淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 56738/90513 (63%)
Visitors : 12091034      Online Users : 53
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Proceeding [821/1703]
    Monograph [56/76]
    Chapter [19/60]
    Research Paper [105/460]
    Thesis [955/956]
    Patent [7/20]
    Audio Visual Work [0/1]
    Others [4/5]

    Collection Statistics

    Item counts issued in 3 years: 48(4.99%)
    Items With Fulltext: 749(77.94%)

    Download counts of the item
    Download times greater than 0: 745(99.47%)
    Download times greater than 10: 724(96.66%)
    Total Bitstream Download Counts: 186049(26.03%)

    Last Update: 2020-09-22 10:48


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed
    Jump to a point in the index:
    Or type in a year:
    Ordering With Most Recent First Show Oldest First

    Showing items 201-225 of 961. (39 Page(s) Totally)
    << < 4 5 6 7 8 9 10 11 12 13 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2013-12-01 Equivalent Queueing Petri Net Expression for New Routing Method under RWP Mobility in DTNs Yang, Shih-Yang; Jiang, Jiun-Ting;
    2013-02-14 Using NS2 to Analyze the Packet Drop Problem for a New Routing Method in DTNs Yang, Shih-Yang; Jiang, Jiun-Ting;
    2013-01-31 A Novel Routing Scheme to Use the Rule of First Encounter within OOP-Routing for Delay Tolerant Ad-Hoc Networks Yang, Shih-Yang; Jiang, Jiun-Ting;
    2013-12-01 Prediction of Regulatory Gene Pairs Using Dynamic Time Warping and Gene Ontology Yang, Andy C.; Hsu, Hui-Huang;
    2013-12-01 Adaptive Music Video Recommendation System Framework for Foreign English Language Learning Kuo, Chin-Hwa; Chi, Chen-Chung
    2013-12-01 A Hole Avoiding Routing Protocol using a Relative Neighborhood Graph for Wireless Sensor Networks Tsai, Chih-Hsiao; Wang, Ying-Hong;
    2013-11-15 Mining high coherent association rules with consideration of support measure Chen, Chun-Hao; Lan, Guo-Cheng;
    2013-11-01 A combined mining-based framework for predicting telecommunications customer payment behaviors Chen, Chun-Hao; Chiang, Rui-Dong;
    2013-11 An Anonymous Distributed Routing Protocol in Mobile Ad-hoc Networks Hwang, Ren-Junn; Hsiao, Yu-Kai;
    2013-10-27 Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks Ke Xiong, Yu Zhang, Dandan Li, Chih-Yung Chang, Zhangdui Zhong
    2013-10 The evolutionary random interval fingerprint for a more secure wireless communication Tseng, Kuo-Kun; Pan, Jeng-Shyang;
    2013-09-09 Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks Chao-Tsun Chang, Chih-Yung Chang , Tzu-Lin Wangb , Yun-Jung Lu
    2013-09-01 Prediction of members’ repurchase rates with time weight function Chen, Chun-Hao; Chiang, Rui-Dong;
    2013-09-01 Prediction of Members' Return Visit Rates Using a Time Factor Chiang, Rui-Dong; Wang, Yi-Hsin;
    2013-09-01 Ultrasound-Guided Aspiration and Ethanol Sclerotherapy (EST) for Treatment of Cyst Recurrence in Patients after Previous Endometriosis Surgery: Analysis of Influencing Factors Using a Decision Tree Chang, Ming-Yang; Hsieh, Chia-Lin;
    2013-09-01 Multiantenna Relay Beamforming Design for QoS Discrimination in Two-way Relay Networks Xiong, K.; Zhang, Y.;
    2013-09 Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks Chang, Chao-Tsun; Chang, Chih-Yung;
    2013-09 Time series pattern discovery by a PIP-based evolutionary approach Chen, Chun-Hao; Tseng, Vincent S.;
    2013-09 Panoramic Human Structure Maintenance based on Invariant Features of Video Frames Chang, Shih-Ming; Chang, Hon-Hang;
    2013-09 Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy Peng, Jian-Wen; Horng, Wen-Bing;
    2013-09 Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards Shieh, Wen-Gong; Horng, Wen-Bing;
    2013-09 Non-interactive Fair Deniable Authentication Protocols with Indistinguishable Confidentiality and Anonymity Hwang, Shin-Jia; Chi, Jen-Fu;
    2013-09 MOGA-based fuzzy data mining with taxonomy Chen, Chun-Hao; He, Ji-Syuan;
    2013-08-30 A Straight Line Preserving Seam Carving Technique Tsai, Yih Jia; Lin, Hwei Jen;
    2013-08-01 A Multi-Agents Coordination Mechanism to Improving Real-Time Strategy on Tower Defense Game Lo, Steven K.C.; Keh, Huan-Chao;

    Showing items 201-225 of 961. (39 Page(s) Totally)
    << < 4 5 6 7 8 9 10 11 12 13 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback