English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64189/96968 (66%)
造訪人次 : 11339341      線上人數 : 102
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    淡江大學機構典藏 >  依題名瀏覽

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目28401-28450 / 96946. (共1939頁)
    << < 564 565 566 567 568 569 570 571 572 573 > >>
    每頁顯示[10|25|50]項目
    日期題名作者
    2012-03 Search Costs and Investor Trading Activity: Evidences from Limit Order Book Lin, William T.; Tsai, Shih-Chuan;
    2012-03 Search Costs and Investor Trading Activity: Evidences from limit order book Lin, William T.; Tsai, Shih-chuan;
    2021-07-27 Search for anisotropic gravitational-wave backgrounds using data from Advanced LIGO and Advanced Virgo's first three observing runs Scientific Collaboration; Virgo Collaboration;
    2021-07-27 Search for anisotropic gravitational-wave backgrounds using data from Advanced LIGO and Advanced Virgo’s first three observing runs R. Abbott et al. (LIGO Scientific Collaboration, Virgo Collaboration, and KAGRA Collaboration)
    2022-08-09 Search for continuous gravitational wave emission from the Milky Way center in O3 LIGO-Virgo data Liu, Guo-qing
    2022-01-19 Search for continuous gravitational waves from 20 accreting millisecond x-ray pulsars in O3 LIGO data Liu, Guo-chin
    2017-08-28 Search for Empowerment Strategies: An Example of Factorial Extraction Dian-Fu Chang1, Sheng-Nan Chen and Hung-Jen Weng
    2017-10 Search for Empowerment Strategies: An Example of Factorial Extraction Dian-Fu Chang; Sheng-Nan Chen;
    2022-09-21 Search for gravitational waves from Scorpius X-1 with a hidden Markov model in O3 LIGO data Liu, Guo-qing
    2022-03-16 Search for intermediate-mass black hole binaries in the third observing run of Advanced LIGO and Advanced Virgo Liu, Guo-qing
    2023-02-28 Search for subsolar-mass black hole binaries in the second part of Advanced LIGO’s and Advanced Virgo’s third observing run Collaborations, LVK
    2023-02-28 Search for subsolar-mass black hole binaries in the second part of Advanced LIGO’s and Advanced Virgo’s third observing run Liu, Guo-chin
    2012-01 A Search Space Reduced Algorithm for Mining Frequent Patterns Yen, Show-Jane; Wang, Chiu-Kuang;
    2021-11-02 Searches for Continuous Gravitational Waves from Young Supernova Remnants in the Early Third Observing Run of Advanced LIGO and Virgo LIGO Scientific Collaboration; Virgo Collaboration;
    2007-06-21 Searching customer preferred policies for the frequent flyer program - a case study on Taiwanese passengers 許超澤; Hsu, Chao-che;
    2009-03-25 Searching for doubly charged Higgs bosons in Moller scattering by resonance effects at linear e-e- collider Chen, Chian-Shu; Geng, Chao-Qiang;
    2008-04 Searching for Inquiry: A Study of Professional Development of High School Science Teachers during the Process of Curriculum Development Kao, Hsun-fung; Ho, Li-an
    2004-03 A Searching Mechanism on a Distributed Virtual World: Six-Direction Simultaneous Search 陳瑞發
    2004-08 Searching the Models: Best Practices of Business Incubation 高惠春
    2002-11-01 Seasonal cointegration and cross-equation restrictions on a forward looking buffer stock model of money demand Huang, Tai-hsin; Shen, Chung-hua
    2009-01 Seasonal forecasting of a decomposed fuzzy exponential smoothing model using grey estimated values 曹銳勤; Tsaur, Ruey-chyn
    2016-06 SECOND DEGREE GENERALIZED JACOBI ITERATION METHOD FOR SOLVING SYSTEM OF LINEAR EQUATIONS Enyew, Tesfaye Kebede
    2020-12-15 The second generalized Yamabe invariant and conformal mean curvature flow on manifolds with boundary Ho, Pak Tung; Lee, Junyeop;
    2018-05-13 Second Generation Politicians in Taiwan: The Analysis of 2014 City Councilors Election. Tsai, Chia-huang; Chou, Ying-lung;
    2007-07 The Second International Congress of Algebra and Combinatorics: Dedicated to the 70th birthday of Leonid A. Bokut 林慧珍
    1989-02 Second order transonic solution obtained from the exact solution of the Prandtl-Meyer flow Feng, Chao-kang
    2024-09-24 The second Yamabe invariant with boundary Ho, Pak Tung; Pyo, Juncheol
    2013-09 Secret Sharing on Audio by Integer Wavelet Transform 陳建彰; 黃建螢;
    2022-12-05 Secrets of the Dead: Understanding human rights through bodies and remains Leong, Kar Yen
    2000-07 Sectional Analysis of Real Exchange Rate Risk on Taiwan's Exports : A Rational Expectation Multivariate GARCH-M Approach 王凱立
    2013-04-18 Secular variation in rainfall and intensity–frequency–duration curves in Eastern Australia Chen, Yi-Ru; Yu, Bofu;
    2013-08 Secular Variation in Rainfall Intensity and Temperature in Eastern Australia Chen, Yi-Ru; Yu, Bofu;
    2009-01 Secure and efficient group key management with shared key derivation Lin, Jen-Chiun; Huang, Kuo-Hsuan;
    2014-08-05 A secure and reliable routing protocol for wireless mesh networks Hwang, Ren Junn; Hsiao, Y. K.
    2007-09 Secure Authentication Scheme for RFID 黃仁俊
    2012-06 A Secure Authentication Scheme for Telecare Medicine Information Systems Zhen-Yu Wu, Yueh-Chun Lee, Feipei Lai, Lee, Hung-Chang, Yufang Chung; Z. Y. Wu
    2001-01 Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design Lian, Kuang-yow; Chiu, Chian-song;
    2017-03-27 Secure Data Collection Scheme for Wireless Sensor Networks Hwang, Ren-Junn; Huang, Y. Z.
    2007-09 A Secure Data Dissemination for Wireless Sensor Networks 黃仁俊
    2015-08-06 Secure Data Transmission Scheme for WSNs Hwang, Ren Junn; Huang, Yan Zhi
    2008-11 A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications 黃心嘉; Hwang, shin-jia;
    2005-01-01 Secure e-mail protocols providing perfect forward secrecy 孫宏民; Sun, Hung-min;
    2006-09 Secure Key Management Scheme for Wireless LAN 黃仁俊; Hwang, Ren-junn;
    2008-06-17 Secure remote control model for information appliances Shieh, Wen-gong; Wang, Jian-min;
    2012-11 A secure remote user authentication scheme Hwang, Ren-junn; Hwang, Ren-junn
    2011-05 A Secured Authentication Protocol for Wireless Sensor Networks using Elliptic Curves Cryptography Yeh, Hsiu-lien; Chen, Tien-ho;
    2017-01 Securitization Revised: Power Estimation Model of Actors 劉泰廷
    2010-09 Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards 洪文斌; Horng, Wen-bing
    2010-12 Security Analysis and Improvement of the Remote User Authentication Scheme without Using Smart Cards Horng, Wen-Bing; Shieh, Wen-Gong;
    2000-05 The security analysis of two authenticated key agreement schemes 黃心嘉; Hwang, Shin-jia;
    顯示項目28401-28450 / 96946. (共1939頁)
    << < 564 565 566 567 568 569 570 571 572 573 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋