English
| 正體中文 |
简体中文
|
全文筆數/總筆數 : 64185/96962 (66%)
造訪人次 : 12192051 線上人數 : 24368
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library & TKU Library IR team.
搜尋範圍
全部機構典藏
工學院
資訊工程學系暨研究所
--會議論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
主頁
‧
登入
‧
上傳
‧
說明
‧
關於機構典藏
‧
管理
淡江大學機構典藏
>
工學院
>
資訊工程學系暨研究所
>
會議論文
>
依題名瀏覽
依日期瀏覽
依作者瀏覽
資料載入中.....
鄰近類別
期刊論文
[
1057
/1143]
專書
[
65
/83]
專書之單篇
[
19
/60]
研究報告
[
106
/448]
學位論文
[
958
/960]
專利
[
16
/31]
視聽著作
[
0
/1]
其他
[
4
/5]
類別統計
近3年内发表的文件: 58(3.13%)
含全文笔数: 929(50.11%)
文件下载次数统计
下载大于0次: 929(100.00%)
下载大于10次: 929(100.00%)
全文下载总次数: 449652(38.70%)
最后更新时间: 2025-06-09 15:28
上傳排行
資料載入中.....
下載排行
資料載入中.....
最近上傳
Application of Lidar Detection Modu...
從判決到預測:台灣法院判決文之車禍慰撫金建模前處理研究
PGNet v2: Enhancing Aesthetic Image...
Vehicle Tracking Using Lane Cameras...
Image Outpainting Based On Attentio...
Deep-Learning-Based Risk Prediction...
Mifare classic的僅卡攻擊
在叢集式無線感測網路下改善隱藏生成點的基於橢圓曲線之金鑰交換協定
Memory attestation of wireless sens...
Enhanced integrity reporting scheme...
跳至:
[
中文
] [
數字0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
請輸入前幾個字:
顯示項目501-525 / 1852. (共75頁)
<<
<
16
17
18
19
20
21
22
23
24
25
>
>>
每頁顯示[
10
|
25
|
50
]項目
日期
題名
作者
2012-06-25
Cooperative MAC Protocol for Multi-Channel Wireless Networks
Hung, Li-ling
;
Chang, Chih-yung
;
Wang, Tzu-lin
;
Hsiao, Chin-yao
;
張志勇
2007-05-21
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks
Chang, Shih-Hao
;
Merabti, M.
;
Mokhtar, H.M.
2011-01
A Coordinate Transformation System Based on the Human Feature Information
Chang, Shih-ming
;
TSai, Joseph
;
Shih, Timothy K.
;
Hsu, Hui-huang
;
施國琛
;
許輝煌
1992-01
Coping with failure : disciplined exception handling in logic programming
施國琛
;
Shih, Timothy K.
2019-04-06
Copy-Move Forgery Detection by Deep Fusion Neural Network
Chen, Chien-Chang
;
Duan, Wei-Kang
2002-07
Copyright protection with program gene
Hung, Jason C.
;
Chang, Chin-chen
;
Shih, Timothy K.
2007-09-14
Corrosion Evaluation of Hot Dip Galvanized Insulator Pins with Image Processing Techniques
Cheng, Jiin-rong
;
Horng, Wen-bing
;
Chen, Chih-yuan
;
Peng, Jian-wen
2002-10
Course Authoring and On-Line Learning System with Student Assessment Algorithm for Distance Education
Shih, Timothy K.
;
Lin, Nigel H.
;
Huang, Chun-Hung
2002-09
Course authoring and student assessment system for distance learning
Chang, Flora Chia-i
;
Shih, Timothy K.
;
Lin, Nigel H.
2007-09
A Courseware Authoring Tool for Achieving Interoperability among Various E-Learning Specifications Based on Web 2.0 Technologies
Wang, te-hua
;
Yen, neil Y.
;
Du, yue-in
;
施國琛
;
Shin, timothy K
2004-06
Courseware development using influence diagram with SCORM compatibility
Chang, F.C.-I.
;
Chang, Wen-chih
;
Yang, Hsuan-che
;
Shih, Timothy K.
;
Keh, Huan-chao
2024-07-09
Courtroom Transcription: A Deep Learning Approach to Legal Terminology and Speaker Identification
Jhang, Syu-Jhih
;
Chang, Hsiang-Chuan
;
Zhang, Qiao-yun
;
Chang, Chih-Yung
2005-08
Create non-duplicated simultaneous web search by six-direction search mechanisms
陳瑞發
;
Chen, Jui-fa
;
Lin, Wei-chuan
;
Bai, Hua-sheng
;
Chiou, Heng-yi
2000-10
Criteria of virtual university operation
Shih, Timothy K.
2008-10
A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture
Chang, Chung-i
;
Lin, N.P.
;
張忠義
;
林丕靜
2014-11-03
A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People
Lin, Chi-Yi
;
Huang, Shih-Wen
;
Hsu, Hui-Huang
;
Hsu, Hui-Huang
2010-12
Cryptanalysis of a More Secure Remote User Authentication Scheme
Horng, Wen-bing
;
Lee, Cheng-Ping
;
Peng, Jian-Wen
2012-11
Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
Horng, Wen-Bing
;
Peng, Jian-Wen
;
Liu, Chao-Sheng
;
Chiu, Ying-Ching
;
Horng, Wen-Bing
2002-05
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Hwang, Shin-Jia
;
Chen, Chiu-Chin
2003-12
Cryptanalysis of publicly verifiable authenticated encryption
黃仁俊
2010-11
Cryptanalysis on Sun-Yeh's password-based authentication and key distribution protocols with perfect forward secrecy
洪文斌
;
Horng, Wen-bing
1991-10
Cryptographic authentication of passwords
Chang, C. C.
;
黃心嘉
;
Hwang, Shin-jia
1992-01
A cryptographic key management scheme for access control in a tree structure
Hwang, yen-junn
;
黃仁俊
2016-07-13
Curriculum Design – A Data-Driven Approach
Chang, Jung-Kuei
;
Tsao, Nai-Lung
;
Kuo, Chin-Hwa
;
Hsu, Hui-Huang
2024-07-09
Customized Expertise: Compact Language Models with Enhanced QA for Enterprises
Chang, Y. J.
;
Huang, Y. J.
;
Tao, H. S.
;
Chang, C. Y.
顯示項目501-525 / 1852. (共75頁)
<<
<
16
17
18
19
20
21
22
23
24
25
>
>>
每頁顯示[
10
|
25
|
50
]項目
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library & TKU Library IR teams.
Copyright ©
-
回饋