English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4242399      Online Users : 736
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    碩士論文 [502/512]
    期刊論文 [279/437]
    專書 [0/4]
    國科會研究報告 [59/122]
    會議論文 [355/728]

    Sub-Community

    資訊工程學系碩士在職專班 [60/62]

    Community Statistics


    近3年內發表的文件:0(0.00%)
    含全文筆數:1255(67.29%)

    文件下載次數統計
    下載大於0次:1244(99.12%)
    下載大於100次:1200(95.62%)
    檔案下載總次數:488836(3.15%)

    最後更新時間: 2024-12-04 12:56

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 451-500 of 1865. (38 Page(s) Totally)
    << < 5 6 7 8 9 10 11 12 13 14 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2004-05-26 Grid computing in Taiwan?? Yang, C.-T., Chu, W.C.
    2007 A grid resource broker with network bandwidth-aware job scheduling for computational grids Yang C.-T., Chen S.-Y., Chen T.-T.
    2002 A Group Signature Scheme for Wireless Environment 林祝興; Lin, Chu-Hsing; Wang, H. W.; Lee, C. Y.
    2006-09-03 A Group-oriented (t, n) Threshold Signature Scheme Against Replay Attacks 林祝興; Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin and Jen-Chieh Chang
    2006-09-03 A group-oriented (t, n) threshold signature scheme against replay attacks?? Chou, J.-S., Lin, C.-H., Chiu, C.-H.
    1996 A Group-Oriented (t,n) Undeniable Signature Scheme without Trusted Center 林祝興; Lin, Chu-Hsing; Wang, C. T.; Chang, C. C.
    2001-09-13 Group-oriented Authenticated Encryption Based on Self-certified Public Keys 林祝興; Wang, C. T., C. C. Chang, and Chu-Hsing Lin
    2001-05-03 A Group-oriented Signature Scheme for Limited-bandwidth Devices in Wireless Environment 林祝興; Chu-Hsing Lin, and S. W. Wang
    1997-12 Group-oriented Threshold Signature Schemes with Traceable Signers 林祝興; Wang, C. T., C. C. Chang and Chu-Hsing Lin
    2009 Guest editorial: Special section on service-oriented distributed computing systems?? Bertino, E., Chu, W.C.-C.
    2014 Hadoop分散式檔案系統與Ceph效能比較 卓志遠; CHIH-YUAN CHO
    2011 Half century of coordinate metrology technology - Evolution and trends Shi, Z.-Y., Zhang, B., Lin, J.-C., Zhang, H.
    2013-10-28 A handover scheme for LTE wireless networks under the assistance of GPS Huang, Y.-S.; Leu, F.-Y.; Liu, J.-C.; Huang, Y.-L.; Chu, W.C.-C.
    2011-09 A Handover Security Mechanism Employing Diffie-Hellman Key Exchange Approach for IEEE802.16e Wireless Networks. Ciou, Yi-Fu, Leu, Fang-Yie,Huang, Yi-Li and Yim, Kangbin.; 呂芳懌
    2011-08 A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks Leu, Fang-Yie , Ciou, Yi-Fu and Huang, Yi-Li; 呂芳懌
    2011-08 A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks Leu, Fang-Yie , Ciou, Yi-Fu and Huang, Yi-Li; 呂芳懌
    2011-08-22 A handover security mechanism employing Diffie-Hellman PKDS for IEEE802.16e wireless networks? Leu, F.-Y., Ciou, Y.-F., Huang, Y.-L.
    2011 A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks?? Ciou, Y.-F., Leu, F.-Y., Huang, Y.-L., Yim, K.
    2009-03 A HDWT-based reversible data hiding method Chu, Yen-Ping; Chan, Yung-Kuan; Chen, Wen-Tang; Yu, Shyr-Shen; Ho, Yu-An; Tsai, Chwei-Shyong; 朱延平
    2009-12 HEp-2 Cell Classification in Indirect Immunofluorescence Images 黃育仁; T. Y. Hsieh, Y. C. Huang, C. W. Chung and Y. L. Huang
    2009-12-08 HEp-2 cell classification in indirect immunofluorescence images Hsieh, T.-Y.a , Huang, Y.-C.b , Chung, C.-W.b, Huang, Y.-L.b
    2009-12-08 HEp-2 cell classification in indirect immunofluorescence images Hsieh, T.-Y.a , Huang, Y.-C.b , Chung, C.-W.b, Huang, Y.-L.b
    2012-03-19 HEp-2 cell images classification based on textural and statistic features using self-organizing map Huang, Y.-C.a , Hsieh, T.-Y.b, Chang, C.-Y.a, Cheng, W.-T.a, Lin, Y.-C.a, Huang, Y.-L.
    2012-03-19 HEp-2 cell images classification based on textural and statistic features using self-organizing map Huang, Y.-C.a , Hsieh, T.-Y.b, Chang, C.-Y.a, Cheng, W.-T.a, Lin, Y.-C.a, Huang, Y.-L.
    2008 A heuristic data distribution scheme for data mining applications on grid environments Yang C.-T., Shih W.-C., Tseng S.-S.
    2009 A Heuristic Network Bandwidth Measurement with Domain-Based Model on Grids 楊朝棟; Chao-Tung Yang, Chih-Hao Lin and Shih-Chi Yu
    2009 A heuristic network bandwidth measurement with domain-based model on grids Yang C.-T., Lin C.-H., Yu S.-C.
    2010 A Heuristic QoS Measurement for Network Bandwidth on Grid Computing Environments 楊朝棟; Chao-Tung Yang, Chih-Hao Lin, and Wen-Jen Hu
    2010 A Heuristic QoS Measurement with Domain-based Network Information Model for Grid Computing Environments 楊朝棟; Chao-Tung Yang, Chih-Hao Lin, Ming-Feng Yang, and Wen-Chung Chiang
    2010 A heuristic QoS measurement with domain-based network information model for grid computing environments Yang C.-T., Lin C.-H., Yang M.-F., Chiang W.-C.
    2001-12 Hierarchical Key Assignment without Public-key Cryptography 林祝興; Lin, Chu-Hsing
    2001 Hierarchical key assignment without public-key cryptography Lin, C.-H.
    1992 Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems 林祝興; Lin, Chu-Hsing; Chang, C. C.; Lee, R. C. T.
    2009 A high capacity reversible data hiding scheme with edge prediction and difference expansion 朱延平; Wu, Sien-Chu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Ch and Hung-Ruei Chen
    2009-06 High-capacity reversible data hiding in binary image using pattern substitution Chu, Yen-Ping; Chan, Yung-Kuan Chan; Wu, Hsien-Chu; Ho, Yu-An; 朱延平
    2008 High-performance very large scale integration architecture design for various-ratio image scaling Lin, C.-C.a , Sheu, M.-H.a, Chiang, H.-K.a, Liaw, C.b
    2003-10-14 A host-based real-time intrusion detection system with data mining and forensic techniques?? Leu, F.-Y., Yang, T.-Y.
    1996-10-02 How to Converse Securely in a Conference 林祝興; Chang, C. C. and Chu-Hsing Lin
    2011 Hybrid CUDA, OpenMP, and MPI parallel programming on multicore GPU clusters Yang C.-T., Huang C.-L., Lin C.-F.
    2011-01 Hybrid CUDA, OpenMP, and MPI Parallel Programming on Multicore GPU Clusters. Yang, Chao-Tung, Huang, Chih-Lin and Lin, Cheng-Fang.; 楊朝棟
    2005 A hybrid parallel loop scheduling scheme on heterogeneous PC clusters Shih W.-C., Yang C.-T., Chen P.-I., Tseng S.-S.
    2010 Hybrid Parallel Programming on GPU Clusters 楊朝棟; Chao-Tung Yang, Chih-Lin Huang, Cheng-Fang Lin, and Tzu-Chieh Chang
    2010 Hybrid parallel programming on GPU clusters Yang C.-T., Huang C.-L., Lin C.-F., Chang T.-C.
    2008-04-24 I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks 林祝興; Chu-Hsing Lin, Wei-Shen Lai, Yen-Ling Hwang and Mei-Jean Chou
    2008 I-SEAD: A secure routing protocol for mobile Ad Hoc networks Lai, W.-S., Lin, C.-H., Liu, J.-C., Huang, Y.-L., Chou, M.-C.
    2008-04-24 I-SEAD: A secure routing protocol for mobile ad hoc networks?? Lin, C.-H., Lai, W.-S., Huang, Y.-L., Chou, M.-C.
    2015 iBeacon定位校正方法設計與實作 洪銘鴻; Ming-Hung Hung
    2014 ICT對於老人居家照護影響分析及貢獻 謝玉嬋; Cheah Yoke-Sim
    1991-10-01 An ID-based Signature Scheme Based Upon Rabin's Public Key Cryptosystem 林祝興; Chang, C. C. and Chu-Hsing Lin
    2013-06-19 Identifying phases of gait and development of walking model from pressure and accelerometer data and it's ramifications in elderly walking Kawsar, F.; Majumder, J.A.; Ahamed, S.I.; Chu, W.C.-C.

    Showing items 451-500 of 1865. (38 Page(s) Totally)
    << < 5 6 7 8 9 10 11 12 13 14 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback