Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4250529      Online Users : 376
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Master's Theses [101/101]
    Periodical Articles [78/111]
    Books [0/1]
    National Research Council Report [14/30]

    Collection Statistics

    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:67(55.37%)

    Download counts of the item
    Download times greater than 0:67(100.00%)
    Download times greater than 100:67(100.00%)
    Total Bitstream Download Counts:22485(22.09%)

    Last Update: 2024-12-05 08:16


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1-50 of 121. (3 Page(s) Totally)
    1 2 3 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2009 3D互動式語言課後實習與情境式學習模組之?差模型 張嘉?、姜自強、?東平、黃惠敏
    2006 Adapted DP based algorithm with distance-based approach in ad hoc networks Chiang, T.-C.ab , Jiunn-Yin, J.L.a , Huang, Y.-M.a
    2006-05-28 Adaptive clustering with virtual subnets support in ad hoc networks Chiang, T.-C.ab , Tsai, M.-H.c , Huang, Y.-M.
    2006-09-03 Adaptive power-A ware clustering and multicasting protocol for mobile ad hoc networks Leu, J.J.Y.a, Tsai, M.-H.a, Chiang, T.-C.b, Huang, Y.-M.
    2009 An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce 陳澤雄; Chung, Y. F., T. S. Chen, Y. T. Chen, C. C. Lee and S. W. Wang
    2009-06-08 An agent-based english auction protocol using elliptic curve cryptosystem for mobile commerce Chung, Y.-F.a , Chen, T.-S.b, Chen, Y.-T.b, Lee, C.-C.b, Wang, S.-W.
    2006-10-08 Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem?? Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
    2011 Application of FES for hemiplegia in extremity coordination training Chou, C.H.a, Chen, S.b, Hwang, Y.S.a, Ho, C.S.d, Chen, C.C.b, Chen, S.C.c, Chen, Y.L.d
    2009 Applying semantic social tagging to improve the quality of content search. Huang, S.L., Lin, S.C. and Chan, Y.C; 林盛程
    2011 An auxiliary unicode Han character lookup service based on glyph shape similarity Lin, J.-W.a , Lin, F.-S.b
    2012-11-02 Bed site health care video-phone system Chung, Y.-F.; Tsai, M.-Y.; Wu, E.-P.; Chiang, D.-L.; Lee, C.-C.; Hsiao, T.-C.; Chen, T.-S.
    2010 Bio-signal analysis system design with support vector machines based on cloud computing service architecture Shen, C.-P.a , Chen, W.-H.a , Chen, J.-M.b, Hsu, K.-P.a, Lin, J.-W.c, Chiu, M.-J.d, Chen, C.-H.a, Lai, F.a
    2010-09 Bio-signal Analysis System Design with Support Vector Machines based on Cloud Computing Service. Architecture. Shen, Chia-Ping, Chen, Wei-Hsin, Chen, Jia-Ming, Hsu, Kai-Ping, Lin, Jeng-Wei, Chiu, Ming-Jang and Lai, Feipei.; 林正偉
    2009-08-25 A blind signature scheme based on elliptic curve cryptosystem Jeng, F.-G.a , Chen, T.-L.b , Chen, T.-S.
    2009 A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. Jeng, F.G., Chen, T.L. and Chen, T.S.; 陳澤雄
    2008 Broadcast scheduling for a P2P spanning tree ( Conference Paper ) Lin, J.-W.
    2011-04 A Classification Framework of Internet Rumors. Cheng, Fei-Fei and Wu, Chin-Shan .; 吳金山
    2013-07-03 Classification of schizophrenia using Genetic Algorithm-Support Vector Machine (GA-SVM) Hiesh, M.-H.; Lam, Andy, Y.-Y.; Shen, C.-P.; Chen, W.; Lin, F.-S.; Sung, H.-Y.; Lin, J.-W.; Chiu, M.-J.; Lai, F.
    2011-03 A Comparison of Thailand and Taiwan Bottled Tea Markets Based on Consumption Values Theory. Cheng, Fei-Fei, Wu, Chin-Shan and Paranee Pihakaendr.; 吳金山
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009 Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. Hua, Yi Lin and Chiang, Tzu-Chiang.; 姜自強
    2011-07 Designing an Expert Location System Combing Semantic Similarly and Social Capital. Huang, Shiu-li, Hsieh, Ren-jie and Lin, Sheng-cheng; 林盛程
    2008 Determinants Affecting Consumer Adoption of Contactless Credit Card: An Empirical Study 林盛程; Wang, Y. M. and S. C. Lin
    2002-10-28 Digital signature scheme resulted from identification: Protocol by elliptic curve cryptosystem? Chen, T.-S., Huang, G.-S., Liu, T.-P., Chung, Y.-F.
    2010 Digital skating board with RFID technique for upper extremity rehabilitation Chen, C.-C.a, Lin, J.-C.b, Chou, C.-H.c, Shih, Y.-Y.d, Chen, Y.-L.
    2004-03-28 A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2010 Efficient date-constraint access control and key management scheme for mobile agents. Chung, Y.F., Kao, M.H., Chen, T. L. and Chen, T.S.; 陳澤雄
    2010-03-17 Efficient date-constraint access control and key management scheme for mobile agents Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
    2008-03-25 Efficient hierarchical key management scheme for access control in the mobile agent?? Chung, Y.-F., Chen, T.-S., Liu, C.-H., Wang, T.-C.
    2004-11-21 An efficient threshold group signature scheme?? Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
    2013-07-03 Epilepsy analytic system with cloud computing Shen, C.-P.; Zhou, W.; Lin, F.-S.; Sung, H.-Y.; Lam, Y.-Y.; Chen, W.; Lin, J.-W.; Pan, M.-K.; Chiu, M.-J.; Lai, F.
    2011 Epileptic seizure detection for multichannel EEG signals with support vector machines Shen, C.-P.a , Chan, C.-M.a , Lin, F.-S.b , Chiu, M.-J.c , Lin, J.-W.d , Kao, J.-H.a , Chen, C.-P.a , Lai, F.
    2013-10-26 Font generation of personal handwritten Chinese characters Lin, J.-W.; Wang, C.-Y.; Ting, C.-L.; Chang, R.-I.
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2009 A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks 張育仁; Chang, Y. J. and M. J. Yao
    2009 GPS定位分叢應用於AODV繞送協定之改良 吳宗育、莊雅云、姜自強
    2006-12-04 Hacking tricks toward security on network environments?? Chen, T.-S., Jeng, F.-G., Liu, Y.-C.
    2009 Hierarchical Time-Bound Key Management for Mobile Agents 陳澤雄; Chung, Y. F., T. S. Chen, C. C. Ho, Y. H. Yeh and H. C. Ko
    2009-06-08 Hierarchical time-bound key management for mobile agents Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C.
    2013-07-03 A High performance cloud computing platform for mRNA analysis Lin, F.-S.; Shen, C.-P.; Sung, H.-Y.; Lam, Y.-Y.; Lin, J.-W.; Lai, F.
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2011-05-27 Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
    2009 Implementation of Conjugate Gradient Method into an Imaging Estimator of Prior Knowledge Shieh, H. M., J. G. Li and H. C. Yu; 余心淳
    2002-10-28 An improvement of cryptographic key assignment scheme in a user hierarchy?? Chen, T.-S., Huang, G.-S., Tasi, C.-C., Chang, N.-T.
    2011-04 The influence of personal characteristics on helping behavior in virtual community. Wu, Chin-Shan Cheng, Fei-Fei Yang, Yinlin Lee,Chia Jung and Chiu, Kailin.; 吳金山
    2010-07-20 Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks Lin, H.-Y.a , Chiang, T.-C.b

    Showing items 1-50 of 121. (3 Page(s) Totally)
    1 2 3 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback