淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 63069/95882 (66%)
造訪人次 : 4317591      線上人數 : 157
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    會議論文 [484/1127]
    專書 [42/59]
    專書之單篇 [5/13]
    研究報告 [39/158]
    學位論文 [574/574]
    專利 [7/16]
    其他 [0/1]

    類別統計

    近3年內發表的文件: 12(2.13%)
    含全文筆數: 523(92.73%)

    文件下載次數統計
    下載大於0次: 523(100.00%)
    下載大於10次: 523(100.00%)
    檔案下載總次數: 148673(31.41%)

    最後更新時間: 2024-05-16 03:39


    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目51-100 / 564. (共12頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2011-07 An Enhanced Password-based User Authentication Scheme for Grid Computing Wu, Zhen-yu; Chung, Yu-fang;
    2009-07-01 An Exploratory Study of Trust Dynamics in Work-Oriented Virtual Teams Kuo, Feng-yang; 游佳萍;
    2007-04-01 An extension of TOPSIS for group decision making 時序時; Shih, Hsu-shih;
    2006-08-01 An image size unconstrained ownership identification scheme for gray-level and color ownership statements based on sampling methods Hsu, C. S.; 侯永昌;
    2017-10-01 An improved multiattribute decision making method based on new score function of interval-valued intuitionistic fuzzy values and linear programming methodology 王正一; Wang, Cheng-yi;
    2015-02 An innovative approach to measuring technology spillovers in service-dominant logic 解燕豪
    2006-01-01 An Integrative Model to Predict the Continuance Use of Electronic Learning Systems: Hints for Teaching 吳錦波; Wu, Jiin-po;
    2017-07-27 An Interactive Telecare System Enhanced with IoT Technology Shih-Jung Wu; Rui-Dong Chiang;
    2009-11-01 An Investigation of Coopetitive Pedagogic Design for Knowledge Creation in Web-Based Learning Fu, Fong-ling; Wu, Ya-ling;
    2018-09 An Investigation of Visual Fatigue in Elementary School Students Resulting from Reading e-books Cheng, Pei-Yu; Su, Yen-Ning;
    2012-06 An Ownership Protection Scheme Based on Visual Cryptography and the Law of Large Numbers Hou, Young-chang; Huang, Pei-hsiu
    1991-09-01 Analysis of branch strategies under hierarchical memory system 李鴻璋; Lee, H. C.;
    2014-03-01 Analysis of fraudulent behavior strategies in online auctions for detecting latent fraudsters Chang, Jau-Shien; Chang, Wen-Hsi;
    1987-12-01 Application of computer-assisted instruction and canadian scene 黃崇冀; Huang, Henry C.
    2016-12-06 An Application of Technology-Based Design for Exhibition Services Hsieh, Yen-Hao; Yuan, Soe-Tsyr
    2018-02 Applying a Security Management Mechanism to a System Development Lifecycle C.P. Yu; C.P. Chu;
    2018-02-28 Applying a Security Management Mechanism to a System Development Lifecycle C.P. Yu; C.P. Chu;
    1999-03-01 Applying fuzzy adaptive network to fuzzy regression analysis 鄭啟斌; Lee, E. S.
    2006-08-01 Applying Fuzzy Logic Control to Inventory Decision in a Supply Chain 鄭啟斌; Cheng, Chi-bin;
    1994-12-01 Applying petri Nets to scheduling expert system 劉艾華; 魏仲良;
    Applying the framework of Turing Machine developing system for implementing Java virtual machine Liaw, Heh-Tyan; Liou, Ay-Hwa Andy;
    Applying the framework of Turing machine developing system for implementing Java virtual machine Heh-Tyan Liaw; Ay-Hwa Andy Liou;
    2010-11-06 Asset write-offs prediction by support vector machine and logistic regression 鄭啟斌; Wu, C.-W.;
    2013-10 An Asymmetric Image Cryptosystem Based on the Adaptive Synchronization of an Uncertain Unified Chaotic System and a Cellular Neural Network Cheng, Chao-Jung; Cheng, Chi-Bin;
    2011-06-01 Available-to-promise based bidding decision by fuzzy mathematical programming and genetic algorithm 鄭啟斌; Cheng, C.-J.
    2007-02-01 Bargaining strategy formulation with CRM for an e-commerce agent Chan, C. C. Henry; 鄭啟斌;
    2013-06 Block-based progressive visual secret sharing Hou, Young-Chang; Quan, Zen-Yu;
    2008-11 Boosting Chinese Question Answering with Two Lightweight Methods: ABSPs and SCO-QAT 戴敏育; Day, Min-yuh;
    2016-01-30 BS 10012導入經驗之研究-以淡江大學為例 黃明達; 杜恩君
    2007-12 Building a Composite Model of Business Process Management with System Development Life Cycle: An Action Research on Multiple Systems Shang, Shari S.-C.; 尚孝純;
    1998-01 Building a local floor map by use of ultrasonic and omni-directional vision sensors Wei, Shih-chieh; Yagi, Yasushi;
    2013-01 Building a Maturity Model of Information Security Governance for Technological Colleges and Universities in Taiwan Hung, Chir-neng; Hwang, Ming-dar;
    2018-04-30 Can an integrated system of electroencephalography and virtual reality further the understanding of relationships between attention, meditation, flow state, and creativity? Yang, Xiaozhe; Cheng, Pei-Yu;
    2016-01-01 Can Customer Expectations be Measured in Real Time? Hsieh, Yen-Hao; Yuan, Soe-Tsyr
    2013-09-12 Can Facebook use Induce Well-Being? 劉家儀; 游佳萍;
    1990-12-01 Comments on Saaty's Consistency Ratio Measure and Proposal of a New Detecting Procedure Liang, Te-chao; Sheng, Ching-lai
    1997-06-01 Comparison of proportional hazards models and neural networks for reliability estimation Luxhoj, James T.; 徐煥智;
    1997-02-01 Comparison of regression and neural network models for prediction of inspection profiles for aging aircraft Luxhoj, James T.; Williams, Trefor P.;
    2009-07-01 Competence Maps for the Information Service Industry Shih, Ying-wei; Wu, Ya-ling;
    2015-03 Consumer Software Piracy in Virtual Communities: An Integrative Model of Heroism and Social Exchange Yu, chia-ping; Young, Mei-Lien;
    2005-07-05 Copyright protection scheme for digital images using visual cryptography and sampling methods Hsu, Ching-sheng; 侯永昌;
    2019-06-25 Correction to: Schema Extraction for Deep Web Query Interfaces Using Heuristics Rules Chichang Jou
    2013-12 Correlation and Impact Between it Management and IT Governance Shaw, Ruey-Shiang; Cheng, Che-Pin;
    2006-01-01 COSTS evaluation using modified TOPSIS and ANP Huan-Jyh Shyur
    2012-06 Customer lifetime value prediction by a Markov chain based data mining model: application to an auto repair and maintenance company in Taiwan Cheng, C. J.; Chiu, S. W.;
    2021-03-11 CyberAid: are your children safe from cyberbullying? Lee Jia Thun; Phoey Lee Teh;
    2010-04 The decision model of task allocation for constrained stochastic distributed systems Jou, Chi-Chang; Jou, Chi-Chang
    2023-03-23 Design and Implementation of a VoIP PBX Integrated Vietnamese Virtual Assistant: A Case Study HH Son; TA Khoa;
    2007-06-01 Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images Tu, S.-F.; Hou, Young-Chang;
    2015-11-20 Designing a multi-issues negotiation support system based on prospect theory Huan-Jyh Shyur; Hsu-Shih Shih

    顯示項目51-100 / 564. (共12頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋