淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64191/96979 (66%)
Visitors : 8570150      Online Users : 8220
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Monograph [0/1]

    Community Statistics


    Item counts issued in 3 years: 636(2.40%)
    Items With Fulltext: 16879(63.83%)

    Download counts of the item
    Download times greater than 0: 16879(100.00%)
    Download times greater than 10: 16854(99.85%)
    Total Bitstream Download Counts: 5868879(25.82%)

    Last Update: 2025-05-26 04:07

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 3371-3380 of 26440. (2644 Page(s) Totally)
    << < 333 334 335 336 337 338 339 340 341 342 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2008-10 A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture Chang, Chung-i; Lin, N.P.;
    2014-11-03 A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People Lin, Chi-Yi; Huang, Shih-Wen;
    1987-11 Crster空氣品質模式之後續繪圖程式 江旭程
    2019-12-13 Cryolite (Na3AlF6) crystallization for fluoride recovery using an electrolytic process equipped with a sacrificial aluminum anode Ya, Vinh; Li, Chi-Wang
    2019-04-15 Cryolite (Na3AlF6) crystallization for fluoride recovery using an electrolytic process equipped with a sacrificial aluminum anode Ya, Vinh; Chen, Yi-Chieh;
    2011-11 Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices Shieh, Wen-Gong; Horng, Wen-Bing
    2010-12 Cryptanalysis of a More Secure Remote User Authentication Scheme Horng, Wen-bing; Lee, Cheng-Ping;
    2012-11 Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol Horng, Wen-Bing; Peng, Jian-Wen;
    2002-05 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-Jia; Chen, Chiu-Chin
    2003-04 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-jia; Chen, Chiu-chin

    Showing items 3371-3380 of 26440. (2644 Page(s) Totally)
    << < 333 334 335 336 337 338 339 340 341 342 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback