English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4242899      在线人数 : 808
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    子类别

    碩士論文 [502/512]
    期刊論文 [279/437]
    專書 [0/4]
    國科會研究報告 [59/122]
    會議論文 [355/728]

    子社群

    資訊工程學系碩士在職專班 [60/62]

    社群统计


    近3年内发表的文件:0(0.00%)
    含全文笔数:1255(67.29%)

    文件下载次数统计
    下载大于0次:1244(99.12%)
    下载大于100次:1200(95.62%)
    全文下载总次数:488833(3.15%)

    最后更新时间: 2024-12-04 11:16

    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目601-650 / 1865. (共38页)
    << < 8 9 10 11 12 13 14 15 16 17 > >>
    每页显示[10|25|50]项目

    日期题名作者
    1998 Integrated Key Management Schemes for Multi-Level Access Control 林祝興; Chu-Hsing Lin
    2004-09-28 An integrated software development environment with XML internal representation Chang, C.-H., Chu, W.C., Lu, C.-W., Yang, D.-L.
    2003 Integrating diverse paradigms in evolution and maintenance by an XML-based unified model Lu, C.-W., Chu, W.C., Chang, C.-H., Yang, D.-L., Lian, W.-D.
    2005-03-28 Integrating Grid with intrusion detection?? Leu, F.-Y., Lin, J.-C., Li, M.-C., Yang, C.-T., Shih, P.-C.
    2009 The Integration of a Vision Based Tracking Platform, Visual Instruction and Error Analysis Models for an Efficient Billiard Training System 石志雄; Chihhsiong S. Shih, Tang-Kun Liu, Yuanfan Yang, Chu-Hsing Lin, Chieh-Hao Wan, Chorng-Shiuh Koong, William Cheng-Chung Chu
    2009 Integration of a vision-based tracking platform, visual instruction, and error analysis models for an efficient billiard training system Shih, C., Hsiung, P.-A., Wan, C.-H., Koong, C.-S., Liu, T.-K., Yang, Y., Lin, C.-H., Chu, W.C.-C.
    2009-02 Integration of a Vision-based Tracking Platform, Visual Instruction,and Error Analysis, Models for an Efficient Billiard Training System 林祝興; Shih, C. S.;Hsiung, P. A.;Wan, C. H.;Koong, C. S.;Liu, T. K.;Yang, Y. F.;Lin, Chu-Hsing;Chu, William C. C.
    2008 Integrity Protection of Binary Text Document Images Based on Image Topologies 林祝興; Lin, Chu-Hsing; Lin, Yu-Ying;Cheng, Lun-Yuen;Sandnes, Frode Eika
    2008 Integrity protection of binary text document images based on image topologies Lin, C.-H., Lin, Y.-Y., Sandnes, F.E.
    2007-09-05 Integrity Protection of Document Assets by Computing Skeletons 林祝興; Chu-Hsing Lin, Jue-Sam Chou, and Yu-Wen Chen
    2007-09-05 Integrity protection of document assets by computing skeletons?? Lin, C.-H., Chou, J.-S., Chen, Y.-W.
    1995-09-20 Intelligent system for biosignal processing circuit design Cheng, Kuo-sheng, Tsai, C.-T.
    1992-05-06 An Interactive Message Authentication Scheme 林祝興; Chu-Hsing Lin, C. C. Chang and R. C. T. Lee
    2008 Intra-Tumor Flow Index Can Predict the Malignant Potential of Breast Tumor: Dependent on Age and Volume Hsiao, Y.-H.a, Kuo, S.-J.b, Liang, W.-M.c, Huang, Y.-L.d, Chen, D.-R.
    2007-10-29 Intrusion detection and identification system using data mining and forensic techniques Leu, F.-Y., Hu, K.-W., Jiang, F.-C.
    2007 Intrusion detection based on grid Leu, F.-Y. , Li, M.-C. , Lin, J.-C.
    2006-08-01 Intrusion detection based on grid?? Leu, F.-Y., Li, M.-C., Lin, J.-C.
    2005-12-06 Intrusion detection with CUSUM for TCP-based DDoS? Leu, F.-Y., Yang, W.-J.
    2009 Intrusion detection, forecast and traceback against DDoS attacks 呂芳懌; Leu, Fang-Yie
    2009-12 Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time 林祝興; Chu-Hsing Lin, Chen-Yu Lee, Jung-Chun Liu, and Hao-Tian Zuo
    2009-12-01 Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time 劉榮春; Chu-Hsing Lin, Chen-Yu Lee, Jung-Chun Liu and Hao-Tian Zuo
    2009-12-04 Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Hao-Ting Zou
    Investigations of factors affecting the genetic algorithm for shortest driving time Lin, C.-H., Lee, C.-Y., Liu, J.-C., Zuo, H.-T.
    2009 Investigations of factors affecting the genetic algorithm for shortest driving time?? Lin, C.-H., Lee, C.-Y., Liu, J.-C., Zuo, H.-T.
    2008-04-24 IPS/UMS/WNGS/MUS 2008 workshop message from the workshop organizers MUE 2008 Yeo, S.-S.,?Park, J.H.,?Yang, L.T.,?Hussain, S.,?Lee, D.G.,?Chung, K.-I.,?Kim, H.J.,?Gritzalis, S.,?Kim, T.-H.h,?Ma, J.,?Hsu, C.-H.,?Jin, H.,?Chen, S.-C.,?Chao, H.-C.,?Yu, Z.,?Chang, H.,?Yang, C.-T.,?Mhamed, A.,?Botta, A.,?Rakotonirainy, A.,?Coronato, A.,?Pescape', A.,?Dadej, A.,?Abdulrazak, B.,?Lu, B.,?Cheng, B.-C.,?Koh, B.-S.,?Shin, D.M.,?Ko, E.-N.,?Jung, E.-S.,?De Pietro, G.,?Jeong, H.J.,?Ali, H.H.,?Ahn, H.,?Kamel, I.,?You, I.,?Veijalainen, J.,?Lee, J.ab,?Henricksen, K.,?Makki, K.,?Cho, K.,?Chou, L.-D.,Ciampi, M.,?Esposito, M.t,?Mokhtari, M.,?Park, M.-C.,?Sklavos, N.,?Zhang, N.,?Shi, Q.,?Aygun, R.S.,?Park, T.,?Yamazaki, T.,?Tabata, T.,?Huang, T.-C.,?Guangwen, Y.,?Kim, Y.-D.,?Juang, W.-S.,?Squicciarini, A.C.,?Jensen, C.S.,?Katsaros, D.,?Moro, G.,?Oh, H.S.,?Song, I.-Y.,?Han, J.W.,?Jim, T.
    2008-04-24 IPS/UMS/WNGS/MUS 2008 workshop message from the workshop organizers MUE 2008 Yeo, S.-S.,?Park, J.H.,?Yang, L.T.,?Hussain, S.,?Lee, D.G.,?Chung, K.-I.,?Kim, H.J.,?Gritzalis, S.,?Kim, T.-H.,?Ma, J.,?Hsu, C.-H.,?Jin, H.,?Chen, S.-C.,?Chao, H.-C.,?Yu, Z.,?Chang, H.,?Yang, C.-T.,?Mhamed, A.,?Botta, A.,?Rakotonirainy, A.,?Coronato, A.,?Pescape', A.,?Dadej, A.,?Abdulrazak, B.,?Lu, B.,?Cheng, B.-C.,?Koh, B.-S.,?Shin, D.M.,?Ko, E.-N.,?Jung, E.-S.,?De Pietro, G.,?Jeong, H.J.,?Ali, H.H.,?Ahn, H.,?Kamel, I.,?You, I.,?Veijalainen, J.,?Lee, J.,?Henricksen, K.,?Makki, K.,?Cho, K.ai,?Chou, L.-D.,?Ciampi, M.,?Esposito, M.,?Mokhtari, M.,?Park, M.-C.,?Sklavos, N.,?Zhang, N.,?Shi, Q.,?Aygun, R.S.,?Park, T.,?Yamazaki, T.,?Tabata, T.,?Huang, T.-C.ar,?Guangwen, Y.as,?Kim, Y.-D.,?Juang, W.-S.,?Squicciarini, A.C.,?Jensen, C.S.,?Katsaros, D.,?Moro, G.,?Oh, H.S.,?Song, I.-Y.,?Han, J.W.,?Jim, T.
    2012-11-12 The ipsec security problems and a cross-layer security mechanism for pmipv6 handover when an IPSec security association is established on an L2 direct link Leu, F.-Y., Huang, Y.-L., Chen, C.-N.
    2012-11-12 The ipsec security problems and a cross-layer security mechanism for pmipv6 handover when an IPSec security association is established on an L2 direct link?? Leu, F.-Y., Huang, Y.-L., Chen, C.-N.
    2006 ISO15504-BasedVerificationApproachforMiddle-ScaleOrganizations 陳俊淵; Chen, Chun-Yuan
    2004 JavaBeans程式碼再使用度量指標之研究 王士嘉; Wang, Shih-Chia
    2004 Java類別檔之數位浮水印研究 鄭仁賢
    2005 Java類別檔的數位浮水印研究 周忠信; Jwo, Jung-Sing
    2006 A jobs allocation strategy for multiple DRBL diskless Linux clusters with condor schedulers Yang C.-T., Chen P.-I., Chen S.-Y., Tung H.-Y.
    2013 Jumpstarting application lifecycle management: A new approach with tool support Jwo, J.-S.a, Hsu, T.-S.b, Cheng, Y.C.b
    2013 Jumpstarting application lifecycle management: A new approach with tool support Jwo, J.-S.; Hsu, T.-S.; Cheng, Y.C.
    2003 Keyed/Unkeyed SHA-2 林祝興; Lin, Chu-Hsing;Yeh, Y. S.;Lee, C. Y.
    2002 Keyed/Unkeyed SHA-2 林祝興; Chu-Hsing Lin and C. Y. Lee
    1995-05-06 Keys Minimization in Single-Key Access Control Schemes 林祝興; Jan, J. K., Chu-Hsing Lin and G. C. Lee
    2007-12-11 A layered optimization approach for redundant reader elimination in wireless RFID networks Hsu, C.-H., Chen, Y.-M., Yang, C.-T.
    2013 Learning to win in a first-person shooter game Liaw, C.a , Andrew Wang, W.-H.b, Lin, C.-C.a, Hsu, Y.-L.a
    2013 Learning to win in a first-person shooter game Liaw, C.; Andrew Wang, W.-H.; Lin, C.-C.; Hsu, Y.-L.
    2009 Left ventricular myocardial volumes measured during arterial and delayed phases of multidetector row computed tomography: A study on intra- and interobserver variability Tsai, I.-C.ab, Huang, Y.-L.c , Liao, W.-C.a, Kao, K.-H.c, Chen, M.-C.
    2011-04 Left Ventricular Myocardium Segmentation on Arterial Phase of Multi-detector Row Computed Tomography. 黃育仁
    2011-01 Left Ventricular Myocardium Segmentation on Delayed Phase of Multi-detector Row Computed Tomography 黃育仁
    2011-01 Left Ventricular Myocardium Segmentation on Delayed Phase of Multi-detector Row Computed Tomography 黃育仁
    2012 Left ventricular myocardium segmentation on delayed phase of multi-detector row computed tomography Tsai, I.-C.abc, Huang, Y.-L.d , Liu, P.-T.d, Chen, M.-C.a
    2007 Level set contouring for breast tumor in sonography Huang, Y.-L.a , Jiang, Y.-R.a, Chen, D.-R.c, Moon, W.K.
    2006 Level set segmentation for breast tumor in 2-D sonography Huang, Y.-L.a, Jiang, Y.-R.a, Chen, D.-R.b, Moon, W.-K.c
    2011 Lifetime elongation for wireless sensor network using queue-based approaches Jiang F.-C., Huang D.-C., Yang C.-T., Leu F.-Y.
    2011-01 Lifetime Elongation for Wireless Sensor Network using Queue-based Approaches. Jiang, Fuu-Cheng, Huang, Der-Chen, Yang, Chao-Tung and Leu, Fang-Yi.; 呂芳懌

    显示项目601-650 / 1865. (共38页)
    << < 8 9 10 11 12 13 14 15 16 17 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈