English
| 正體中文 |
简体中文
|
全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 11550792 線上人數 : 22070
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library & TKU Library IR team.
搜尋範圍
全部機構典藏
工學院
資訊工程學系暨研究所
--期刊論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
主頁
‧
登入
‧
上傳
‧
說明
‧
關於機構典藏
‧
管理
淡江大學機構典藏
>
工學院
>
資訊工程學系暨研究所
>
期刊論文
>
依題名瀏覽
依日期瀏覽
依作者瀏覽
資料載入中.....
鄰近類別
會議論文
[
929
/1854]
專書
[
65
/83]
專書之單篇
[
19
/60]
研究報告
[
106
/448]
學位論文
[
958
/960]
專利
[
16
/31]
視聽著作
[
0
/1]
其他
[
4
/5]
類別統計
近3年內發表的文件: 59(5.16%)
含全文筆數: 1057(92.48%)
文件下載次數統計
下載大於0次: 1057(100.00%)
下載大於10次: 1057(100.00%)
檔案下載總次數: 334724(28.84%)
最後更新時間: 2025-06-07 13:04
上傳排行
資料載入中.....
下載排行
資料載入中.....
最近上傳
Meta Network for Flow-Based Image S...
Source-Free Domain Adaptation via E...
Empirical Spatial Density-Based Eme...
Arbitrary style transfer system wit...
Effective Document Image Rectificat...
Convergence of Technological Social...
Energy-Balanced Optimization on Fly...
SARA: Sandwiched attestation throug...
Memory attestation of wireless sens...
CNTNF framework focus on forecastin...
跳至:
[
中文
] [
數字0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
請輸入前幾個字:
顯示項目351-375 / 1143. (共46頁)
<<
<
10
11
12
13
14
15
16
17
18
19
>
>>
每頁顯示[
10
|
25
|
50
]項目
日期
題名
作者
2018-10-25
Constructing a network evaluation framework for improving the financial ecosystem in small-medium size firms
Lin, Cheng Shian
;
Lin, Chun Yueh
2004-10
Constructing Detection Knowledge for DDoS Intrusion Tolerance
林順傑
;
Lin, Shun-chieh
;
Tseng, Shian-shyong
2015
Constructing interactive multi-view videos based on image-based rendering
Shih-Ming Chang
;
Joseph C. Tsai
;
Shwu-Huey Yen
;
Timothy K. Shih
2008-12
Constructing the Multi-Agents Communication Model to Implement Dynamic Intelligent System
Lo, Steven K. C.
;
Lin, Jen-chih
;
葛煥昭
;
Keh, Huan-chao
;
Lin, Yi-hung
;
Wang, Wan-chih
2012-01
Content Adaptation For Context-Aware Service
Jui-Fa Chen
;
Ying-Hong Wang
;
Jingo Chenghorng Liao
;
Chen-An Wang
2006-06
Content-Based Image Retrieval Trained by Adaboost for Mobile Application
Lin, Hwei-jen
;
Kao, Yang-ta
;
Yang, Fu-wen
;
Wang, Patrick S. P.
2005-01-01
Context-aware privacy and security agents for distance education
Yee, George
;
Korba, Larry
;
Li, Nigel H.
;
施國琛
;
Shih, Timothy K.
2016-05
A Context-Aware, Interactive M-Health System for Diabetics
蔣璿東
;
Chiang, Rui-dong
;
Wu, Shih-jung
;
Chang, Wei-ting
;
Rui-Dong Chiang
2024-01-11
Convergence of Technological Social Changes in the Development of Intelligent Technology Innovation System in Taiwan
Chen, Duen-kai
2019-08-10
Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor
張志勇
2018-08-10
Cooperative Data Collection Mechanism Using Multiple Mobile Sinks in Wireless Sensor Networks
Weimin Wen
;
Chih-Yung Chang
;
Shenghui Zhao
;
Cuijuan Shang
2007-02
Cooperative System for 4G Wireless Communication Networks
Wang, Ying Hong
;
Huang, Hui Min
;
Yu, Chin Yung
2008-04
Cooperative System for Micromobility Management in Wireless Communication Networks
Wang, Ying Hong
;
Huang, Hui Min
;
Hsu, Chih Peng
1999-03
Correlation of fuzzy sets
Chiang, Ding-an
;
Lin, Nancy P.
;
林丕靜
2001-09
A Cost-Effective Method for Early Fraud Detection in Online Auctions
Shih, Timothy K.
;
Chiu, Chuan-Feng
;
Hsu, Hui-Huang
;
Ma, Jianhua
;
Yang, Che-Yu
2005-09
Courseware development using influence diagram supporting e-learning specification
施國琛
;
Shih, Timothy K.
2021-06-11
Coverage-Aware Recharging Scheduling Using Mobile Charger in Wireless Sensor Networks
BHARGAVI DANDE
;
SHI-YONG CHEN
;
HUAN-CHAO KEH
;
SHIN-JER YANG
;
DIPTENDU SINHA ROY
2011-11
Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
Shieh, Wen-Gong
;
Horng, Wen-Bing
2003-04
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Hwang, Shin-jia
;
Chen, Chiu-chin
2003-04
Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme
黃心嘉
;
Hwang, Shin-jia
;
李恩堤
;
Li, En-ti
2002-11
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
Hwang, Min-shiang
;
Lee, Cheng-ch
;
Hwang, Shin-jia
;
;
黃心嘉
;
Hwang, Min-shiang
2013-09
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
Peng, Jian-Wen
;
Horng, Wen-Bing
;
Chiu, Ying-Ching
;
Liu, Chao-Sheng
;
Horng, Wen-Bing
2013-09
Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
Shieh, Wen-Gong
;
Horng, Wen-Bing
;
Horng, Wen-Bing
2005-01-01
Cryptanalysis on stream ciphers for GSM networks
黃仁俊
;
Hwang, Ren-junn
;
Su, Feng-fu
1992-05
Cryptographic key assignment scheme for access control in a hierarchy
Chang, Chin Chen
;
Hwang, Ren-junn
;
Wu, Tzong-Chen
顯示項目351-375 / 1143. (共46頁)
<<
<
10
11
12
13
14
15
16
17
18
19
>
>>
每頁顯示[
10
|
25
|
50
]項目
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library & TKU Library IR teams.
Copyright ©
-
回饋