淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64180/96952 (66%)
Visitors : 11332651      Online Users : 80
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Journal Article [1057/1143]
    Proceeding [929/1854]
    Monograph [65/83]
    Chapter [19/60]
    Research Paper [106/448]
    Thesis [958/960]
    Patent [16/31]
    Audio Visual Work [0/1]
    Others [4/5]

    Community Statistics


    Item counts issued in 3 years: 118(2.57%)
    Items With Fulltext: 3154(68.79%)

    Download counts of the item
    Download times greater than 0: 3149(99.84%)
    Download times greater than 10: 3134(99.37%)
    Total Bitstream Download Counts: 1158760(5.04%)

    Last Update: 2025-06-04 00:22

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 976-1000 of 4583. (184 Page(s) Totally)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2007-02 Cooperative System for 4G Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    2008-04 Cooperative System for Micromobility Management in Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    2007-05-21 Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks Chang, Shih-Hao; Merabti, M.;
    2011-01 A Coordinate Transformation System Based on the Human Feature Information Chang, Shih-ming; TSai, Joseph;
    1992-01 Coping with failure : disciplined exception handling in logic programming 施國琛; Shih, Timothy K.
    2019-04-06 Copy-Move Forgery Detection by Deep Fusion Neural Network Chen, Chien-Chang; Duan, Wei-Kang
    2002-07 Copyright protection with program gene Hung, Jason C.; Chang, Chin-chen;
    1999-03 Correlation of fuzzy sets Chiang, Ding-an; Lin, Nancy P.;
    2007-09-14 Corrosion Evaluation of Hot Dip Galvanized Insulator Pins with Image Processing Techniques Cheng, Jiin-rong; Horng, Wen-bing;
    2001-09 A Cost-Effective Method for Early Fraud Detection in Online Auctions Shih, Timothy K.; Chiu, Chuan-Feng;
    2002-10 Course Authoring and On-Line Learning System with Student Assessment Algorithm for Distance Education Shih, Timothy K.; Lin, Nigel H.;
    2002-09 Course authoring and student assessment system for distance learning Chang, Flora Chia-i; Shih, Timothy K.;
    2007-09 A Courseware Authoring Tool for Achieving Interoperability among Various E-Learning Specifications Based on Web 2.0 Technologies Wang, te-hua; Yen, neil Y.;
    2005-09 Courseware development using influence diagram supporting e-learning specification 施國琛; Shih, Timothy K.
    2004-06 Courseware development using influence diagram with SCORM compatibility Chang, F.C.-I.; Chang, Wen-chih;
    2024-07-09 Courtroom Transcription: A Deep Learning Approach to Legal Terminology and Speaker Identification Jhang, Syu-Jhih; Chang, Hsiang-Chuan;
    2021-06-11 Coverage-Aware Recharging Scheduling Using Mobile Charger in Wireless Sensor Networks BHARGAVI DANDE; SHI-YONG CHEN;
    2005-08 Create non-duplicated simultaneous web search by six-direction search mechanisms 陳瑞發; Chen, Jui-fa;
    2000-10 Criteria of virtual university operation Shih, Timothy K.
    2008-10 A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture Chang, Chung-i; Lin, N.P.;
    2014-11-03 A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People Lin, Chi-Yi; Huang, Shih-Wen;
    2011-11 Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices Shieh, Wen-Gong; Horng, Wen-Bing
    2010-12 Cryptanalysis of a More Secure Remote User Authentication Scheme Horng, Wen-bing; Lee, Cheng-Ping;
    2012-11 Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol Horng, Wen-Bing; Peng, Jian-Wen;
    2002-05 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-Jia; Chen, Chiu-Chin

    Showing items 976-1000 of 4583. (184 Page(s) Totally)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback