-20 Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks Lin, H.-Y.a , Chiang, T.-C.b

    显示项目1-50 / 121. (共3页)
    1 2 3 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈