English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4237870      Online Users : 396
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Master's Theses [502/512]
    Periodical Articles [279/437]
    Books [0/4]
    National Research Council Research Report [59/122]
    Conference Papers [355/728]

    Sub-Community

    Graduate Program in Computer Science and Information Engineering for Professionals [60/62]

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:1255(67.29%)

    Download counts of the item
    Download times greater than 0:1243(99.04%)
    Download times greater than 100:1200(95.62%)
    Total Bitstream Download Counts:488412(3.14%)

    Last Update: 2024-12-03 20:21

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 576-600 of 1865. (75 Page(s) Totally)
    << < 19 20 21 22 23 24 25 26 27 28 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2010 Improving Reliability of a Heterogeneous Grid-based Intrusion Detection Platform using Levels of Redundancies 楊朝棟; Fang-Yie Leu, Chao-Tung Yang, Fuu-Cheng Jiang
    2010-04 Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies Leu, F.-Y., Yang, C.-T., Jiang, F.-C.
    2012-12-03 Improving security level of LTE authentication and key agreement procedure Leu, F.-Y., You, I., Huang, Y.-L., Yim, K., Dai, C.-R.
    2012-12-03 Improving security level of LTE authentication and key agreement procedure?? Leu, F.-Y., You, I., Huang, Y.-L., Yim, K., Dai, C.-R.
    2010-02 Improving security levels of IEEE802.16e authentication by involving Diffie-Hellman PKDS 呂芳懌; Leu, Fang-Yie , Yi-Fung Huang, Chao-Hong Chiu
    2010-02-01 Improving security levels of IEEE802.16e authentication by Involving Diffie-Hellman PKDS 黃宜豊; Leu, Fang-Yie, Yi-Fung Huang, Chao-Hong Chiu
    2011 Improving security levels of IEEE802.16e authentication by involving Diffie-Hellman PKDs Huang, Y.-L., Leu, F.-Y., Chiu, C.-H., Lin, I.
    2010-02-15 Improving security levels of IEEE802.16e authentication by involving diffie-hellman PKDS? Leu, F.-Y., Huang, Y.-F., Chiu, C.-H.
    2004-06-10 Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing 林祝興; Chu-Hsing Lin, K. J. Huang and H. H. Lin
    2008-07-14 Improving software integration from requirement process with a model-based object-oriented approach? Chang, C.-H., Lu, C.-W., Chu, W.C.
    2010 Incremental Digital Content Object Delivering in Distributed Systems 朱正忠; Chen Lung-Pin, I-Chen Wu, C.W. Chu, Jhen-You Hong, and Meng-Yuan Ho
    2010 Incremental digital content object delivering in distributed systems 陳隆彬; Chen Lung-Pin, I-Chen Wu, William Chu, Jhen-You Hong and Meng-Yuan Ho
    2010 Incremental digital content object delivering in distributed systems Chen, L.P., Wu, I.-C., Chu, W., Hong, J.-Y., Ho, M.-Y.
    2011-12-08 An Indoor Location-Aware System Based on Rotation Sampling in Positioning 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Chien-Hsing Lee, and Tang-Wei Wu
    2011 An indoor location-aware system based on rotation sampling in positioning Lin, C.-H., Liu, J.-C., Lee, C.-H., Wu, T.-W.
    2003-10-05 Infinite Generating Keys Based on Public System 林祝興; Y. F. Huang, K.L. Wen, R. H. Hsu, and Chu-Hsing Lin
    2006 A information monitoring and job scheduling system for multiple linux PC clusters Yang C.-T., Liao C.-S., Chen P.-I., Tung H.-Y.
    1988-12 An Information Secure Broadcasting Scheme Based upon Galosis Field Algebra 林祝興; Chang, C. C. and Chu-Hsing Lin
    2009 An inner and incoming intrusion detection and remote protection system 呂芳懌; Leu, Fang-Yie
    2009 An Inner DoS/DdoS Attack Detection System. Fang-Yie Leu and Zhi-Yang Li; 呂芳懌
    2009 The input/output constrained control for v/stol aircraft dynamics under a descriptor system formulation Chen, P.-C., Chiang, C.-H., Liu, J.-C.
    2010-09-05 Inspection of spatial cams using coordinate measuring machine Lin, J. , Tang, L., Shi, Z.
    1996-10-02 Integrated authentication Based on Identities 林祝興; Chu-Hsing Lin and C. T. Wang
    1996-10-02 Integrated authentications based on identities?? Lin, Chu-Hsing, Wang, Ching-Te
    2012-08-27 An integrated development environment to support the multi-core embedded systems development Chang, C.-H., Lu, C.-W., Chu, W.C., Hsiung, P.-A., Hsueh, N.-L., Koong, C.-S., Yang, C.-T.

    Showing items 576-600 of 1865. (75 Page(s) Totally)
    << < 19 20 21 22 23 24 25 26 27 28 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback