Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4247773      在线人数 : 419
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    子类别

    碩士論文 [502/512]
    期刊論文 [279/437]
    專書 [0/4]
    國科會研究報告 [59/122]
    會議論文 [355/728]

    子社群

    資訊工程學系碩士在職專班 [60/62]

    社群统计


    近3年内发表的文件:0(0.00%)
    含全文笔数:1255(67.29%)

    文件下载次数统计
    下载大于0次:1244(99.12%)
    下载大于100次:1201(95.70%)
    全文下载总次数:489097(3.15%)

    最后更新时间: 2024-12-04 23:25

    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目1-50 / 1865. (共38页)
    1 2 3 4 5 6 7 8 9 10 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2010 3-D乳房超音波影像區域成長乳房腫瘤輪廓描繪 張順展; Chang, Shun-Chan
    2008 3-D能量都卜勒乳房超音波影像的血管化特徵電腦輔助診斷之研究 許嘉家; Hsu, Chia-Chia
    2016 3D印表機輔助教學:以魚菜共生主題教學為例 高志贀; KAO,CHIH-HSIEN
    2011-06-07 An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication Jenq, Fenq-Lin, Liu, Tang-Jen and Leu, Fang-Yie; 呂芳懌
    2011-06-07 An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication Jenq, Fenq-Lin, Liu, Tang-Jen and Leu, Fang-Yie; 呂芳懌
    2011-06-30 An AC LED smart lighting system with visible light time-division multiplexing free space optical communication? Jenq, F.-L., Liu, T.-J., Leu, F.-Y.
    2009-08 Access Log Generator for Analyzing Malicious Website Browsing Behaviors 林祝興; Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
    2009-08-01 Access Log Generator for Analyzing Malicious Website Browsing Behaviors 劉榮春; Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
    2009-08-18 Access Log Generator for Analyzing Malicious Website Browsing Behaviors 林祝興; Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen
    Access log generator for analyzing malicious website browsing behaviors Lin, C.-H., Liu, J.-C., Chen, C.-R.
    2009 Access log generator for analyzing malicious website browsing behaviors?? Lin, C.-H., Liu, J.-C., Chen, C.-R.
    1988 An Adaptive Approach to Quantization for Video Image Compression 林祝興; Chen, W. T., Chu-Hsing Lin and W. C. Hwang
    2008-06-11 Adaptive automatic segmentation of HEp-2 cells in indirect immunofluorescence images Huang, Y.-L.a , Jao, Y.-L.a, Hsieh, T.-Y.b, Chung, C.-W.a
    2010 An Adaptive Job Allocation Strategy for Heterogeneous Multi-Cluster Systems 楊朝棟; Chao-Tung Yang, Keng-Yi Chou, and Kuan-Chou Lai
    2010 An adaptive job allocation strategy for heterogeneous multi-cluster systems Yang C.-T., Chou K.-Y., Lai K.-C.
    2009 An Adaptive Job Allocation Strategy for Heterogeneous Multiple Clusters 楊朝棟; Chao-Tung Yang and Keng-Yi Chou
    2009 An adaptive job allocation strategy for heterogeneous multiple clusters Yang C.-T., Chou K.-Y.
    2011-09-13 Adaptive performance monitoring for embedded multicore systems Shih, C.-Y.,?Li, M.-C.,?Lin, C.-S.,?Hsiung, P.-A.?,?Chang, C.-H.,?Chu, W.C.,?Hsueh, N.-L.,?Shih, C.,?Yang, C.-T.,?Koong, C.-S.
    2011 Adaptive performance monitoring for embedded multicore systems Shih C.-Y., Li M.-C., Lin C.-S., Hsiung P.-A., Chang C.-H., Chu W.C., Hsueh N.-L., Shih C., Yang C.-T., Koong C.-S.
    2013 Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments Wang, W.-J.; Chang, Y.-S.; Lo, W.-T.; Lee, Y.-K.
    2010-12 An advanced password authenticated key exchange protocol for imbalanced wireless networks. Lo, J.W., Hwang, M.S., Lee, J.Z. and Chu, Y.P.; 朱延平
    2014 AES演算法在GPU平行化環境效能分析 胡總傳; Hu Tsung-Chuan
    2009 Agent-Based Control Framework for Mass Customization Manufacturing With UHF RFID Technology 周忠信; M. Tu, J. Lin, R. Chen, K. Chen, and J. Jwo
    2009 Agent-based control framework for mass customization manufacturing With UHF RFID technology Tu, M.ab , Lin, J.-H.c , Chen, R.-S.d , Chen, K.-Y.e , Jwo, J.-S.f
    2004 Agent-Based Web Learning System Applying Dynamic Fuzzy Petri Net Huang, Y.-M., Chen, J.-N., Cheng, S.-C., Chu, W.C.
    2004-11-30 Agent-based Web services evolution for pervasive computing Liu, R., Chen, F., Yang, H., Chu, W.C., Lai, Y.-B.
    2011 An AHP-based recommendation system for exclusive or specialty stores Nguyen, H.D. , Lo, W.-T. , Sheu, R.-K.
    2010 Aiming strategy error analysis and verification of a billiard training system 石志雄; Chihhsiong Shih
    2010 Aiming strategy error analysis and verification of a billiard training system Shih, C.
    2010 Aiming strategy error analysis and verification of a billiard training system Shih, C.
    2013 Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN Chen, J.I.-Z.; Lin, C.-H.
    2013 Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN? Chen, J.I.-Z.,?Lin, C.-H.
    1986-08 Algorithms to Allocate A File for Concurrent Disk Accessing 林祝興; Chang, C. C., M. D. Hsiao and Chu-Hsing Lin
    2009-12 Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, and Chi Lo
    2009-12-01 Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks 劉榮春; Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, and Chi Lo
    2010 Analysis of Priority Queue-Based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks 劉榮春; Chu-Hsing Lin, Jung-Chun Liu, and Chien-Ting Kuo
    2009-12-10 Analysis of Priority Queue-based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo
    2009 Analysis of priority queue-based scheme to alleviate malicious flows from distributed dos attacks Lin, C.-H., Liu, J.-C., Kuo, C.-T., Lo, C.
    2009 Analysis of priority queue-based scheme to alleviate malicious flows from distributed dos attacks?? Lin, C.-H., Liu, J.-C., Kuo, C.-T., Lo, C.
    2002 Analytical study on junction detection Lee, J.-S., Lin, J.-S., Tsai, C.-T., Chen, D.-H.
    2013 ANALYZING AND COMPARING SHOT PLANNING STRATEGIES AND THEIR EFFECTS ON THE PERFORMANCE OF AN AUGMENT REALITY BASED BILLIARD TRAINING SYSTEM Shih, C.
    2013 Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure Lin, J.-C.; Leu, F.-Y.; Chen, Y.-P.
    2013-09-02 Analyzing the Internet stability in presence of disasters Palmieri, F.; Fiore, U.; Castiglione, A.; Leu, F.-Y.; De Santis, A.
    2001 An annealed chaotic competitive learning network with nonlinear self-feedback and its application in edge detection Lin, J.-S., Tsai, C.-T., Lee, J.-S.
    2008-04-24 Anomaly Detection Using LibSVM Training Tools 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Chia-Han Ho
    2008 Anomaly detection using LibSVM training tools Liu, J.-C., Lin, C.-H., Yu, J.-L., Lai, W.-S., Ho, C.-H.
    Anomaly detection using LibSVM training tools Lin, C.-H., Liu, J.-C., Ho, C.-H.
    2008-04-24 Anomaly detection using LibSVM training tools?? Lin, C.-H., Liu, J.-C., Ho, C.-H.
    2009 Anticipative Inquiry Scheme for Efficient RFID Tag Identification Ching-Hsien Hsu, Bo-Yu Chen and Chao-Tung Yang; 楊朝棟
    2009-06-04 Anticipative Inquiry Scheme for efficient RFID tag identification Hsu, C.-H., Chen, B.-Y., Yang, C.-T.

    显示项目1-50 / 1865. (共38页)
    1 2 3 4 5 6 7 8 9 10 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈