淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64187/96966 (66%)
Visitors : 11335975      Online Users : 38
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Community Statistics


    Item counts issued in 3 years: 45(1.80%)
    Items With Fulltext: 1682(67.41%)

    Download counts of the item
    Download times greater than 0: 1678(99.76%)
    Download times greater than 10: 1660(98.69%)
    Total Bitstream Download Counts: 554758(2.41%)

    Last Update: 2025-06-05 00:44

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 121-130 of 2495. (250 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2006-09 An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares 侯永昌; Hsu, C. S.;
    2006-09 An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares Hsu, Ching-Sheng; Tu, Shu-Fen;
    2012-06 An Ownership Protection Scheme Based on Visual Cryptography and the Law of Large Numbers Hou, Young-chang; Huang, Pei-hsiu
    1991-09-01 Analysis of branch strategies under hierarchical memory system 李鴻璋; Lee, H. C.;
    2014-03-01 Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters Chang, Jau-Shien; Chang, Wen-Hsi;
    2014-08-15 Analysis of Identifying Linguistic Phenomena for Recognizing Inference in Text Day, Min-Yuh; Wang, Ya-Jung;
    2012-06-03 An Analysis of Reward Systems of Electronic Services Yeh, Yi-chen; Shang, Shari S.-C.;
    2001-11-01 Analyzing software reliability growth model with imperfect-debugging and change-point by genetic algorithm Chen, Mu-chen; Wu, Hsiao-pin;
    2012-07 Another way to improve information security behaviors: A control perspective Shih, Sheng-Pao; Hsu, J.S.-C;
    1987-12-01 Application of computer-assisted instruction and canadian scene 黃崇冀; Huang, Henry C.

    Showing items 121-130 of 2495. (250 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback