English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62861/95882 (66%)
Visitors : 4248067      Online Users : 762
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    會議論文 [935/1849]
    專書 [66/87]
    專書之單篇 [19/60]
    研究報告 [106/470]
    學位論文 [957/958]
    專利 [16/31]
    視聽著作 [0/1]
    其他 [4/5]

    Collection Statistics

    近3年內發表的文件: 43(3.81%)
    含全文筆數: 955(84.59%)

    文件下載次數統計
    下載大於0次: 955(100.00%)
    下載大於10次: 938(98.22%)
    檔案下載總次數: 269726(27.50%)

    最後更新時間: 2024-05-05 08:06


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 101-150 of 1129. (23 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1983-12 A New Ranking Technique of Fuzzy Alternatives and Its Applications to Decision-making 趙榮耀; Chow, Louis R.;
    2004-09 A new scheme to protect confidential Images Chang, Chin-chen; 黃仁俊;
    2013-02 A New Two-factor Dynamic ID-based Remote User Authentication Scheme Hwang, Ren-Junn; Su, Feng-Fu;
    2008-04 A New WSD approach using word ontology and concept distribution Hung, Jason C.
    2009 A note on due-date assignment and single machine scheduling with a learning/aging effect Chang, P. C.; Chen, S. H.;
    2004-05-08 A note on inventory model involving variable lead time with defective units for mixtures of distribution Lee, Wen-chuan; 吳忠武;
    2015-01-09 A Novel Algorithm for Mining Closed Temporal Patterns from Interval-Based Data Chen, Yi-cheng
    2020-03-04 A Novel Message Authentication Scheme with Absolute Privacy for the Internet of Things Networks Jian Li; Zhenjiang Zhang;
    2007-01 A Novel Method to Determine Optimum Cluster Size in Wireless Sensor Networking 王英宏; Wang, Ying-hong;
    2009-09 A Novel Multi-Channel MAC Protocol with Directional Antenna for Enhancing Spatial Reuse and Bandwidth Utilization in WLANs Chang, Chih-Yung; Chen, Yu-Chieh;
    2017-07 A Novel Software-Defined Wireless Network Architecture to Improve Ship Area Network Performance. Shih-Hao Chang; Hung Mao-Sheng
    2010-05 A novel strategy approach for agent-based resource management system Lo, Steven K.C.; Wang, Lu;
    2008-07 A novel technique for real-time internet radio recorder on non-DSP embedded system Hwang, Lain-jinn; Shih, Chien-chou;
    2018 A novel VENOM attack identification mechanism in cloud virtualization environment Chang, Shih-Hao; Cheick, Abdoul-Kader
    2010-03 A parametric analysis for single machine scheduling with past-sequence-dependent setup times Mani, V.; Chang, P. C.;
    2015-10-01 A Passive Self-Configuration MAC Protocol for Supporting Network Management in IEEE802.11-Based Multi-Hop Mobile Ad Hoc Networks Sheng-Shih Wang; Chun-Chih Li;
    2012-01 A Path Recovery Routing Protocol Based on Clustering Coefficient in Ad Hoc Networks YAO, Chenhan; TSAI, Yihjia;
    2002-03 A PC Cluster High-Fidelity Mobile Crane Simulator 黃俊堯; Huang, Jiung-yao;
    2004-04 A personalized recommender system for the cosmetic business Wang, Yi-fan; Chuang, Yu-liang;
    2011-02 A Physical/Virtual Carrier-sense-based Power Control MAC Protocol for Collision Avoidance in Wireless Ad Hoc Networks Shih, Kuei-Ping; Chen, Yen-Da;
    1996-01 A Platform for CASE Environment 莊淇銘; Chung, Chi-ming;
    1996-03 A platform for CASE framework 莊淇銘; Chung, Chi-ming
    2008-09 A Postpaid Micropayment Scheme with Revocable Customers' Anonymity Hwang, Shin-Jia; Huang, Chia-Wei;
    2000-06 A Qualitative Approach to Content-Based Color Image Retrieval with Chinese Captions 施國琛; Shih, Timothy K.;
    1996-09 A quantitative analysis for different testing criteria through program decomposition 莊淇銘; Chung, Chi-ming;
    2008-03 A Real-Time Driver Fatigue Detection System Based
    on Eye Tracking and Dynamic Template Matching
    Horng, Wen-bing; Chen, Chih-yuan;
    2015-02 A Recursive Byzantine-Resilient Protocol Cheng, Chien-Fu; Tsai, Kuo-Tang
    2011-01-01 A regression-based approach for mining user movement patterns from random sample data Hung, Chih-Chieh; Peng, Wen-Chih
    1995-10-01 A resolution-based system for symblic approximate reasoning 鍾興臺; Chung, Hsing-tai;
    2007-05 A Scatternet Formation Algorithm for Efficient Routing on Bluetooth Networks 石貴平; Shih, Kuei-ping;
    2014-06-01 A Secure Boolean-based Multi-Secret Image Sharing Scheme 陳建彰; 吳緯杰;
    1992 A secure broadcasting scheme based on discrete logarithms Chang, C.C.; Hwang, Shin-jia;
    2010-05 A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards Horng, Wen-Bing; Lee, Cheng-Ping;
    2012-07 A Self-guided Genetic Algorithm for Permutation Flowshop Scheduling Problems Chen, S. H.; Chang, P. C.;
    2000-01 A Self-stablizing Distributed Spanning Tree Construction/algorithm with a Distributed Demon Pan, Reuay-ching; Wang, Jone-zen;
    2006-10 A Semantic-Aware Methodology Adapt to e-Learning Environment 王英宏; Wang, Ying-hong;
    2017-03 A series-based group stock portfolio optimization approach using the grouping genetic algorithm with symbolic aggregate approximations C. H. Chen; C. H. Yu
    2011-03 A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network Ren-Junn Hwang; Sheng-Hua Shiau;
    1991-01 A shortest path algorithm to find minimal deduction graphs Horng, Wen-bing; Yang, Chao-chih
    1997-07 A simple approach for generating RSA keys Chang, Chin-chen; 黃心嘉;
    2001-12 A simple multi-proxy signature scheme 黃心嘉; Hwang, Shin-jia;
    1998 A simple picture hiding scheme Hwang, Ren-junn; 黃仁俊
    2007-12-01 A Six-Directional Static Searching Mechanism in a Distributed Virtual World Chen, Jui-Fa; Lin, Wei-Chuan;
    2008-03-01 A Smart Pre-Warning, Guide, Alarm, Recovery and Detection (GUARD) Network System for the Blind 李揚漢; Lee, Yang-han;
    2015-04 A Step Counting Algorithm for Smartphone Users: Design and Implementation Pan, Meng-Shiuan; Lin, Hsueh-Wei;
    2017-12 A Stepwise Multichannel MAC Protocol for Improving Bandwidth Utilization in Wireless Ad Hoc Networks Chih-Yung Chang; Chao-Tsun Chang;
    1995 A strategic development framework of hci design Shaw, Ruey-shiang; Huang, Henry C.;
    2011-03-01 A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity Hwang, Shin-Jia; Cheng, Kai-Lung;
    2006-01 A Study of Disjunctive Information in Fuzzy Relational Databases 王明華; Wang, Ming-hua;
    1995 A study of human information acquisition analyzer (IAA): a neural network approach 蕭瑞祥; Shaw, Ruey-shiang;

    Showing items 101-150 of 1129. (23 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback