English
| 正體中文 |
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4242631 Online Users : 807
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
管理學院
資訊管理學系所
--會議論文
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
Tunghai University Institutional Repository
>
管理學院
>
資訊管理學系所
>
會議論文
>
Browse By Title
Browse By Date
Browse By Authors
Loading...
Siblings
碩士論文
[
101
/101]
期刊論文
[
78
/111]
專書
[
0
/1]
國科會研究報告
[
14
/30]
Collection Statistics
近3年內發表的文件:0(0.00%)
含全文筆數:67(55.37%)
文件下載次數統計
下載大於0次:67(100.00%)
下載大於100次:67(100.00%)
檔案下載總次數:22461(22.08%)
最後更新時間: 2024-12-04 16:00
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
Font generation of personal handwri...
Bed site health care video-phone sy...
Epilepsy analytic system with cloud...
Classification of schizophrenia usi...
A High performance cloud computing ...
Ultra-fast epileptic seizure detect...
Novel control for ambulation functi...
An RFID-based software agent framew...
Novel design of interactive caption...
Digital skating board with RFID tec...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 51-100 of 121. (3 Page(s) Totally)
<<
<
1
2
3
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2011-07
Investigating Dropout Intention of Virtual Community Members by Viewpoint of Serious Leisure.
Lin, Sheng-cheng and Yang, Yin-lin.
;
林盛程
2009
Investigating the processes and factors of cross-disciplinary knowledge integration in academic entrepreneurship.
Lin, F.R., Lin, S.C. and Tsai, C.M.
;
林盛程
2005-08-22
A limited flooding scheme for mobile ad hoc networks
Chiang, T.-C.ac , Wu, P.-Y.b, Huang, Y.-M.a
2005-08-22
A limited flooding scheme for mobile ad hoc networks
Chiang, T.-C.ac , Wu, P.-Y.b, Huang, Y.-M.a
2004-03-28
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme??
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2009
Multi-tree broadcast in peer-to-peer networks
Lin, J.-W.
2004-03-29
Multicast routing representation in Ad Hoc networks using fuzzy Petri nets
Chiang, T.-C. , Huang, Y.-M.
2012
A multiclass classification tool using cloud computing architecture
Shen, C.-P.a , Liu, C.-H.a, Lin, F.-S.d, Lin, H.b, Huang, C.-Y.F.e, Kao, C.-Y.ac, Lai, F.ac, Lin, J.-W.f
2006-04-18
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Liu, C.-H.a , Chiang, T.-C.b , Huang, Y.-M.a
2008
A Novel Approach to Enhance the Synthetic Aperture Imaging
謝新銘、余心淳、許郁清
2009
Novel control for ambulation function restoration in a non-invasive functional electrical stimulation system
Hsieh, J.-C.a, Chen, C.-C.a, Chen, S.-C.b, Chen, Y.-L.c, Li, Y.-C.d, Shih, Y.-Y.d, Kuo, T.-S.d
2010
Novel design of interactive caption and recognition postures within the wearable and non-vision system over wireless sensor network
Huang, W.T.a , Hung, C.N.b , Tuan, C.C.b , Chen, C.C.c , Chang, Y.J.c , Chen, Y.Y.d
2006-11-03
A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery??
Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
2006-10-03
A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery??
Wu, Z.Y., Jeng, F.G., Chen, T.S.
2006-08-16
A novel key management and access control scheme for mobile agent??
Pan, J.-Y., Chen, T.-L., Chen, T.-S.
2004-09-28
A novel key management scheme for dynamic access control in a user hierarchy??
Chen, T.-S., Chung, Y.-F., Tian, C.-S.
2010-03-17
A novel time-bound hierarchical key assignment scheme for mobile agent
Liu, C.-H.a, Chung, Y.-F.b, Jhuo, J.-D.c, Chen, T.-S.c , Wang, S.-D.a
2010
A novel time-bound hierarchical key assignment scheme for mobile agent.
Liu, C.H., Chung, Y.F., Jhuo, J.D., Chen, T.S. Wang, S.D.
;
陳澤雄
2005-12-06
On scalability and mobility management of hierarchical large-scale ad hoc networks
Tsai, M.-H.b , Chiang, T.-C.ac , Huang, Y.-M.
2010-12
One-Dimensional Phase Retrieval using Prior Discrete Fourier Transform.
余心淳、謝新銘、葉宏偉
2005-08-22
A partition network model for ad hoc networks
Chiang, T.-C.ac , Tsai, H.-M.b, Huang, Y.-M.a
2002-10-28
A proxy-protected proxy signature scheme based on elliptic curve cryptosystem??
Chen, T.-S., Liu, T.-P., Chung, Y.-F.
2011-06
"Innovation Network in Taiwan Telecommunication Industry Based upon Social Network Perspective.
Tseng, Chun-yao, Lin, Sheng-cheng and Jiang, Tz-lin.
;
林盛程
2008
Rearrange broadcast schedules on DHT-based peer-to-peer networks
Lin, J.-W.
2011-07
The Relationship between Vacation Motives and Online Travel Information Search Behavior in Pre-Trip Context: A Case of Inbound Travelers in Taiwan.
Kimsuwan,Apithep., Cheng, Fei-Fei and Wu, Chin-Shan .
;
吳金山
2012-03-26
A reliable dynamic user-remote password authentication scheme over insecure network
Wu, Z.-Y.a , Chiang, D.-L.b, Lin, T.-C.b, Chung, Y.-F.c, Chen, T.-S.
2010-07-20
A rendezvous-location based multicast secure communication in ad hoc networks
Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
2010-07-20
A rendezvous-location based multicast secure communication in ad hoc networks
Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
2009
An RFID-based software agent framework on pervasive health service
Yeh, K.-C.a, Chen, Y.-C.b, Chen, C.-C.c, Chen, R.-S.
2008
Safety Design for Artificial Marble Products
張育仁
;
Wang, W. P., C. S. Chang and Y. J. Chang
2012-03-26
Secure authentication scheme for supporting healthcare in wireless sensor networks
Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
2009
Seismic image reconstruction based on an approach of prior knowledge.
Shieh, H. M., Yu, H. C., Hsu, Y. C. and Ye, M. C.
;
余心淳
2003-08-27
A Sequence and Topology encoding for Multicast Protocol (STMP) in Wireless Ad Hoc Networks
Huang, Y.-M.a, Chiang, T.-C.b
2010-12-17
The study of secure agent-based scheme on health information systems
Chen, T.-L. , Cheng, S.-H., Liu, C.-H., Fang, T.-Y., Chen, T.-S., Chen, C.-S.
2010-12
The Study of Secure Agent-based Scheme on Health Information Systems.
Chen,T. L., Cheng, S. H., Liu, C. H., Fang, T.Y., Chen, T. S. and Chen, C. S.
;
陳澤雄
2006-12-04
Threshold signature scheme resistible for conspiracy attack??
Chung, Y.F., Liu, C.-H., Lai, F., Chen, T.-S.
2013-11-10
Ultra-fast epileptic seizure detection using EMD based on multichannel electroencephalogram
Chen, W.
;
Lam, Y.-Y.
;
Shen, C.-P.
;
Sung, H.-Y.
;
Lin, J.-W.
;
Chiu, M.-J.
;
Lai, F.
2009
《Unicode電腦漢字異體字字典》編纂過程所遭遇的困難和解決方法
袁國華、林正偉、詹今慧、趙苑夙
2006-07-04
Using an interpolation algorithm for VCR like functions in multimedia communications
Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
2006-07-04
Using an interpolation algorithm for VCR like functions in multimedia communications
Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
2009
Using the Heuristic Algorithm to Solve the Economic Lot Scheduling Problem with Returns
張育仁
;
Chang, Y. J. and C. Y. Cheng
2011-06-28
Virtual B-tree topology: A self-routing topology for a wireless sensor network
Wang, S.-Y.ab , Chiang, T.-C.c , Yang, C.-S.d
2010
Web-based healthcare Hand Drawing Management System
Hsieh, S.-L.a , Weng, Y.-C.b , Chen, C.-H.c, Hsu, K.-P.d , Lin, J.-W.e , Lai, F.f
2010-09
Web-based Healthcare Hand Drawing Management System.
Hsieh, Sheau-Ling, Weng, Yung-Chin,g, Chen, Chi-Huang, Hsu, Kai-Ping, Lin, Jeng-Weiand Lai, Feipei.
;
林正偉
2010-05-21
Wireless Bluetooth communications combine with secure data transmission using ECDH and conference key agreements
Lin, H.-Y.a , Chiang, T.-C.b
2010-05-21
Wireless Bluetooth communications combine with secure data transmission using ECDH and conference key agreements
Lin, H.-Y.a , Chiang, T.-C.b
2009
Wireless Bluetooth Communications Combine With Secure Data Transmission using ECDH and Conference Key Agreements.
Hua, Yi Lin and Chiang, Tzu-Chiang.
;
姜自強
2008
一個求解有重製狀況經濟批量排程問題的簡單啟發式方法
張育仁、姚銘忠
2011-06
主動式無線標籤技術於資訊化顧客臨櫃服務管理系統上之應用與實作。
余心淳、吳欣蓉、陳?瑄、?協信
2010
以區域分割為基礎的叢集群播協定於隨意無線行動通訊網路之應用
林仕偉、姜自強
Showing items 51-100 of 121. (3 Page(s) Totally)
<<
<
1
2
3
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback