English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21706424      Online Users : 221
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    其他研究計畫 [0/2]
    博碩士論文 [1751/1813]
    專書 [0/24]
    會議論文 [302/1061]
    期刊論文 [1013/1684]
    科技部大專學生研究計畫 [22/52]
    科技部研究計畫 [88/101]

    Sub-Community

    學習社群 [5/26]

    Siblings


    光電與通訊學系 [989/1264]
    生物資訊與醫學工程學系 [1593/2378]
    行動商務與多媒體應用學系 [1072/1735]
    資訊傳播學系 [648/999]

    Community Statistics


    近3年內發表的文件:143(3.00%)
    含全文筆數:3181(66.79%)

    文件下載次數統計
    下載大於0次:3181(100.00%)
    下載大於100次:3017(94.84%)
    檔案下載總次數:1303731(8.39%)

    最後更新時間: 2024-12-01 12:27

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 3226-3250 of 4759. (191 Page(s) Totally)
    << < 125 126 127 128 129 130 131 132 133 134 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2010 Text Trend Analysis via Significant Term A Based on Indonesia News Arie Budiansyah
    2010-08 Text Trend Analysis via Significant Term History - A study based on Indonesia News Budiansyah, Arie
    2007-09 TFRP: An Efficient Microaggregation Algorithm for Statistical Disclosure Control Chang, C. C.; Li, Y. C.; Huang, W. H.
    2017-11 The Capacity Analysis in the Secure Cooperative Communication System 黃明祥; J. S. Chen; Jong-Shin Chen; C. Y. Yang; Cheng-Ying Yang
    2016-01 The Moderately Hard DoS-resistant Authentication Protocol on Client Puzzles Ou;, 黃明祥*;S. K. Chong;Song-Kong Chong;Hsia-Hung Ou;Hsia-Hung
    2010 The Theorems and Applications of Combining the Multiple Classification Systems Based on Choquet Integral with Respect to L-Measure Lin Wen-Chih
    2016 Thermostatic Monitoring System of IoT Based on Arduino Hsu, Wei-Te
    2009-04 Three Improved Codebook Searching Algorithms for Image Compression Using Vector Quantizer Chang, C. C.; Kuo, C. L.; Chen, C. C.
    2019-11 Three types of two-disjoint-cycle-cover pancyclicity and their applications to cycle embedding in locally twisted cubes 龔自良; KUNG, TZU-LIANG; Che, Hon-Chan; Chen, Hon-Chan; Lin, Chia-Hui; Lin, Chia-Hui; Hs, Lih-Hsing; Hsu, Lih-Hsing
    2009-11 A three-dimensional breakdown model of SOI lateral power transistors with a circular layout Guo, Yufeng; Wang, Zhigong; Sheu, Gene
    2009-11 A Three-dimensional Breakdown Model of SOI Lateral Power Transistors with a Circular Layout 郭宇峰; Guo, Yufeng; Wang, Zhigong; 許健; Sheu, Gene
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2012-07 Three-Party Authenticated Quantum Key Distribution Protocol with Time Constraint 陳興忠; Chen, Hsing-Chung; 龔自良; Kung, Tzu-Liang; Kueng, Tz-Liang
    2010-08 A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication 陳興忠; Chen, Hsing-Chung
    2010-08 A Three-party Encrypted Key Exchange Protocol with Protected Password Authentication 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung; 陳興忠; Chen, Hsing-Chung
    2008-02 Three-Phase Lossless Data Hiding Method for the VQ Index Table Chang, C. C.; Lin, C. Y.; Hsieh, Y. P.
    2008 Three-Phase Lossless Data Hiding Method for the VQ Index Table 林智揚; Lin, Chih-Yang
    2004-08 A Threshold Signature Scheme for Group Communications without a Shared Distribution Center 黃明祥; Hwang, Min-Shiang
    2005-11 Threshold Signatures: Current Status and Key Issues 黃明祥; Hwang, Min-Shiang
    2004-04 Threshold Untraceable Signature for Group Communications 黃明祥; Hwang, Min-Shiang
    2011-10 A Time Constraint Three-Party Encrypted Key Exchange Protocol 陳興忠; Chen, Hsing-Chung
    2008-11 Time-bound Based Authentication Scheme for Multi-server Architecture Chang, C. C.; Lee, J. S.; Kuo, J. Y.
    2005-11 Time-bounded Based Password Authentication Scheme Chang, C. C.; Kuo, J. Y.; Lee, J. S
    2022-04-01 A Time-Driven Cloudlet Placement Strategy for Workflow Applications in Wireless Metropolitan Area Networks Zha, Jianshan; Zhang, Jianshan; Li, Ming; Li, Ming; Zhe, Xianghan; Zheng, Xianghan; 許慶賢; Hsu, Ching-Hsien

    Showing items 3226-3250 of 4759. (191 Page(s) Totally)
    << < 125 126 127 128 129 130 131 132 133 134 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback