English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238299      Online Users : 373
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    碩士論文 [502/512]
    期刊論文 [279/437]
    專書 [0/4]
    國科會研究報告 [59/122]
    會議論文 [355/728]

    Sub-Community

    資訊工程學系碩士在職專班 [60/62]

    Community Statistics


    近3年內發表的文件:0(0.00%)
    含全文筆數:1255(67.29%)

    文件下載次數統計
    下載大於0次:1243(99.04%)
    下載大於100次:1200(95.62%)
    檔案下載總次數:488419(3.14%)

    最後更新時間: 2024-12-03 22:34

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1076-1100 of 1865. (75 Page(s) Totally)
    << < 39 40 41 42 43 44 45 46 47 48 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1998-06 Threshold Signature Schemes with Traceable Signers in Group Communications 林祝興; Wang, C. T., Chu-Hsing Lin and C. C. Chang
    1998-06-25 Threshold signature schemes with traceable signers in group communications Wang, C.-T., Lin, C.-H., Chang, C.-C.
    2013 Toward green sensor field by optimizing power efficiency using D-policy MG1 queuing systems Jiang, F.-C.; Wu, H.-W.; Leu, F.-Y.; Yang, C.-T.
    2013 Toward sustainable sensor field by greener technique of optimization with queue-based approach Jiang, F.-C.; Leu, F.-Y.; Wu, H.-W.; Hsu, C.-H.; Chu, W.C.-C.
    2012 Traffic load analysis and its application to enhancing longevity on IEEE 802.15.4/ZigBee Sensor Network Jiang F.-C., Wu H.-W., Yang C.-T.
    2007-07-08 A transmission cost model of data retrieval from a cluster system on an one node one-fragment, one-node one-task and random allocation environment using no global directory?? Leu, F.-Y., Lee, K.-W.
    2009-06-01 A Transpositional Advanced Encryption Standard (AES) Resists 3-round Square Attack 林祝興; Yeh, Yi-Shiung;Lee, Chen-Yu;Huang, Ting-Yu;Lin,Chu-Hsing
    2009 A transpositional advanced encryption standard (aes) resists 3-round square attack Yeh, Y.S., Lee, Y.-Y., Huang, T.Y., Lin, C.H.
    2013-07-03 A true random-number encryption method Huang, Y.-L.; Leu, F.-Y.; Chen, J.-H.; Chu, C.-C.; Yang, C.-T.
    2013-07-03 TSR: Topology reduction from tree to star data grids Lee, M.-C.; Leu, F.-Y.; Chen, Y.-P.
    2005-10-13 The two-level quantization strategy of quadratic Hebbian-type associative memories Liaw, C., Tsai, C.-T., Ko, C.-H.
    2001 Types of software evolution and software maintenance Li, Y., Yang, H., Chu, W.
    2003 UDIDT下之多階段入侵偵測系統 鄭真真; Jeng, Jen-Jen
    2003 UDIDT下建構於安全機制之入侵追蹤系統 洪嘉鴻; Hong, Chia-Hong
    2011-06 Ultrasonic vascularization evaluation in breast cancer with neo-adjuvant chemotherapy 黃育仁
    2011-06 Ultrasonic vascularization evaluation in breast cancer with neo-adjuvant chemotherapy 黃育仁
    2013-07-22 An UML behavior diagram based automatic testing approach Chang, C.-H.; Lu, C.-W.; Chu, W.C.; Huang, X.-H.; Xu, D.; Hsu, T.-C.; Lai, Y.-B.
    2001 UMPAL: An unstructured mesh partitioner and load balancer on World Wide Web Chu, W.C., Yang, D.-L., Yu, J.-C., Chung, Y.-C.
    1997-03 An Undeniable Signature Scheme Against Replay Attacks 林祝興; Lin, Chu-Hsing; Wu, W. C.
    2011-12-08 Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction 林祝興; Chu-Hsing Lin, Chen-Yu Lee, Shu-Yuan Lu, and Shih-Pei Chien
    2011 Unseen visible watermarking for gray level images based on gamma correction Lin, C.-H., Lee, C.-Y., Lu, S.-Y., Chien, S.-P.
    2012 Unseen Visible Watermarking for Gray Level Images Based on Saturation Correction 林祝興; Lin, Chu-Hsing;Lee, Chen-Yu;Lu, Shu-Yuan;Chen, Deng-Jyi
    2011-06 Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks Lin, C.H., Liu, J.C. , Chen, G.H., Chen, Y.H. and Huang, C.H.; 劉榮春
    2011-06 Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS Attacks Lin, C.H., Liu, J.C. , Chen, G.H., Chen, Y.H. and Huang, C.H.; 劉榮春
    2011-06-30 Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS attacks 林祝興; Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, and Chien-Hua Huang

    Showing items 1076-1100 of 1865. (75 Page(s) Totally)
    << < 39 40 41 42 43 44 45 46 47 48 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback