English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21669506      Online Users : 1286
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    其他研究計畫 [0/2]
    博碩士論文 [1751/1813]
    專書 [0/24]
    會議論文 [302/1061]
    期刊論文 [1013/1684]
    科技部大專學生研究計畫 [22/52]
    科技部研究計畫 [88/101]

    Sub-Community

    學習社群 [5/26]

    Siblings


    光電與通訊學系 [989/1264]
    生物資訊與醫學工程學系 [1593/2378]
    行動商務與多媒體應用學系 [1072/1735]
    資訊傳播學系 [648/999]

    Community Statistics


    近3年內發表的文件:143(3.00%)
    含全文筆數:3181(66.79%)

    文件下載次數統計
    下載大於0次:3181(100.00%)
    下載大於100次:3013(94.72%)
    檔案下載總次數:1301516(8.38%)

    最後更新時間: 2024-11-29 08:39

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 3276-3300 of 4759. (191 Page(s) Totally)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2013-11 Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments Chen, Te-Yu; Chen, Te-Yu; C.C.Lee; Lee, Cheng-Chi; 黃明祥; Hwang, Min-Shiang; Jan, Jinn-Ke; Jan, Jinn-Ke
    2002-05 Traceability on Low-Computation Partially Blind Signatures for Electronic Cash 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003 Traceability on RSA-based Partially Signature with Low Computation 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2003-02 Traceability on Stadler et al.'s Fair Blind Signature Scheme 黃明祥; Hwang, Min-Shiang; Cheng-Chi Lee; Yan-Chi Lai
    2006 Tracking System of Customer Service Using RSS Mechanism Chin-Hsing, Hung
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2006-12 Tracking Transient Source Locations Associated with Voltage Sags and Shunt Capacitor Switchings 張文恭; G.W.Chang; 趙汝鵬; J.P.Chao; 陳正一; Chen, Cheng-I
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2000-05 Traffic Control in an ATM Network Using Distributed Key Techniques 黃明祥; Hwang, Min-Shiang
    2022-07-01 Transfer Learning-Based Multi-Scale Denoising Convolutional Neural Network for Prostate Cancer Detection Chu, Kwok Tai; Chui, Kwok Tai; Bhoosha, Brij; Gupta, Brij Bhooshan; Chi, Hao Ran; Chi, Hao Ran; Arya, Varsha; Arya, Varsha; Alhala, Wadee; Alhalabi, Wadee; Torre, Miguel; Ruiz, Miguel Torres; Sh, Chien-Wen; Shen, Chien-Wen
    2022-03-01 Tree-based Filtering in Pulse-Line Intersection Method Outputs for An Outlier-tolerant Data Processing Damarj, Cahya; Damarjati, Cahya; Trin, Karisma; Putra, Karisma Trinanda; Wijayan, Heri; Wijayanto, Heri; 陳興忠; Chen, Hsing-Chung; Nu, Toha Ardi; Nugraha, Toha Ardi
    2015-05 Tree-Structured Vector Quantization with Flexible Multipath Searching Method Based on Side Match Prediction Liu), Li Liu(Li; Wang), An-Hong Wang(An-Hong; CHang)*, 張真誠(Chin-Chen; Jin), Qiang Jin(Qiang; Xia), Bin-Bin Xia(Bin-Bin
    2010-01 Trend of e-learning: The service mashup Yen, Neil Y; Shih, Timothy K; Jin, Qun; Hsu, Hui-Huang; Chao, Louis R
    2015-03 TRIPLE HELIX THEORY OF MANAGEMENT OF TECHNOLOGY EDUCATION (MOTE): AN Chen), 陳坤成(James K.C.; lee), sl lee(sl; Batchuluun(Batchuluun); Sheu), 許健(Gene
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks 陳興忠; Chen, Hsing-Chung
    2015-05 A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks Chen, 陳興忠;Hsing-Chung
    2013-10 A Trust-Based Cooperation Bit-Map Routing Protocol for Ad Hoc Networks 陳興忠; Chen, Hsing-Chung; Lin, Jen-Yung; Lin, Jen-Yung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen)*, 陳興忠(Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme 陳興忠; Chen, Hsing-Chung
    2015-05 A trusted user-to-role and role-to-key access control scheme Chen, 陳興忠;Hsing-Chung
    2019-06 A Trustworthy Web-based System Platform for Teaching Evaluation and STEM Education Chia-Chun Wu; Cheng-Yin Yang; Min-Shiang Hwang; Cheng-Yee Lee
    2012 Two Three-Party Key Distribution Protocols with Authenticated Time Constraint Lin, Syuan-Zong
    2008-10 A Two-Codebook Combination and Three-Phase Block Matching Based Image Hiding Scheme with High Embedding-Capacity Hsieh, Y. P.; Chang, C. C.; Liu, L. J.
    2013-12 The two-disjoint-cycle-cover pancyclicity of locally twisted cubes Kung, Tzu-Liang; Chen, Hon-Chan
    2013-12 The Two-Disjoint-Path-Coverable Problem of Crossed Cubes Chen, Hon-Chan; Kung, Tzu-Liang; Hsu, Li-Yen

    Showing items 3276-3300 of 4759. (191 Page(s) Totally)
    << < 127 128 129 130 131 132 133 134 135 136 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback