English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4243280      Online Users : 734
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Master's Theses [101/101]
    Periodical Articles [78/111]
    Books [0/1]
    National Research Council Report [14/30]
    Conference Papers [67/121]

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:260(71.43%)

    Download counts of the item
    Download times greater than 0:259(99.62%)
    Download times greater than 100:226(86.92%)
    Total Bitstream Download Counts:101717(0.65%)

    Last Update: 2024-12-04 08:21

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1-50 of 364. (8 Page(s) Totally)
    1 2 3 4 5 6 7 8 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2009 3D互動式語言課後實習與情境式學習模組之?差模型 張嘉?、姜自強、?東平、黃惠敏
    2008-01-02 Access control in user hierarchy based on elliptic curve cryptosystem Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S.
    2006 Adapted DP based algorithm with distance-based approach in ad hoc networks Chiang, T.-C.ab , Jiunn-Yin, J.L.a , Huang, Y.-M.a
    2009 Adaptive and intelligent path discovery on-demand for wireless networks using service composition Lin, C.-L.a , Hou, T.-W.a , Chiang, T.-C.ab , Tai, C.-F.a
    2006-05-28 Adaptive clustering with virtual subnets support in ad hoc networks Chiang, T.-C.ab , Tsai, M.-H.c , Huang, Y.-M.
    2006-09-03 Adaptive power-A ware clustering and multicasting protocol for mobile ad hoc networks Leu, J.J.Y.a, Tsai, M.-H.a, Chiang, T.-C.b, Huang, Y.-M.
    2009 Adaptive two-way uniform partition for multicast routing problem with separate paths in ad hoc networks Chiang, T.-C. , Tai, C.-F. , Hou, T.-W.
    2009 An Agent-Based English Auction Protocol Using Elliptic Curve Cryptosystem for Mobile Commerce 陳澤雄; Chung, Y. F., T. S. Chen, Y. T. Chen, C. C. Lee and S. W. Wang
    2009-06-08 An agent-based english auction protocol using elliptic curve cryptosystem for mobile commerce Chung, Y.-F.a , Chen, T.-S.b, Chen, Y.-T.b, Lee, C.-C.b, Wang, S.-W.
    2011 An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce Chung, Y.-F.a , Chen, Y.-T.b, Chen, T.-L.c, Chen, T.-S.
    2013 Animating civic education: Developing a knowledge navigation system using blogging and topic map technology Huang, T.-C.; Chen, C.-C.
    2006-10-08 Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem?? Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
    2011 Application of FES for hemiplegia in extremity coordination training Chou, C.H.a, Chen, S.b, Hwang, Y.S.a, Ho, C.S.d, Chen, C.C.b, Chen, S.C.c, Chen, Y.L.d
    2009 Applying semantic social tagging to improve the quality of content search. Huang, S.L., Lin, S.C. and Chan, Y.C; 林盛程
    2007 Assessment of effectiveness of web-based training on demand Liu, C.-H., Chiang, T.-C., Huang, Y.-M.
    2008 The atmospheric factors of online storefront environment design: An empirical experiment in Taiwan Wu, C.-S., Cheng, F.-F., Yen, D.C.
    2012 An authentication scheme to healthcare security under wireless sensor networks Hsiao, T.-C.a , Liao, Y.-T.b , Huang, J.-Y.c , Chen, T.-S.c , Horng, G.-B.
    2011 An auxiliary unicode Han character lookup service based on glyph shape similarity Lin, J.-W.a , Lin, F.-S.b
    2012-11-02 Bed site health care video-phone system Chung, Y.-F.; Tsai, M.-Y.; Wu, E.-P.; Chiang, D.-L.; Lee, C.-C.; Hsiao, T.-C.; Chen, T.-S.
    2010 Bio-signal analysis system design with support vector machines based on cloud computing service architecture Shen, C.-P.a , Chen, W.-H.a , Chen, J.-M.b, Hsu, K.-P.a, Lin, J.-W.c, Chiu, M.-J.d, Chen, C.-H.a, Lai, F.a
    2010 Bio-signal analysis system design with support vector machines based on cloud computing service architecture. Shen, C.P., Chen, W.H., Chen, J.M., Hsu, K.P., Lin, J.W., Chiu, M.J., Chen, C.H., Lai, F.
    2010-09 Bio-signal Analysis System Design with Support Vector Machines based on Cloud Computing Service. Architecture. Shen, Chia-Ping, Chen, Wei-Hsin, Chen, Jia-Ming, Hsu, Kai-Ping, Lin, Jeng-Wei, Chiu, Ming-Jang and Lai, Feipei.; 林正偉
    2011 A blind signature based on discrete logarithm problem Shen, V.R.L.a , Chung, Y.F.b , Chen, T.S.c , Lin, Y.A
    2009-08-25 A blind signature scheme based on elliptic curve cryptosystem Jeng, F.-G.a , Chen, T.-L.b , Chen, T.-S.
    2009 A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. Jeng, F.G., Chen, T.L. and Chen, T.S.; 陳澤雄
    2008 Broadcast scheduling for a P2P spanning tree ( Conference Paper ) Lin, J.-W.
    2011-04 A Classification Framework of Internet Rumors. Cheng, Fei-Fei and Wu, Chin-Shan .; 吳金山
    2013-07-03 Classification of schizophrenia using Genetic Algorithm-Support Vector Machine (GA-SVM) Hiesh, M.-H.; Lam, Andy, Y.-Y.; Shen, C.-P.; Chen, W.; Lin, F.-S.; Sung, H.-Y.; Lin, J.-W.; Chiu, M.-J.; Lai, F.
    2011-03 A Comparison of Thailand and Taiwan Bottled Tea Markets Based on Consumption Values Theory. Cheng, Fei-Fei, Wu, Chin-Shan and Paranee Pihakaendr.; 吳金山
    2009 A Conference Key Agreement Protocol with Fault-tolerant Capability Huang , K. H., Y. F. Chung, C. H. Liu, F. P. Lai and T. S. Chen; 陳澤雄
    2009 A conference key agreement protocol with fault-tolerant capability Huang, K.-H., Chung, Y.-F., Lee, H.-H., Lai, F., Chen, T.-S.
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009-09-20 Cooperative secure data aggregation in sensor networks using elliptic curve based cryptosystems Lin, H.-Y.a , Chiang, T.-C.b
    2009 Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. Hua, Yi Lin and Chiang, Tzu-Chiang.; 姜自強
    2010 Corrigendum to "Knowledge sharing and creation in a teachers' professional virtual community" [Computers & Education 50 (2008) 742-756] (DOI:10.1016/j.compedu.2006.07.009) Lin, F.-r.a , Lin, S.-c.b, Huang, T.-p.c
    2009 Cross Platform Layer for Public Key Infrastructure Interoperability Chung, Y. F., T. S. Chen and H. F. Chen; 陳澤雄
    2010 Debiasing the framing effect: the effect of warning and involvement 吳金山; Cheng F. F. and Wu, C. S.
    2010 Debiasing the framing effect: The effect of warning and involvement Cheng, F.-F., Wu, C.-S.
    2011 The design of id-based access control system with time-sensitive key for mobile agent's migration Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D
    2011-07 Designing an Expert Location System Combing Semantic Similarly and Social Capital. Huang, Shiu-li, Hsieh, Ren-jie and Lin, Sheng-cheng; 林盛程
    2008 Determinants Affecting Consumer Adoption of Contactless Credit Card: An Empirical Study 林盛程; Wang, Y. M. and S. C. Lin
    2010 Determinants of users' intention to adopt wireless technology: an empirical study by integrating TTF with TAM 吳金山; Yen, D. C., Wu, C. S., Cheng, F. F. and Huang, Y. W
    2010 Determinants of users' intention to adopt wireless technology: An empirical study by integrating TTF with TAM Yen, D.C., Wu, C.-S., Cheng, F.-F., Huang, Y.-W.
    2004-07 Digital multi-signature scheme based on the elliptic curve cryptosystem Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2002-10-28 Digital signature scheme resulted from identification: Protocol by elliptic curve cryptosystem? Chen, T.-S., Huang, G.-S., Liu, T.-P., Chung, Y.-F.
    2010 Digital skating board with RFID technique for upper extremity rehabilitation Chen, C.-C.a, Lin, J.-C.b, Chou, C.-H.c, Shih, Y.-Y.d, Chen, Y.-L.
    2011 A distributed multicast protocol with location-aware for mobile ad-hoc networks Chiang, T.-C.a , Chang, J.-L.b, Lin, S.-W.a
    2004-03-28 A division-of-labor-signature (t, n) threshold-authenticated encryption scheme with message linkage based on the elliptic curve cryptosystem?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2012 Dual function seal: Visualized digital signature for electronic medical record systems Yu, Y.-C.a , Hou, T.-W.ab , Chiang, T.-C.c
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c

    Showing items 1-50 of 364. (8 Page(s) Totally)
    1 2 3 4 5 6 7 8 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback