English |
正體中文
|
简体中文
|
Items with full text/Total items : 62797/95867 (66%)
Visitors : 3734273 Online Users : 410
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library & TKU Library IR team.
Scope
All of 機構典藏
College of Engineering
Graduate Institute & Department of Computer Science and Information Engineering
--Journal Article
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
機構典藏
>
College of Engineering
>
Graduate Institute & Department of Computer Science and Information Engineering
>
Journal Article
>
Browse By Title
Browse By Date
Browse By Authors
Loading...
Siblings
Proceeding
[
935
/1849]
Monograph
[
66
/87]
Chapter
[
19
/60]
Research Paper
[
106
/470]
Thesis
[
957
/958]
Patent
[
16
/31]
Audio Visual Work
[
0
/1]
Others
[
4
/5]
Collection Statistics
Item counts issued in 3 years: 42(3.76%)
Items With Fulltext: 944(84.44%)
Download counts of the item
Download times greater than 0: 944(100.00%)
Download times greater than 10: 931(98.62%)
Total Bitstream Download Counts: 261709(27.28%)
Last Update: 2024-03-28 16:49
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
Recognition of Glaucomatous Fundus ...
Efficiet Encrypted Image Retrieval ...
Effect of Hypoalbuminemia on Mortal...
Prognostic Factors of Cirrhotic Pat...
Effects of Taiwan's COVID-19 Alert ...
偏常態加速破壞衰變模型之貝氏方法
MASPP and MWASP: Multi-Head Self-At...
SV2-SQL: A Text-to-SQL Transformati...
A Recharging Mechanism for Improvin...
JCF: Joint Coarse and Fine-Grained ...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 351-375 of 1125. (45 Page(s) Totally)
<<
<
10
11
12
13
14
15
16
17
18
19
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2005-01-01
Context-aware privacy and security agents for distance education
Yee, George
;
Korba, Larry
;
Li, Nigel H.
;
施國琛
;
Shih, Timothy K.
2016-05
A Context-Aware, Interactive M-Health System for Diabetics
蔣璿東
;
Chiang, Rui-dong
;
Wu, Shih-jung
;
Chang, Wei-ting
;
Rui-Dong Chiang
2019-08-10
Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor
張志勇
2018-08-10
Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor Networks
Weimin Wen
;
Chih-Yung Chang
;
Shenghui Zhao
;
Cuijuan Shang
2007-02
Cooperative System for 4G Wireless Communication Networks
Wang, Ying Hong
;
Huang, Hui Min
;
Yu, Chin Yung
2008-04
Cooperative System for Micromobility Management in Wireless Communication Networks
Wang, Ying Hong
;
Huang, Hui Min
;
Hsu, Chih Peng
1999-03
Correlation of fuzzy sets
Chiang, Ding-an
;
Lin, Nancy P.
;
林丕靜
2001-09
A Cost-Effective Method for Early Fraud Detection in Online Auctions
Shih, Timothy K.
;
Chiu, Chuan-Feng
;
Hsu, Hui-Huang
;
Ma, Jianhua
;
Yang, Che-Yu
2005-09
Courseware development using influence diagram supporting e-learning specification
施國琛
;
Shih, Timothy K.
2021-06-11
Coverage-Aware Recharging Scheduling Using Mobile Charger in Wireless Sensor Networks
BHARGAVI DANDE
;
SHI-YONG CHEN
;
HUAN-CHAO KEH
;
SHIN-JER YANG
;
DIPTENDU SINHA ROY
2011-11
Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
Shieh, Wen-Gong
;
Horng, Wen-Bing
2003-04
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Hwang, Shin-jia
;
Chen, Chiu-chin
2003-04
Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme
黃心嘉
;
Hwang, Shin-jia
;
李恩堤
;
Li, En-ti
2002-11
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
Hwang, Min-shiang
;
Lee, Cheng-ch
;
Hwang, Shin-jia
;
;
黃心嘉
;
Hwang, Min-shiang
2013-09
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
Peng, Jian-Wen
;
Horng, Wen-Bing
;
Chiu, Ying-Ching
;
Liu, Chao-Sheng
;
Horng, Wen-Bing
2013-09
Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
Shieh, Wen-Gong
;
Horng, Wen-Bing
;
Horng, Wen-Bing
2005-01-01
Cryptanalysis on stream ciphers for GSM networks
黃仁俊
;
Hwang, Ren-junn
;
Su, Feng-fu
1992-05
Cryptographic key assignment scheme for access control in a hierarchy
Chang, Chin Chen
;
Hwang, Ren-junn
;
Wu, Tzong-Chen
2023-03
CSCP: Energy Charging Mechanism for Surveillance Quality, Network Connectivity and Perpetual Lifetime in WRSNs
Kan, Yuanping
;
Chang, C. Y.
;
Wu, Shih-Jung
;
Kuo, Chin-Hwa
;
Roy, Diptendu Sinha
2009-11
The Cyclic Model Analysis on Sequential Patterns
Chiang, Ding-An
;
Wang, Cheng-Tzu
;
Chen, Shao-Ping
;
Chen, Chun-Chi
2011-12
Danger warning via fuzzy inference in an RFID-deployed environment
Hsu, Hui-Huang
;
Chen, Bo-Kai
;
Lin, Chi-Yi
;
Leonard Barolli
;
Makoto Takizawa
2021-03-11
Data analysis of simulated WoT-based anti-crime scenario
Kuang, Chih-Chi
;
Wang, Kuei Min
;
Hui, Lin
;
Chang, Chuan-Yu
;
Chiu, Kuang Hui
1998-03
Data conflict resolving in distributed co-editing
Kuo, Chin-hwa
;
葛煥昭
;
Keh, Huan-chao
;
Chio, Chia-lin
2016-04
Data Gathering in Wireless Sensor Networks: A Combine–TSP–Reduce Approach
Cheng, Chien-Fu
;
Yu, Chao-Fu
2017-01-15
Data Gathering Problem with the Data Importance Consideration in Underwater Wireless Sensor Networks
Cheng, Chien-Fu
;
Li, Lung-Hao
Showing items 351-375 of 1125. (45 Page(s) Totally)
<<
<
10
11
12
13
14
15
16
17
18
19
>
>>
View [
10
|
25
|
50
] records per page
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library & TKU Library IR teams.
Copyright ©
-
Feedback