English
| 正體中文 |
简体中文
|
全文筆數/總筆數 : 64185/96962 (66%)
造訪人次 : 12634507 線上人數 : 2906
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library & TKU Library IR team.
搜尋範圍
全部機構典藏
工學院
資訊工程學系暨研究所
--會議論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
主頁
‧
登入
‧
上傳
‧
說明
‧
關於機構典藏
‧
管理
淡江大學機構典藏
>
工學院
>
資訊工程學系暨研究所
>
會議論文
>
依題名瀏覽
依日期瀏覽
依作者瀏覽
資料載入中.....
鄰近類別
期刊論文
[
1057
/1143]
專書
[
65
/83]
專書之單篇
[
19
/60]
研究報告
[
106
/448]
學位論文
[
958
/960]
專利
[
16
/31]
視聽著作
[
0
/1]
其他
[
4
/5]
類別統計
近3年內發表的文件: 58(3.13%)
含全文筆數: 929(50.11%)
文件下載次數統計
下載大於0次: 929(100.00%)
下載大於10次: 929(100.00%)
檔案下載總次數: 450895(38.70%)
最後更新時間: 2025-06-13 05:03
上傳排行
資料載入中.....
下載排行
資料載入中.....
最近上傳
Application of Lidar Detection Modu...
從判決到預測:台灣法院判決文之車禍慰撫金建模前處理研究
PGNet v2: Enhancing Aesthetic Image...
Vehicle Tracking Using Lane Cameras...
Image Outpainting Based On Attentio...
Deep-Learning-Based Risk Prediction...
Mifare classic的僅卡攻擊
在叢集式無線感測網路下改善隱藏生成點的基於橢圓曲線之金鑰交換協定
Memory attestation of wireless sens...
Enhanced integrity reporting scheme...
跳至:
[
中文
] [
數字0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
請輸入前幾個字:
顯示項目1301-1350 / 1852. (共38頁)
<<
<
22
23
24
25
26
27
28
29
30
31
>
>>
每頁顯示[
10
|
25
|
50
]項目
日期
題名
作者
2009-05
A Run-Time Infrastructure of Voronoi Network Based on Hla
Chen, Jui-Fa
;
Jian, Chih-Yu
;
Chen, an-Jiung
2015-09-03
SAX-based Group Stock Portfolio Mining Approach
Chen, C. H.
;
Lu, C. Y.
;
Yu, C. H.
2004-08
Scalable Peer-to-Peer Network Virtual Environment
陳瑞發
2004-02
Scale-free, small-world model for network communication
蔡憶佳
;
Tsai, Yih-jia
;
Hsiao, Ping-nan
;
Lin, Ching-chang
;
Huang, Wen-fa
1997-07
A scheme of on-line Chinese character recognition using neural network
Lin, hwei-jen
;
Yen, shwu-huey
;
顏淑惠
2005-02-24
SCORM learning sequence modeling with petri nets in cooperative learning
Chang, Wen-chih
;
Lin, H. W.
;
Shih, Timothy K.
;
Yang, Hsuan-che
2006-01
SCORM Sequencing Testing
Shih, Timothy K.
;
Chang, Hsuan-Pu
;
Wang, Chun-Chia
;
Wang, Te-Hua
;
Jan,Kuen-Han
2006-01
SCORM Sequencing Testing for Sequencing Control Mode
Chang, Hsuan-Pu
;
Wang, Chun-Chia
;
Wang, Te-Hua
;
Jan, Kuen Han
;
Shih,Timothy K.
2006-07
SCORM-Based Learning Environment for Supporting Non-Science Majors' Science Learning
Chang, Shu-nu
;
Wang, Te-hua
;
施國琛
;
Shih, Timothy K.
2004-09
SCORM-compliant reader on pocket PC
Shih, Timothy K.
;
Lin, Nigel H.
;
Chang, Hsuan-pu
;
Huang, Huan-chi
;
Chiu, Yuan-kai
2007-12
Scratch Line Removal on Aged Films
Kao, Yang-ta
;
施國琛
;
Shih, Timothy K.
;
Zhong, Hsing-ying
;
Dai, Liang-kuang
2009-05
A Seamless Handover Scheme with Pre-registration in NEMO
王英宏
2011-12
Seamlessly Full-View Tracking Approach for Mobile Object in Camera Sensor Network
Chen, Cheng-chang
;
Hong, Yu-jhe
;
Chiang, Yi-chun
;
Chang, C. Y.
2004-03
A Searching Mechanism on a Distributed Virtual World: Six-Direction Simultaneous Search
陳瑞發
2007-07
The Second International Congress of Algebra and Combinatorics: Dedicated to the 70th birthday of Leonid A. Bokut
林慧珍
2013-09
Secret Sharing on Audio by Integer Wavelet Transform
陳建彰
;
黃建螢
;
陳建彰
2007-09
Secure Authentication Scheme for RFID
黃仁俊
2017-03-27
Secure Data Collection Scheme for Wireless Sensor Networks
Hwang, Ren-Junn
;
Huang, Y. Z.
2007-09
A Secure Data Dissemination for Wireless Sensor Networks
黃仁俊
2015-08-06
Secure Data Transmission Scheme for WSNs
Hwang, Ren Junn
;
Huang, Yan Zhi
2008-11
A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications
黃心嘉
;
Hwang, shin-jia
;
Chai, ming-jhang
2008-06-17
Secure remote control model for information appliances
Shieh, Wen-gong
;
Wang, Jian-min
;
Horng, Wen-bing
2012-11
A secure remote user authentication scheme
Hwang, Ren-junn
;
Hwang, Ren-junn
2010-09
Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards
洪文斌
;
Horng, Wen-bing
2000-05
The security analysis of two authenticated key agreement schemes
黃心嘉
;
Hwang, Shin-jia
;
Shi, Chi-hwai
2004-03
Security and Privacy Technologies for Distance Education Applications
施國琛
2012-05-30
Security Flaws in Zhang and Xu Improved Concurrent Signature Scheme
黃心嘉
;
Hwang, Shin-jia
;
Lee, Yen-Shih Lee
;
黃心嘉
2013-08-23
Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures
黃心嘉
;
黃心嘉
2010-12
Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol
Horng, Wen-bing
;
Lee, Cheng-Ping
;
Peng, Jian-Wen
2004-01-05
Segmentation on color images based on watershed algorithm
Yen, Shwu-huey
;
Tai, An-chi
;
Wang, Chia-jen
2020-09
Self-Balanced Red Black Trees for Dynamic Public Auditing Protocols
Hwang, Shin-Jia
;
Hsu, Wei Chieh
2009-05-29
A Self-guided Genetic Algorithm for Flowshop Scheduling problems
Chen, Shih-Shin
;
Chang, Pei-Chann
;
Zhang, Qingfu
2004-10
Self-organization for IP networking on mobile wireless networks
蔡憶佳
;
Tsai, Yih-jia
;
Lin, C. C.
;
Lin, C. C.
2007-06
A Self-Regulated Learning Attributes-Based Mobile Learning Platform for
石貴平
;
Shih, kuei-ping
;
Kao, tai-chien
;
Chang, chih-yung
;
Chen, hung-chang
;
Hung, chen-jung
2005-06
A self-regulated learning system with scaffolding spport for self-regulated e/m-learning
石貴平
;
Shih, kuei-ping
;
Chang, chih-yung
;
Chen, hung-chang
;
Wang, sheng-shih
2005-06
Self-regulated learning system with scaffolding support for self-regulated e/m-learning
張志勇
;
Chang, Chih-yung
2007-10-16
Semantic Representation and Ontology Construction in the Question Answering System
Wang, Ying-Hong
;
Wang, Wen-Nan
;
Huang, Chu-Chi
;
Chang, Ting-Wei
;
Yen, Yi-Hsiang
;
Wang, Ying-Hong
2006-08
Semi-Partial Correlation of Fuzzy Sets
林丕靜
;
Lin, Nancy P.
;
Chueh, Hao-en
2014-09-10
A Sensor Data Processing and Access Platform based on Hadoop for Smart Environments
Lin, Chi-Yi
;
Li, Chia-Chen
;
Huang, Wei-Hsun
;
Liao, Wei-Che
;
Chen, Wei-Ming
;
林其誼
1992-05
Sensor placement for state estimation in contaminated groundwater systems
Kuo, C. H.
;
Michel, A. N.
;
Gray, W. G.
2013-07-22
A Sequence Frequency Reuse Scheme for Coordinated Multi-Point Transmission in LTE-A
Wang, Ying-Hong
;
Tsai, Chih-Hsiao
;
Chen, Liang-Chain
;
王英宏
2009-08
Sequential Patterns Mining with Fuzzy Time-Intervals
林丕靜
;
Nancy P. Lin
2008-11
A Shared-Integral-Image Approach for Fast Gender Recognition
Shen, Bau-Cheng
;
Chen, Chu-Song
;
Hsu, Hui-Huang
1997-10-13
SharedWeb-a shared virtual environment over World Wide Web
黃俊堯
;
Huang, J. Y.
1992-04
Sharing a dynamic secret
Chang, C. C.
;
黃心嘉
;
Hwang, Shin-jia
2020-10-26
Shooting Estimation Technique Based on the OpenPose System
Chen, Chien-Chang
;
Chang, Chen
;
Chen, Chien-Hua
;
Chen, I-Cheng
;
Lin, Cheng-Shian
2000-05
A simple multi-proxy signature scheme
黃心嘉
;
Hwang, shin-jia
;
Shi, chi-hwai
1912-01
A simple secret key distribution system
Chang, chin-chen
;
Danie J.
;
黃心嘉
;
Hwang, shin-jia
2022-10-28
Simulation analysis of detecting pollution emissions from industrial areas by IoT mechanism
惠霖
;
黃煌文
;
徐文彬
1996-03-11
Simulation management address resolution protocol
黃俊堯
;
Huang, Jiung-Yao
;
莊淇銘
;
Chung, Chi-ming
;
陳瑞發
;
Chen, Jui-fa
;
Dong, Ming-zhi
顯示項目1301-1350 / 1852. (共38頁)
<<
<
22
23
24
25
26
27
28
29
30
31
>
>>
每頁顯示[
10
|
25
|
50
]項目
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library & TKU Library IR teams.
Copyright ©
-
回饋