Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4242592      在线人数 : 796
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    子类别

    碩士論文 [101/101]
    期刊論文 [78/111]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    邻近社群


    國際企業管理碩士學位學程 [2/2]
    管理學院 [113/113]
    企業管理學系所 [1141/1436]
    國際經營與貿易學系所 [322/513]
    會計學系所 [302/363]
    統計學系所 [365/493]
    財務金融學系所 [327/434]
    高階經營管理碩士在職專班 [713/724]
    企業管理學系碩士在職專班 [65/69]

    社群统计


    近3年内发表的文件:0(0.00%)
    含全文笔数:260(71.43%)

    文件下载次数统计
    下载大于0次:259(99.62%)
    下载大于100次:226(86.92%)
    全文下载总次数:101720(0.65%)

    最后更新时间: 2024-12-04 10:39

    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目151-175 / 364. (共15页)
    << < 2 3 4 5 6 7 8 9 10 11 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2010-12 One-Dimensional Phase Retrieval using Prior Discrete Fourier Transform. 余心淳、謝新銘、葉宏偉
    2011-07 Online Shoppers’ Decision Biases—the Effect of Response Mode. Wu, Chin-Shan.; 吳金山
    2013 Optimal schedule on message broadcast tree in structured peer-to-peer networks Lin, J.-W.; Wang, T.W.; Chang, R.-I.
    2011-05 Options Analysis and Knowledge Management: Implications for Theory and Practice. Chen, M. Y. and Chen, C. C.; 陳佳楨
    2006 A partition network model for ad hoc networks in overlay environments Huang, Y.-M. , Chiang, T.-C., Hou, T.-W.
    2005-08-22 A partition network model for ad hoc networks Chiang, T.-C.ac , Tsai, H.-M.b, Huang, Y.-M.a
    2012 A password-based user authentication scheme for the integrated EPR information system Wu, Z.-Y.af , Chung, Y.b, Lai, F.ace, Chen, T.-S
    2004 A practical authenticated encryption scheme based on the elliptic curve cryptosystem Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2002-10-28 A proxy-protected proxy signature scheme based on elliptic curve cryptosystem?? Chen, T.-S., Liu, T.-P., Chung, Y.-F.
    2011-06 &quot;Innovation Network in Taiwan Telecommunication Industry Based upon Social Network Perspective. Tseng, Chun-yao, Lin, Sheng-cheng and Jiang, Tz-lin.; 林盛程
    2008 Rearrange broadcast schedules on DHT-based peer-to-peer networks Lin, J.-W.
    2011-07 The Relationship between Vacation Motives and Online Travel Information Search Behavior in Pre-Trip Context: A Case of Inbound Travelers in Taiwan. Kimsuwan,Apithep., Cheng, Fei-Fei and Wu, Chin-Shan .; 吳金山
    2007 Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks Huang, Y.-M., Tsai, M.-H., Chiang, T.-C., Hou, T.-W.
    2012-03-26 A reliable dynamic user-remote password authentication scheme over insecure network Wu, Z.-Y.a , Chiang, D.-L.b, Lin, T.-C.b, Chung, Y.-F.c, Chen, T.-S.
    2010 A Rendezvous-Location Based Multicast Secure communication in Ad Hoc Networks 姜自強; Chiang, T.C. and Lin, H.Y
    2010-07-20 A rendezvous-location based multicast secure communication in ad hoc networks Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
    2010-07-20 A rendezvous-location based multicast secure communication in ad hoc networks Chiang, T.-C.a , Lin, H.-Y.b , Chang, J.-L.c
    2009 An RFID-based software agent framework on pervasive health service Yeh, K.-C.a, Chen, Y.-C.b, Chen, C.-C.c, Chen, R.-S.
    2011 RFID智慧型婚紗禮服展示系統之研製 陳佳楨,陳瑞順; ?Chen Chia Chen
    2012 The role of Internet buyer's product familiarity and confidence in anchoring effect Wu, C.-S., Cheng, F.-F., Yen, D.C.
    2008 Safety Design for Artificial Marble Products 張育仁; Wang, W. P., C. S. Chang and Y. J. Chang
    2012-03-26 Secure authentication scheme for supporting healthcare in wireless sensor networks Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
    2012 Secure dynamic access control scheme of PHR in cloud computing Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
    2010 A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents 陳澤雄; Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E

    显示项目151-175 / 364. (共15页)
    << < 2 3 4 5 6 7 8 9 10 11 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈