ASIA unversity:
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 94286/110023 (86%)
造訪人次 : 21673357      線上人數 : 772
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    子類別

    其他研究計畫 [0/2]
    博碩士論文 [1751/1813]
    專書 [0/24]
    會議論文 [302/1061]
    期刊論文 [1013/1684]
    科技部大專學生研究計畫 [22/52]
    科技部研究計畫 [88/101]

    子社群

    學習社群 [5/26]

    鄰近社群


    光電與通訊學系 [989/1264]
    生物資訊與醫學工程學系 [1593/2378]
    行動商務與多媒體應用學系 [1072/1735]
    資訊傳播學系 [648/999]

    社群統計


    近3年內發表的文件:143(3.00%)
    含全文筆數:3181(66.79%)

    文件下載次數統計
    下載大於0次:3181(100.00%)
    下載大於100次:3013(94.72%)
    檔案下載總次數:1301516(8.38%)

    最後更新時間: 2024-11-29 08:39

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目3276-3300 / 4759. (共191頁)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2013-11 Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments Chen, Te-Yu; Chen, Te-Yu; C.C.Lee; Lee, Cheng-Chi; 黃明祥; Hwang, Min-Shiang; Jan, Jinn-Ke; Jan, Jinn-Ke
    2002-05 Traceability on Low-Computation Partially Blind Signatures for Electronic Cash 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003 Traceability on RSA-based Partially Signature with Low Computation 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003-02 Traceability on Stadler et al.'s Fair Blind Signature Scheme 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2006 Tracking System of Customer Service Using RSS Mechanism Chin-Hsing, Hung
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2022-07-01 Transfer Learning-Based Multi-Scale Denoising Convolutional Neural Network for Prostate Cancer Detection Chu, Kwok Tai; Chui, Kwok Tai; Bhoosha, Brij; Gupta, Brij Bhooshan; Chi, Hao Ran; Chi, Hao Ran; Arya, Varsha; Arya, Varsha; Alhala, Wadee; Alhalabi, Wadee; Torre, Miguel; Ruiz, Miguel Torres; Sh, Chien-Wen; Shen, Chien-Wen
    2022-03-01 Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing Damarj, Cahya; Damarjati, Cahya; Trin, Karisma; Putra, Karisma Trinanda; Wijayan, Heri; Wijayanto, Heri; 陳興忠; Chen, Hsing-Chung; Nu, Toha Ardi; Nugraha, Toha Ardi
    2015-05 Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction Liu), Li Liu(Li; Wang), An-Hong Wang(An-Hong; CHang)*, 張真誠(Chin-Chen; Jin), Qiang Jin(Qiang; Xia), Bin-Bin Xia(Bin-Bin
    2010-01 Trend of e-learning: The service mashup Yen, Neil Y; Shih, Timothy K; Jin, Qun; Hsu, Hui-Huang; Chao, Louis R
    2015-03 TRIPLE HELIX THEORY OF MANAGEMENT OF TECHNOLOGY EDUCATION (MOTE): AN Chen), 陳坤成(James K.C.; lee), sl lee(sl; Batchuluun(Batchuluun); Sheu), 許健(Gene
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks 陳興忠; Chen, Hsing-Chung
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks Chen, 陳興忠;Hsing-Chung
    2013-10 A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks 陳興忠; Chen, Hsing-Chung; Lin, Jen-Yung; Lin, Jen-Yung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen)*, 陳興忠(Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme 陳興忠; Chen, Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen, 陳興忠;Hsing-Chung
    2019-06 A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education Chia-Chun Wu; Cheng-Yin Yang; Min-Shiang Hwang; Cheng-Yee Lee
    2012 Two Three-Party Key Distribution Protocols with Authenticated Time Constraint Lin, Syuan-Zong
    2008-10 A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity Hsieh, Y. P.; Chang, C. C.; Liu, L. J.
    2013-12 The two-disjoint-cycle-cover pancyclicity of locally twisted cubes Kung, Tzu-Liang; Chen, Hon-Chan
    2013-12 The Two-Disjoint-Path-Coverable Problem of Crossed Cubes Chen, Hon-Chan; Kung, Tzu-Liang; Hsu, Li-Yen

    顯示項目3276-3300 / 4759. (共191頁)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋