English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 54059/88894 (61%)
造访人次 : 10549765      在线人数 : 16
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    期刊論文 [713/925]
    專書 [54/73]
    專書之單篇 [19/60]
    研究報告 [105/460]
    學位論文 [955/956]
    專利 [5/17]
    視聽著作 [0/1]
    其他 [4/5]


    近3年内发表的文件: 60(3.56%)
    含全文笔数: 803(47.66%)

    下载大于0次: 803(100.00%)
    下载大于10次: 798(99.38%)
    全文下载总次数: 244761(36.45%)

    最后更新时间: 2019-10-18 01:53





    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]

    显示项目1151-1175 / 1683. (共68页)
    << < 42 43 44 45 46 47 48 49 50 51 > >>

    2002-12 Repairing ElGamal-Like Multi-Signature Schemes Using Self-Certified Public Keys Hwang, Shin-Jia; Lee, Yun-Hwa
    2006-05 Research and Development on Searching a Routing Path of a Dynamic Terrain 陳瑞發; Chen, Jui-fa;
    1998-02-09 Research issues in multimedia databases 施國琛; Shih, Timothy K.
    2011-12 A Research on the Introduction of Content Evaluation Indicators into E-book Reading Framework through Cloud Service Lo, Steven K.C.; Chung, Chi-Ming;
    2019-07-07 Residual Learning Based Convolutional Neural Network for Super Resolution Lin, Hwei Jen; Tokuyama, Yoshimasa;
    2014-07-09 Rethinking Flow Theory: The Role of Learning Emotions in Computer Education Wang, Chih-Chien; Wang, Kai-Li;
    2006-07 Reusability on Learning Object Repository 施國琛; Shih, Timothy K.;
    1996-06 Reusable multimedia presentations 施國琛; Shih, Timothy K.;
    2010-11-01 RFID-based Danger Prevention for Home Safety Hsu, Hui-huang; Chen, Po-kai;
    2009-07 RFID-Based Personalized Behavior Modeling Hsu, Hui-huang; Cheng, Zixue;
    2011-03-24 An RFID-Based Reminder System for Smart Home Hsu, Hui-huang; Lee, Cheng-ning;
    2006-10 RGP: Active route guiding protocol for wireless sensor networks with obstacle 石貴平; Shih, Kuei-ping;
    2003-12 A Ring Scatternet Construction Protocol for Bluetooth Wireless Networks Chang, Chih-Yung; Hsu, Chung-Hsien;
    2015-05-28 A Ring Signature Scheme with Anonymous Strong-Designated Verifiers 黃心嘉; 莊嘉富;
    2009-11 A Ring Signature Scheme with Strong Designated Verifiers to Provide Singer Anonymity 黃心嘉; Hwang, shin-jia;
    1991-06 Robabilistic deductive and abductive reasoning by using probabilistic deduction graphs and Integer programming Li, Han-lin; Yang, Chao-chih;
    2006-08-20 Robust Clustering based on Winner-Population Markov Chain Yang, Fu-wen; Lin, Hwei-jen;
    2016-11-14 Robust Copy-move Forgery Detection through Invariant Moment Features Chen, Chien-Chang; Wang, Han
    2016-11-14 Robust Copy-move Forgery Detection through Invariant Moment Features Wang, Chien-Chang Chen and Han
    2015-07-18 A Robust Method for AOI System Design Wang, Bal 汪 柏; Lin, Chia-Yung 林家永;
    2009-12 A Robust Video Watermarking Scheme of H.264 Yen, shwu-huey; Chang, mei-chueh;
    2009-11 ROI Tracking and Enhancement in Low-Quality Video Sequences 顏淑惠; Yen, Shwu-huey;
    2010-09 A Routing Protocol based on Power-controlled Sleep Schedulingfor Wireless Sensor Networks 王英宏
    2009-05 A Run-Time Infrastructure of Voronoi Network Based on Hla Chen, Jui-Fa; Jian, Chih-Yu;
    2015-09-03 SAX-based Group Stock Portfolio Mining Approach Chen, C. H.; Lu, C. Y.;

    显示项目1151-1175 / 1683. (共68页)
    << < 42 43 44 45 46 47 48 49 50 51 > >>

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈