淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64185/96959 (66%)
Visitors : 11659028      Online Users : 15704
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Proceeding [929/1854]
    Monograph [65/83]
    Chapter [19/60]
    Research Paper [106/448]
    Thesis [958/960]
    Patent [16/31]
    Audio Visual Work [0/1]
    Others [4/5]

    Collection Statistics

    Item counts issued in 3 years: 59(5.16%)
    Items With Fulltext: 1057(92.48%)

    Download counts of the item
    Download times greater than 0: 1057(100.00%)
    Download times greater than 10: 1057(100.00%)
    Total Bitstream Download Counts: 334815(28.84%)

    Last Update: 2025-06-07 23:16


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 351-375 of 1143. (46 Page(s) Totally)
    << < 10 11 12 13 14 15 16 17 18 19 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2018-10-25 Constructing a network evaluation framework for improving the financial ecosystem in small-medium size firms Lin, Cheng Shian; Lin, Chun Yueh
    2004-10 Constructing Detection Knowledge for DDoS Intrusion Tolerance 林順傑; Lin, Shun-chieh;
    2015 Constructing interactive multi-view videos based on image-based rendering Shih-Ming Chang; Joseph C. Tsai;
    2008-12 Constructing the Multi-Agents Communication Model to Implement Dynamic Intelligent System Lo, Steven K. C.; Lin, Jen-chih;
    2012-01 Content Adaptation For Context-Aware Service Jui-Fa Chen; Ying-Hong Wang;
    2006-06 Content-Based Image Retrieval Trained by Adaboost for Mobile Application Lin, Hwei-jen; Kao, Yang-ta;
    2005-01-01 Context-aware privacy and security agents for distance education Yee, George; Korba, Larry;
    2016-05 A Context-Aware, Interactive M-Health System for Diabetics 蔣璿東; Chiang, Rui-dong;
    2024-01-11 Convergence of Technological Social Changes in the Development of Intelligent Technology Innovation System in Taiwan Chen, Duen-kai
    2019-08-10 Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor 張志勇
    2018-08-10 Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor Networks Weimin Wen; Chih-Yung Chang;
    2007-02 Cooperative System for 4G Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    2008-04 Cooperative System for Micromobility Management in Wireless Communication Networks Wang, Ying Hong; Huang, Hui Min;
    1999-03 Correlation of fuzzy sets Chiang, Ding-an; Lin, Nancy P.;
    2001-09 A Cost-Effective Method for Early Fraud Detection in Online Auctions Shih, Timothy K.; Chiu, Chuan-Feng;
    2005-09 Courseware development using influence diagram supporting e-learning specification 施國琛; Shih, Timothy K.
    2021-06-11 Coverage-Aware Recharging Scheduling Using Mobile Charger in Wireless Sensor Networks BHARGAVI DANDE; SHI-YONG CHEN;
    2011-11 Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices Shieh, Wen-Gong; Horng, Wen-Bing
    2003-04 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-jia; Chen, Chiu-chin
    2003-04 Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme 黃心嘉; Hwang, Shin-jia;
    2002-11 Cryptanalysis of the Hwang-Shi Proxy Signature Scheme Hwang, Min-shiang; Lee, Cheng-ch;
    2013-09 Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy Peng, Jian-Wen; Horng, Wen-Bing;
    2013-09 Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards Shieh, Wen-Gong; Horng, Wen-Bing;
    2005-01-01 Cryptanalysis on stream ciphers for GSM networks 黃仁俊; Hwang, Ren-junn;
    1992-05 Cryptographic key assignment scheme for access control in a hierarchy Chang, Chin Chen; Hwang, Ren-junn;

    Showing items 351-375 of 1143. (46 Page(s) Totally)
    << < 10 11 12 13 14 15 16 17 18 19 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback