English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64178/96951 (66%)
造訪人次 : 10762106      線上人數 : 17608
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    子類別

    期刊論文 [1057/1143]
    會議論文 [929/1854]
    專書 [65/83]
    專書之單篇 [19/60]
    研究報告 [106/448]
    學位論文 [958/960]
    專利 [16/31]
    視聽著作 [0/1]
    其他 [4/5]

    社群統計


    近3年內發表的文件: 118(2.57%)
    含全文筆數: 3154(68.79%)

    文件下載次數統計
    下載大於0次: 3149(99.84%)
    下載大於10次: 3134(99.37%)
    檔案下載總次數: 1156572(5.04%)

    最後更新時間: 2025-06-02 12:18

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目951-1000 / 4583. (共92頁)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2006-06 Content-Based Image Retrieval Trained by Adaboost for Mobile Application Lin, Hwei-jen; Kao, Yang-ta;
    1999-08-03 Content-based image retrieval with intensive signature Tyan, Hsiao-rong; 施國琛;
    2000-02 Content-based image retrieval with intensive signature in shape matching Keh, Huan-chao; 施國琛;
    2000-12 Content-based image retrieval with intensive signature via affine invariant transformation Shih, Timothy K.; Deng, Lawrence Y.;
    2003-03 Content-based information retrieval for VRML 3D objects Wang, Ching-sheng; Shih, Timothy K.;
    2002-05 Content-based information retrieval in large VR scene database 施國琛; Shih, Timothy K.;
    2006-10 A Content-Based Painting Image Retrieval System Based on AdaBoost Algorithm Yen, Shwu-Hu; Hsieh, Ming-Hsien;
    2008-11 A Content-Based Semi-Fragile Mesh Watermarking Scheme Yen, Shwu-huey; Chen, Yu-ying;
    1996-06 Context analysis by the gamma neural networks Hsu, Hui-huang; Fu, Li-min;
    2005-01-01 Context-aware privacy and security agents for distance education Yee, George; Korba, Larry;
    2016-05 A Context-Aware, Interactive M-Health System for Diabetics 蔣璿東; Chiang, Rui-dong;
    2004-09 Contextualizing Language Learning in the Digital Wild: Tools and a Framework Wible, David Scott; Kuo, Chin-hwa;
    1994-12 Continuation semantics of logic programs with disciplined exception handling 施國琛; Shih, Timothy K.
    1994-12 Continuation Semantics of Logic Programs with Disciplined Exception Handling Shih, Timothy Kuo-Chen
    2000-12 A Continuous Media Placement Scheme in Multi-Zone Disks Sung, Li-Chun; Kuo, Chin-Hwa;
    2009-07 A Continuous zero Replacement Reversible image Watermarking Method 陳建彰
    2013-04 Convergecast in ZigBee Tree-Based Wireless Sensor Networks Pan, M.S.; Liu, P.L.;
    2024-01-11 Convergence of Technological Social Changes in the Development of Intelligent Technology Innovation System in Taiwan Chen, Duen-kai
    2000-07 Cooperating intelligent mobile agents mechanism for distributed multimedia synchronization Wang, Ying-hong; Lin, Hung-zu;
    2019-08-10 Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor 張志勇
    2018-08-10 Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor Networks Weimin Wen; Chih-Yung Chang;
    2010-12 A Cooperative Downlink Bandwidth and Power Allocation Protocol for IEEE 802.16m Femtocell Networks 石貴平; Shih, kuei-ping;
    2022-09 Cooperative Fall Detection with Multiple Cameras Hou, Jian-chiuan; Xu, Wei-ming;
    2012-06-25 Cooperative MAC Protocol for Multi-Channel Wireless Networks Hung, Li-ling; Chang, Chih-yung;
    2013 Cooperative mobile barrier coverage in wireless sensor networks 吳耀武; Gotama, Andrew
    2007-02 Cooperative System for 4G Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    2008-04 Cooperative System for Micromobility Management in Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    2007-05-21 Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks Chang, Shih-Hao; Merabti, M.;
    2011-01 A Coordinate Transformation System Based on the Human Feature Information Chang, Shih-ming; TSai, Joseph;
    1992-01 Coping with failure : disciplined exception handling in logic programming 施國琛; Shih, Timothy K.
    2019-04-06 Copy-Move Forgery Detection by Deep Fusion Neural Network Chen, Chien-Chang; Duan, Wei-Kang
    2002-07 Copyright protection with program gene Hung, Jason C.; Chang, Chin-chen;
    1999-03 Correlation of fuzzy sets Chiang, Ding-an; Lin, Nancy P.;
    2007-09-14 Corrosion Evaluation of Hot Dip Galvanized Insulator Pins with Image Processing Techniques Cheng, Jiin-rong; Horng, Wen-bing;
    2001-09 A Cost-Effective Method for Early Fraud Detection in Online Auctions Shih, Timothy K.; Chiu, Chuan-Feng;
    2002-10 Course Authoring and On-Line Learning System with Student Assessment Algorithm for Distance Education Shih, Timothy K.; Lin, Nigel H.;
    2002-09 Course authoring and student assessment system for distance learning Chang, Flora Chia-i; Shih, Timothy K.;
    2007-09 A Courseware Authoring Tool for Achieving Interoperability among Various E-Learning Specifications Based on Web 2.0 Technologies Wang, te-hua; Yen, neil Y.;
    2005-09 Courseware development using influence diagram supporting e-learning specification 施國琛; Shih, Timothy K.
    2004-06 Courseware development using influence diagram with SCORM compatibility Chang, F.C.-I.; Chang, Wen-chih;
    2024-07-09 Courtroom Transcription: A Deep Learning Approach to Legal Terminology and Speaker Identification Jhang, Syu-Jhih; Chang, Hsiang-Chuan;
    2021-06-11 Coverage-Aware Recharging Scheduling Using Mobile Charger in Wireless Sensor Networks BHARGAVI DANDE; SHI-YONG CHEN;
    2005-08 Create non-duplicated simultaneous web search by six-direction search mechanisms 陳瑞發; Chen, Jui-fa;
    2000-10 Criteria of virtual university operation Shih, Timothy K.
    2008-10 A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture Chang, Chung-i; Lin, N.P.;
    2014-11-03 A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People Lin, Chi-Yi; Huang, Shih-Wen;
    2011-11 Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices Shieh, Wen-Gong; Horng, Wen-Bing
    2010-12 Cryptanalysis of a More Secure Remote User Authentication Scheme Horng, Wen-bing; Lee, Cheng-Ping;
    2012-11 Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol Horng, Wen-Bing; Peng, Jian-Wen;
    2002-05 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-Jia; Chen, Chiu-Chin

    顯示項目951-1000 / 4583. (共92頁)
    << < 15 16 17 18 19 20 21 22 23 24 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋