ASIA unversity:
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21671527      在线人数 : 1063
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    子类别

    其他研究計畫 [0/2]
    博碩士論文 [1751/1813]
    專書 [0/24]
    會議論文 [302/1061]
    期刊論文 [1013/1684]
    科技部大專學生研究計畫 [22/52]
    科技部研究計畫 [88/101]

    子社群

    學習社群 [5/26]

    邻近社群


    光電與通訊學系 [989/1264]
    生物資訊與醫學工程學系 [1593/2378]
    行動商務與多媒體應用學系 [1072/1735]
    資訊傳播學系 [648/999]

    社群统计


    近3年内发表的文件:143(3.00%)
    含全文笔数:3181(66.79%)

    文件下载次数统计
    下载大于0次:3181(100.00%)
    下载大于100次:3012(94.69%)
    全文下载总次数:1300581(8.37%)

    最后更新时间: 2024-11-29 03:34

    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目3276-3300 / 4759. (共191页)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2013-11 Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments Chen, Te-Yu; Chen, Te-Yu; C.C.Lee; Lee, Cheng-Chi; 黃明祥; Hwang, Min-Shiang; Jan, Jinn-Ke; Jan, Jinn-Ke
    2002-05 Traceability on Low-Computation Partially Blind Signatures for Electronic Cash 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003 Traceability on RSA-based Partially Signature with Low Computation 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003-02 Traceability on Stadler et al.'s Fair Blind Signature Scheme 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2006 Tracking System of Customer Service Using RSS Mechanism Chin-Hsing, Hung
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2022-07-01 Transfer Learning-Based Multi-Scale Denoising Convolutional Neural Network for Prostate Cancer Detection Chu, Kwok Tai; Chui, Kwok Tai; Bhoosha, Brij; Gupta, Brij Bhooshan; Chi, Hao Ran; Chi, Hao Ran; Arya, Varsha; Arya, Varsha; Alhala, Wadee; Alhalabi, Wadee; Torre, Miguel; Ruiz, Miguel Torres; Sh, Chien-Wen; Shen, Chien-Wen
    2022-03-01 Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing Damarj, Cahya; Damarjati, Cahya; Trin, Karisma; Putra, Karisma Trinanda; Wijayan, Heri; Wijayanto, Heri; 陳興忠; Chen, Hsing-Chung; Nu, Toha Ardi; Nugraha, Toha Ardi
    2015-05 Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction Liu), Li Liu(Li; Wang), An-Hong Wang(An-Hong; CHang)*, 張真誠(Chin-Chen; Jin), Qiang Jin(Qiang; Xia), Bin-Bin Xia(Bin-Bin
    2010-01 Trend of e-learning: The service mashup Yen, Neil Y; Shih, Timothy K; Jin, Qun; Hsu, Hui-Huang; Chao, Louis R
    2015-03 TRIPLE HELIX THEORY OF MANAGEMENT OF TECHNOLOGY EDUCATION (MOTE): AN Chen), 陳坤成(James K.C.; lee), sl lee(sl; Batchuluun(Batchuluun); Sheu), 許健(Gene
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks 陳興忠; Chen, Hsing-Chung
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks Chen, 陳興忠;Hsing-Chung
    2013-10 A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks 陳興忠; Chen, Hsing-Chung; Lin, Jen-Yung; Lin, Jen-Yung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen)*, 陳興忠(Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme 陳興忠; Chen, Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen, 陳興忠;Hsing-Chung
    2019-06 A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education Chia-Chun Wu; Cheng-Yin Yang; Min-Shiang Hwang; Cheng-Yee Lee
    2012 Two Three-Party Key Distribution Protocols with Authenticated Time Constraint Lin, Syuan-Zong
    2008-10 A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity Hsieh, Y. P.; Chang, C. C.; Liu, L. J.
    2013-12 The two-disjoint-cycle-cover pancyclicity of locally twisted cubes Kung, Tzu-Liang; Chen, Hon-Chan
    2013-12 The Two-Disjoint-Path-Coverable Problem of Crossed Cubes Chen, Hon-Chan; Kung, Tzu-Liang; Hsu, Li-Yen

    显示项目3276-3300 / 4759. (共191页)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    每页显示[10|25|50]项目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈