English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 62822/95882 (66%)
造訪人次 : 4014054      線上人數 : 846
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    會議論文 [935/1849]
    專書 [66/87]
    專書之單篇 [19/60]
    研究報告 [106/470]
    學位論文 [957/958]
    專利 [16/31]
    視聽著作 [0/1]
    其他 [4/5]

    類別統計

    近3年內發表的文件: 43(3.81%)
    含全文筆數: 955(84.59%)

    文件下載次數統計
    下載大於0次: 955(100.00%)
    下載大於10次: 936(98.01%)
    檔案下載總次數: 266345(27.43%)

    最後更新時間: 2024-04-25 08:13


    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed
    跳至:
    或輸入年份:
    由新到舊排序 由最舊的開始

    顯示項目801-850 / 1129. (共23頁)
    << < 12 13 14 15 16 17 18 19 20 21 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2004-06 組織制定資訊安全政策對資訊安全之影響 (下) 洪國興; 季延平;
    2004-06 Inventory model with a service level constraint for variable lead time demand with the mixtures of distribution Lee, Wen-chuan; 吳忠武;
    2004-05-08 A note on inventory model involving variable lead time with defective units for mixtures of distribution Lee, Wen-chuan; 吳忠武;
    2004-05 Validating proficiency-mining strategy in adaptive learning environment Chen, Peng Wen; Shyu, Yuh Huei
    2004-05 組織制定資訊安全政策對資訊安全之影響 洪國興; 季延平;
    2004-05 資訊安全政策對資訊安全之影響 (上) 洪國興; 季延平;
    2004-05 On-Demand Backup Node Setup Routing Protocol in AD HOC Wireless Networks 王英宏; Wang, Ying-hong;
    2004-04 A personalized recommender system for the cosmetic business Wang, Yi-fan; Chuang, Yu-liang;
    2004-03-01 Task Migration in n-dimensional Wormhole-Touted Mesh Multicomputers 張志勇; Chang, Chih-yung;
    2004-03-01 Task migration in n-dimensional wormhole-routed mesh multicomputers Yu, Gwo-jong; 張志勇;
    2004-03 Ad hoc routing protocol based on setup on-demand backup node Wang, Ying-Hong; Chung, C.M.;
    2004-02 Three-dimensional ultrasound in margin evaluation for breast tumor excision using mammotome Chen, Dar-Ren; Chang, Ruey-Feng;
    2004-01-05 New multi-proxy multi-signature schemes 黃心嘉; Hwang, Shin-jia;
    2004-01 A multimedia database supports English distance learning 王英宏; Wang, Ying-hong;
    2004 行動學習:電子書包與隨意教室 張志勇; Chnag, Chih-yung
    2003-12-01 An Efficient Time-based Checkpointing Protocol for Mobile Computing Systems over Mobile IP 林其誼; Wang, S.C.;
    2003-12 兩種在分散式虛擬世界中的增強搜尋機制 陳瑞發; Chen, Jui-fa;
    2003-11 A New Courseware Diagram for Quantitative Measurement of Distance Learning Courses Chang, Flora Chia-i; Hung, Lun-ping;
    2003-10 An Integrated System Theory of Information Security Management Hong, Kwo Shing; Chi, Yen Ping;
    2003-10 資訊安全評估準則層級結構之研究 洪國興; 季延平;
    2003-09-01 Concept and design of Ad Hoc and Mobile classrooms 張志勇; Chang, Chih-yung;
    2003-09-01 Applying mobile agents to E-business 王英宏; Wang, Ying-hong;
    2003-09 A new digital multisignature scheme with distinguished signing authorities 黃心嘉; Hwang, Shin-jia;
    2003-09 An Approach for Supporting On-Line Chain Store Hung, Jason C.; Wang, Chun-chia;
    2003-08-01 Guessing by neighbors: an efficient reconstruction method for transmitting image progressively Chang, Chin-chen; 施國琛;
    2003-08-01 Image indexing and similarity retrieval based on spatial relationship model 王英宏; Wang, Ying-hong
    2003-08 Forecasting the leading index using fuzzy linguistic prediction 蔣定安; Chiang, Ding-an;
    2003-07 Asynchronous Consensus Protocol for the Unreliable Un-fully Connected Network Wang, S.C.; Yan, K.Q.;
    2003-06-01 Transforming learning method with highly effective evaluation mechanism Liou, Ay-hwa Andy; Wang, Ying-hong;
    2003-06-01 Video presentation recording and on-line broadcasting 施國琛; Shih, Timothy K.;
    2003-06 Knowledge life cycle - A conceptual proposal for knowledge management Liou, Ay-hwa Andy; Wang, Ying-hong;
    2003-06 資訊安全管理理論之探討 洪國興; 趙榮耀
    2003-04 Dynamic channel assignment and reassignment for exploiting channel reuse opportunities in ad hoc wireless networks 張志勇; Chnag, Chih-yung;
    2003-04 Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme 黃心嘉; Hwang, Shin-jia;
    2003-04 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-jia; Chen, Chiu-chin
    2003-03-01 Obstacle-free geocasting protocols for single/multi-destination short message services in ad hoc networks 張志勇; Chang, Chih-yung;
    2003-03 An omni-directional stroll-based virtual reality interface and its application on overhead crane training 黃俊堯; Huang, Jiung-yao
    2003-03 Establish A Market Segmentation System to Predict the Position of A Product in Electronic Marketplace Based on Networked Situations and Product Attributes Liu, Hoo-cheng; Chien, Chao-yin;
    2003-03 Bootstrapping in a language learning environment 衛友賢; Wible, David-scott;
    2003-03 The design of a synchronous virtual writing clinic 郭經華; Kuo, Chin-hwa;
    2003-03 A new proxy multi-signature scheme 黃心嘉; Hwang, Shin-jia;
    2003-02 資訊安全管理系統之探討-捷運等相關個案研究 洪國興; 季延平;
    2003-01-01 Goal-oriented sequential pattern for network banking churn analysis 蔣定安; Chiang, Ding-an;
    2003-01-01 A survey of distance education challenges and technologies 施國琛; Shih, Timothy K.;
    2003-01 An Agent-Based Multi-Issue Negotiation System in E-Commerce 施國琛; Shih, Timothy K.;
    2003-01 A Mobile Project Management System that Supports Collaborative Work by Sharing Individual Ideas and Group Schedule Fujiwara, Y.; Jin, Q;
    2002-11 Cryptanalysis of the Hwang-Shi Proxy Signature Scheme Hwang, Min-shiang; Lee, Cheng-ch;
    2002-10 An efficient spatial prediction-based image compression scheme Kuo, Chin-hwa; Chou, Tzu-chuan;
    2002-07 A Distributed Mobile Agent Framework for Maintaining Persistent Distance Education Deng, Lawrence Y.; 施國琛;
    2002-07 Active route-maintenance protocol for signal-based communication path in ad hoc networks Chnag, Chih-yung; Tu, Shin-chih;

    顯示項目801-850 / 1129. (共23頁)
    << < 12 13 14 15 16 17 18 19 20 21 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋