English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4237968      Online Users : 430
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    Siblings


    國際企業管理碩士學位學程 [2/2]
    管理學院 [113/113]
    企業管理學系所 [1141/1436]
    國際經營與貿易學系所 [322/513]
    會計學系所 [302/363]
    統計學系所 [365/493]
    財務金融學系所 [327/434]
    高階經營管理碩士在職專班 [713/724]
    企業管理學系碩士在職專班 [65/69]

    Community Statistics


    近3年內發表的文件:0(0.00%)
    含全文筆數:260(71.43%)

    文件下載次數統計
    下載大於0次:259(99.62%)
    下載大於100次:226(86.92%)
    檔案下載總次數:101515(0.65%)

    最後更新時間: 2024-12-03 19:35

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 126-150 of 364. (15 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2011 A Mobile Agent Approach for Secure Integrated Medical Information Systems Liu, C.-H.a , Chung, Y.-F.b , Chiang, T.-W.c , Chen, T.-S.d , Wang, S.-D.a
    2004-11-25 Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2004-03-28 Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme?? Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2009 Multi-tree broadcast in peer-to-peer networks Lin, J.-W.
    2004-03-29 Multicast routing representation in Ad Hoc networks using fuzzy Petri nets Chiang, T.-C. , Huang, Y.-M.
    2012 A multiclass classification tool using cloud computing architecture Shen, C.-P.a , Liu, C.-H.a, Lin, F.-S.d, Lin, H.b, Huang, C.-Y.F.e, Kao, C.-Y.ac, Lai, F.ac, Lin, J.-W.f
    2006-04-18 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Liu, C.-H.a , Chiang, T.-C.b , Huang, Y.-M.a
    2007 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Chiang, T.-C., Liu, C.-H., Huang, Y.-M.
    2011-02 New Heuristics for Solving the Economic lot Scheduling Problem with Reworks. Chang, Yu-Jen and Chang, M.-J.; 張育仁
    2009 A Novel Application of Grey System Theory to Information Security Shen, R. L.,Y. F. Chung and T. S. Chen; 陳澤雄
    2008 A Novel Approach to Enhance the Synthetic Aperture Imaging 謝新銘、余心淳、許郁清
    2009 Novel control for ambulation function restoration in a non-invasive functional electrical stimulation system Hsieh, J.-C.a, Chen, C.-C.a, Chen, S.-C.b, Chen, Y.-L.c, Li, Y.-C.d, Shih, Y.-Y.d, Kuo, T.-S.d
    2005-11-05 A novel cryptosystem based on grey system theory and genetic algorithm Shen, V.R.L., Chen, T.-S., Shai, K.-Q.
    2002-10 A novel cryptosystem with lock generation and sum-difference replacement ladder Shen, V.R.L., Chen, T.-S.
    2010 Novel design of interactive caption and recognition postures within the wearable and non-vision system over wireless sensor network Huang, W.T.a , Hung, C.N.b , Tuan, C.C.b , Chen, C.C.c , Chang, Y.J.c , Chen, Y.Y.d
    2007-08 A novel elliptic curve dynamic access control system Wen, J.-H., Wu, M.-C., Chen, T.-S.
    2006-11-03 A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery?? Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S.
    2006-10-03 A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery?? Wu, Z.Y., Jeng, F.G., Chen, T.S.
    2006-08-16 A novel key management and access control scheme for mobile agent?? Pan, J.-Y., Chen, T.-L., Chen, T.-S.
    2005-03-04 A novel key management scheme for dynamic access control in a user hierarchy Chen, T.-S., Huang, J.-Y.
    2004-09-28 A novel key management scheme for dynamic access control in a user hierarchy?? Chen, T.-S., Chung, Y.-F., Tian, C.-S.
    2007 A novel non-repudiable threshold proxy signature scheme Zhang, Z., Jiang, H., Xu, Q.-L., Chen, T.-S.
    2010-03-17 A novel time-bound hierarchical key assignment scheme for mobile agent Liu, C.-H.a, Chung, Y.-F.b, Jhuo, J.-D.c, Chen, T.-S.c , Wang, S.-D.a
    2010 A novel time-bound hierarchical key assignment scheme for mobile agent. Liu, C.H., Chung, Y.F., Jhuo, J.D., Chen, T.S. Wang, S.D.; 陳澤雄
    2005-12-06 On scalability and mobility management of hierarchical large-scale ad hoc networks Tsai, M.-H.b , Chiang, T.-C.ac , Huang, Y.-M.

    Showing items 126-150 of 364. (15 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback