English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4237802      Online Users : 339
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    Siblings


    國際企業管理碩士學位學程 [2/2]
    管理學院 [113/113]
    企業管理學系所 [1141/1436]
    國際經營與貿易學系所 [322/513]
    會計學系所 [302/363]
    統計學系所 [365/493]
    財務金融學系所 [327/434]
    高階經營管理碩士在職專班 [713/724]
    企業管理學系碩士在職專班 [65/69]

    Community Statistics


    近3年內發表的文件:0(0.00%)
    含全文筆數:260(71.43%)

    文件下載次數統計
    下載大於0次:259(99.62%)
    下載大於100次:226(86.92%)
    檔案下載總次數:101515(0.65%)

    最後更新時間: 2024-12-03 19:35

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 176-200 of 364. (15 Page(s) Totally)
    << < 3 4 5 6 7 8 9 10 11 12 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2009 Seismic image reconstruction based on an approach of prior knowledge. Shieh, H. M., Yu, H. C., Hsu, Y. C. and Ye, M. C.; 余心淳
    2003-08-27 A Sequence and Topology encoding for Multicast Protocol (STMP) in Wireless Ad Hoc Networks Huang, Y.-M.a, Chiang, T.-C.b
    2008 Solving the Economic Lot Scheduling Problem with Identical Facilities in Parallel Using Genetic Algorithms 張育仁、姚銘忠
    2004-11 A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2010-12-17 The study of secure agent-based scheme on health information systems Chen, T.-L. , Cheng, S.-H., Liu, C.-H., Fang, T.-Y., Chen, T.-S., Chen, C.-S.
    2010-12 The Study of Secure Agent-based Scheme on Health Information Systems. Chen,T. L., Cheng, S. H., Liu, C. H., Fang, T.Y., Chen, T. S. and Chen, C. S.; 陳澤雄
    2012 A study on efficient group-oriented signature schemes for realistic application environment Chung, Y.-F.a , Chen, T.-L.b , Chen, T.-S.c , Chen, C.-S.
    2012 The study on general secure multi-party computation Chung, Y.-F.a , Chen, T.-L.b , Chen, C.-S.c , Chen, T.-S.d
    2009 Threshold Authenticated Encryption Scheme Using Labor-division Signature Chung, Y. F., K. H. Huang and T. S. Chen; 陳澤雄
    2009-02 Threshold authenticated encryption scheme using labor-division signature Chung, Y.F., Huang, K.H., Chen, T.S.
    2005 A threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2006-12-04 Threshold signature scheme resistible for conspiracy attack?? Chung, Y.F., Liu, C.-H., Lai, F., Chen, T.-S.
    2004 A traceable proxy multisignature scheme based on the elliptic curve cryptosystem Chen, T.-S., Chung, Y.-F., Huang, K.-H.
    2013-11-10 Ultra-fast epileptic seizure detection using EMD based on multichannel electroencephalogram Chen, W.; Lam, Y.-Y.; Shen, C.-P.; Sung, H.-Y.; Lin, J.-W.; Chiu, M.-J.; Lai, F.
    2008-04-15 Unconditionally secure cryptosystems based on quantum cryptography Chung, Y.F., Wu, Z.Y., Chen, T.S.
    2012 Unicode han character lookup service based on similar radicals Lin, J.-W.a , Lin, F.-S.b
    2011-01 Unicode電腦漢字及異體字研究 附字典 袁國華、林正偉、詹今慧、趙苑夙
    2009 《Unicode電腦漢字異體字字典》編纂過程所遭遇的困難和解決方法 袁國華、林正偉、詹今慧、趙苑夙
    2011 User acceptance of wireless technology in organizations: A comparison of alternative models Wu, C.-S., Cheng, F.-F., Yen, D.C., Huang, Y.-W.
    2011-06 User Acceptance of Wireless Technology in Organizations: A Comparison of Alternative Models. Wu, Chin-Shan, Cheng, Fei-Fei., Yen, David C. and Huang, Yu-Wen.; 吳金山
    2006-07-04 Using an interpolation algorithm for VCR like functions in multimedia communications Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
    2006-07-04 Using an interpolation algorithm for VCR like functions in multimedia communications Tsai, H.-M.a , Chiang, T.-C.b , Huang, Y.-M.a
    2008 Using RFID Technology in Food Produce Traceability Chen, R. S., C. C. Chen, K. C. Yeh, Y. C. Chen and C. W. Kuo
    2009 Using the Black-Scholes Approach in Dynamic Resource Allocation for Library Budget Planning 陳佳楨; Chen, C. C.
    2009 Using the Heuristic Algorithm to Solve the Economic Lot Scheduling Problem with Returns 張育仁; Chang, Y. J. and C. Y. Cheng

    Showing items 176-200 of 364. (15 Page(s) Totally)
    << < 3 4 5 6 7 8 9 10 11 12 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback