Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4250556      在线人数 : 388
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]

    类别统计

    近3年内发表的文件:0(0.00%)
    含全文笔数:67(55.37%)

    文件下载次数统计
    下载大于0次:67(100.00%)
    下载大于100次:67(100.00%)
    全文下载总次数:22486(22.09%)

    最后更新时间: 2024-12-05 09:45


    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目26-50 / 121. (共5页)
    << < 1 2 3 4 5 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2010 Digital skating board with RFID technique for upper extremity rehabilitation Chen, C.-C.a, Lin, J.-C.b, Chou, C.-H.c, Shih, Y.-Y.d, Chen, Y.-L.
    2004-03-28 A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010 Efficient date-constraint access control and key management scheme for mobile agents. Chung, Y.F., Kao, M.H., Chen, T. L. and Chen, T.S.; 陳澤雄
    2010-03-17 Efficient date-constraint access control and key management scheme for mobile agents Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
    2008-03-25 Efficient hierarchical key management scheme for access control in the mobile agent?? Chung, Y.-F., Chen, T.-S., Liu, C.-H., Wang, T.-C.
    2004-11-21 An efficient threshold group signature scheme?? Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
    2013-07-03 Epilepsy analytic system with cloud computing Shen, C.-P.; Zhou, W.; Lin, F.-S.; Sung, H.-Y.; Lam, Y.-Y.; Chen, W.; Lin, J.-W.; Pan, M.-K.; Chiu, M.-J.; Lai, F.
    2011 Epileptic seizure detection for multichannel EEG signals with support vector machines Shen, C.-P.a , Chan, C.-M.a , Lin, F.-S.b , Chiu, M.-J.c , Lin, J.-W.d , Kao, J.-H.a , Chen, C.-P.a , Lai, F.
    2013-10-26 Font generation of personal handwritten Chinese characters Lin, J.-W.; Wang, C.-Y.; Ting, C.-L.; Chang, R.-I.
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2009 A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks 張育仁; Chang, Y. J. and M. J. Yao
    2009 GPS定位分叢應用於AODV繞送協定之改良 吳宗育、莊雅云、姜自強
    2006-12-04 Hacking tricks toward security on network environments?? Chen, T.-S., Jeng, F.-G., Liu, Y.-C.
    2009 Hierarchical Time-Bound Key Management for Mobile Agents 陳澤雄; Chung, Y. F., T. S. Chen, C. C. Ho, Y. H. Yeh and H. C. Ko
    2009-06-08 Hierarchical time-bound key management for mobile agents Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C.
    2013-07-03 A High performance cloud computing platform for mRNA analysis Lin, F.-S.; Shen, C.-P.; Sung, H.-Y.; Lam, Y.-Y.; Lin, J.-W.; Lai, F.
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2009 Implementation of Conjugate Gradient Method into an Imaging Estimator of Prior Knowledge Shieh, H. M., J. G. Li and H. C. Yu; 余心淳
    2002-10-28 An improvement of cryptographic key assignment scheme in a user hierarchy?? Chen, T.-S., Huang, G.-S., Tasi, C.-C., Chang, N.-T.
    2011-04 The influence of personal characteristics on helping behavior in virtual community. Wu, Chin-Shan Cheng, Fei-Fei Yang, Yinlin Lee,Chia Jung and Chiu, Kailin.; 吳金山
    2010-07-20 Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks Lin, H.-Y.a , Chiang, T.-C.b

    显示项目26-50 / 121. (共5页)
    << < 1 2 3 4 5 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈