English
| 正體中文 |
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4237968 Online Users : 434
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
管理學院
資訊管理學系所
--會議論文
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
Tunghai University Institutional Repository
>
管理學院
>
資訊管理學系所
>
會議論文
>
Browse By Title
Browse By Date
Browse By Authors
Loading...
Siblings
碩士論文
[
101
/101]
期刊論文
[
78
/111]
專書
[
0
/1]
國科會研究報告
[
14
/30]
Collection Statistics
近3年內發表的文件:0(0.00%)
含全文筆數:67(55.37%)
文件下載次數統計
下載大於0次:67(100.00%)
下載大於100次:67(100.00%)
檔案下載總次數:22383(22.04%)
最後更新時間: 2024-12-04 03:41
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
Font generation of personal handwri...
Bed site health care video-phone sy...
Epilepsy analytic system with cloud...
Classification of schizophrenia usi...
A High performance cloud computing ...
Ultra-fast epileptic seizure detect...
Novel control for ambulation functi...
An RFID-based software agent framew...
Novel design of interactive caption...
Digital skating board with RFID tec...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 26-50 of 121. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2010
Digital skating board with RFID technique for upper extremity rehabilitation
Chen, C.-C.a, Lin, J.-C.b, Chou, C.-H.c, Shih, Y.-Y.d, Chen, Y.-L.
2004-03-28
A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem??
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2010-08-04
Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks
Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
2010-08-04
Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks
Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
2010
Efficient date-constraint access control and key management scheme for mobile agents.
Chung, Y.F., Kao, M.H., Chen, T. L. and Chen, T.S.
;
陳澤雄
2010-03-17
Efficient date-constraint access control and key management scheme for mobile agents
Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
2008-03-25
Efficient hierarchical key management scheme for access control in the mobile agent??
Chung, Y.-F., Chen, T.-S., Liu, C.-H., Wang, T.-C.
2004-11-21
An efficient threshold group signature scheme??
Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
2013-07-03
Epilepsy analytic system with cloud computing
Shen, C.-P.
;
Zhou, W.
;
Lin, F.-S.
;
Sung, H.-Y.
;
Lam, Y.-Y.
;
Chen, W.
;
Lin, J.-W.
;
Pan, M.-K.
;
Chiu, M.-J.
;
Lai, F.
2011
Epileptic seizure detection for multichannel EEG signals with support vector machines
Shen, C.-P.a , Chan, C.-M.a , Lin, F.-S.b , Chiu, M.-J.c , Lin, J.-W.d , Kao, J.-H.a , Chen, C.-P.a , Lai, F.
2013-10-26
Font generation of personal handwritten Chinese characters
Lin, J.-W.
;
Wang, C.-Y.
;
Ting, C.-L.
;
Chang, R.-I.
2004-07-08
A forwarding cache vlan protocol (FCVP) in wireless networks
Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
2004-07-08
A forwarding cache vlan protocol (FCVP) in wireless networks
Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
2009
A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks
張育仁
;
Chang, Y. J. and M. J. Yao
2009
GPS定位分叢應用於AODV繞送協定之改良
吳宗育、莊雅云、姜自強
2006-12-04
Hacking tricks toward security on network environments??
Chen, T.-S., Jeng, F.-G., Liu, Y.-C.
2009
Hierarchical Time-Bound Key Management for Mobile Agents
陳澤雄
;
Chung, Y. F., T. S. Chen, C. C. Ho, Y. H. Yeh and H. C. Ko
2009-06-08
Hierarchical time-bound key management for mobile agents
Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C.
2013-07-03
A High performance cloud computing platform for mRNA analysis
Lin, F.-S.
;
Shen, C.-P.
;
Sung, H.-Y.
;
Lam, Y.-Y.
;
Lin, J.-W.
;
Lai, F.
2011-05-27
Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks
Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
2011-05-27
Immediate Group ACK tree (IGA) for reliable multicast in mobile Ad Hoc networks
Chiang, T.-C.a , Hsu, C.-Y.b, Chang, J.-L.c
2009
Implementation of Conjugate Gradient Method into an Imaging Estimator of Prior Knowledge
Shieh, H. M., J. G. Li and H. C. Yu
;
余心淳
2002-10-28
An improvement of cryptographic key assignment scheme in a user hierarchy??
Chen, T.-S., Huang, G.-S., Tasi, C.-C., Chang, N.-T.
2011-04
The influence of personal characteristics on helping behavior in virtual community.
Wu, Chin-Shan Cheng, Fei-Fei Yang, Yinlin Lee,Chia Jung and Chiu, Kailin.
;
吳金山
2010-07-20
Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks
Lin, H.-Y.a , Chiang, T.-C.b
Showing items 26-50 of 121. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback