淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64185/96962 (66%)
Visitors : 12185166      Online Users : 24465
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Journal Article [1057/1143]
    Monograph [65/83]
    Chapter [19/60]
    Research Paper [106/448]
    Thesis [958/960]
    Patent [16/31]
    Audio Visual Work [0/1]
    Others [4/5]

    Collection Statistics

    Item counts issued in 3 years: 58(3.13%)
    Items With Fulltext: 929(50.11%)

    Download counts of the item
    Download times greater than 0: 929(100.00%)
    Download times greater than 10: 929(100.00%)
    Total Bitstream Download Counts: 449655(38.70%)

    Last Update: 2025-06-09 16:57


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 501-550 of 1852. (38 Page(s) Totally)
    << < 6 7 8 9 10 11 12 13 14 15 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2012-06-25 Cooperative MAC Protocol for Multi-Channel Wireless Networks Hung, Li-ling; Chang, Chih-yung;
    2007-05-21 Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks Chang, Shih-Hao; Merabti, M.;
    2011-01 A Coordinate Transformation System Based on the Human Feature Information Chang, Shih-ming; TSai, Joseph;
    1992-01 Coping with failure : disciplined exception handling in logic programming 施國琛; Shih, Timothy K.
    2019-04-06 Copy-Move Forgery Detection by Deep Fusion Neural Network Chen, Chien-Chang; Duan, Wei-Kang
    2002-07 Copyright protection with program gene Hung, Jason C.; Chang, Chin-chen;
    2007-09-14 Corrosion Evaluation of Hot Dip Galvanized Insulator Pins with Image Processing Techniques Cheng, Jiin-rong; Horng, Wen-bing;
    2002-10 Course Authoring and On-Line Learning System with Student Assessment Algorithm for Distance Education Shih, Timothy K.; Lin, Nigel H.;
    2002-09 Course authoring and student assessment system for distance learning Chang, Flora Chia-i; Shih, Timothy K.;
    2007-09 A Courseware Authoring Tool for Achieving Interoperability among Various E-Learning Specifications Based on Web 2.0 Technologies Wang, te-hua; Yen, neil Y.;
    2004-06 Courseware development using influence diagram with SCORM compatibility Chang, F.C.-I.; Chang, Wen-chih;
    2024-07-09 Courtroom Transcription: A Deep Learning Approach to Legal Terminology and Speaker Identification Jhang, Syu-Jhih; Chang, Hsiang-Chuan;
    2005-08 Create non-duplicated simultaneous web search by six-direction search mechanisms 陳瑞發; Chen, Jui-fa;
    2000-10 Criteria of virtual university operation Shih, Timothy K.
    2008-10 A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture Chang, Chung-i; Lin, N.P.;
    2014-11-03 A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People Lin, Chi-Yi; Huang, Shih-Wen;
    2010-12 Cryptanalysis of a More Secure Remote User Authentication Scheme Horng, Wen-bing; Lee, Cheng-Ping;
    2012-11 Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol Horng, Wen-Bing; Peng, Jian-Wen;
    2002-05 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-Jia; Chen, Chiu-Chin
    2003-12 Cryptanalysis of publicly verifiable authenticated encryption 黃仁俊
    2010-11 Cryptanalysis on Sun-Yeh's password-based authentication and key distribution protocols with perfect forward secrecy 洪文斌; Horng, Wen-bing
    1991-10 Cryptographic authentication of passwords Chang, C. C.; 黃心嘉;
    1992-01 A cryptographic key management scheme for access control in a tree structure Hwang, yen-junn; 黃仁俊
    2016-07-13 Curriculum Design – A Data-Driven Approach Chang, Jung-Kuei; Tsao, Nai-Lung;
    2024-07-09 Customized Expertise: Compact Language Models with Enhanced QA for Enterprises Chang, Y. J.; Huang, Y. J.;
    1992-11 Cyclic inheritance detection for object-oriented database Chiang, Ding-an; Lee, Ming-chi
    2021-01-10 Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification Chen, Shih-Hsin; Tai, I-Hsin;
    2010-12 A Data Collection Mechanism for Disconnected Regions in Mobile Wireless Sensor Networks 藍念慈; 蔡鏸容;
    2019-04-27 Data Collection Mechanism for Maximizing Throughput Using Uncontrolled Mobile Sink in Wireless Sensor Networks Lin, Chung-Chih; Chang, Chih-Yung;
    2010-12 Data Collection Mechanisms for Localized Mobile Targets in Wireless Mobile Sensor Networks 蔡鏸容; 藍念慈;
    2019-07-18 Data Collection using Multiple Mobile Sinks for Prolonging Network Lifetime in WSNs Wen, W. M.; Shang, C. J.;
    2017-07-09 Data Consideration for At-risk Students Early Alert Tsao, Nai-Lung; Kuo, Chin-Hwa;
    2016-05-15 Data Gathering in Wireless Sensor Networks with Uncontrolled Sink Mobility Cheng, C.F.; Lee, H.
    2000-07-08 Data management in university 21 using object-oriented database and CORBA 施國琛; Shih, Timothy K.
    2009-12 A Data-Centric Mechanism for Wireless Sensor Networks with Weighted Queries Hung, Li-Ling; Chang, Sheng-Wen;
    1996-07 Database support for intelligent tutoring software Shih, Timothy K.; Kuo, Chin-hwa
    2000-06 Database support of Web course development with design patterns Shih, Timothy K.; Chang, Shi-Kuo;
    2018-04-15 DBS: A Dynamic Bandwidth Selection MAC Protocol for Channel Bonding in IEEE 802.11ac WLANs Chen, Yen-Da; Wu, De-Ren;
    2010-06 A Dead-End Free Deployment Algorithm for Wireless Sensor Networks with Obstacles 張志勇
    2018-09-11 Deblurring a Camera- Shake Image Using a Thinning Kernel Yen, Shwu-Huey; Chen, Pin-An;
    2007-10 Decentralized Hole-Shape Regulation Technique for Enhancing Patrol and Deployment Tasks in Mobile WSNs 張志勇; Chang, Chih-yung
    2009-09 A Decentralized Minislot Scheduling Protocol (DMSP) for Uplink and Downlink Traffic in IEEE 802.16 Wireless Mesh Networks 石貴平; Shih, kuei-ping;
    2008-12 A Decentralized Uplink and Downlink Traffic Scheduling in IEEE 802.16 Wireless Mesh Networks 石貴平; Shih, kuei-ping;
    1997-05-05 Decomposition of multiple inheritance DAGs for object-oriented software measurement 施國琛; Shih, Timothy K.;
    1996-10-28 Decomposition of multiple inheritance DAGs for testing Chung, Chi-ming; Shih, Timothy K.;
    2024-10-29 Deep-Learning-Based Risk Prediction with Urban Sensing Data for Consumer Driving Safety Lin, Kun-Yu; Liu, Pei-Yi;
    2010-03 Delay-Tolerant Data Collection Mechanisms for Disconnected Targets in Wireless Mobile Sensor Networks 謝震宇; 張志勇;
    2013-08-23 A Delegation-based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation 黃心嘉; 黃心嘉
    1999-12 Delivering voice on the internet 郭經華; Kuo, Chin-hwa;
    2000-08 Delivering voice over the Internet Kuo, Chin-Hwa; Chio, Chia-Lin;

    Showing items 501-550 of 1852. (38 Page(s) Totally)
    << < 6 7 8 9 10 11 12 13 14 15 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback