淡江大學機構典藏
Menu
Search
主頁
登入
上傳
說明
關於機構典藏
管理
切換到一般網頁
English
|
正體中文
|
简体中文
|
全文筆數/總筆數 : 64185/96962 (66%)
造訪人次 : 12109065
線上人數 : 7427
全部機構典藏
工學院
資訊工程學系暨研究所
--會議論文
查詢小技巧:
您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
進階搜尋
功能/連結
淡江大學機構典藏
>
工學院
>
資訊工程學系暨研究所
>
會議論文
>
依題名瀏覽
依日期瀏覽
依作者瀏覽
鄰近類別
期刊論文
[
1057
/1143]
專書
[
65
/83]
專書之單篇
[
19
/60]
研究報告
[
106
/448]
學位論文
[
958
/960]
專利
[
16
/31]
視聽著作
[
0
/1]
其他
[
4
/5]
類別統計
近3年内发表的文件: 58(3.13%)
含全文笔数: 929(50.11%)
文件下载次数统计
下载大于0次: 929(100.00%)
下载大于10次: 929(100.00%)
全文下载总次数: 449652(38.70%)
最后更新时间: 2025-06-09 15:28
上傳排行
資料載入中.....
下載排行
資料載入中.....
最近上傳
Application of Lidar Detection Modu...
從判決到預測:台灣法院判決文之車禍慰撫金建模前處理研究
PGNet v2: Enhancing Aesthetic Image...
Vehicle Tracking Using Lane Cameras...
Image Outpainting Based On Attentio...
Deep-Learning-Based Risk Prediction...
Mifare classic的僅卡攻擊
在叢集式無線感測網路下改善隱藏生成點的基於橢圓曲線之金鑰交換協定
Memory attestation of wireless sens...
Enhanced integrity reporting scheme...
跳至:
[
中文
] [
數字0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
請輸入前幾個字:
顯示項目501-550 / 1852. (共38頁)
<<
<
6
7
8
9
10
11
12
13
14
15
>
>>
每頁顯示[
10
|
25
|
50
]項目
日期
題名
作者
2012-06-25
Cooperative MAC Protocol for Multi-Channel Wireless Networks
Hung, Li-ling
;
Chang, Chih-yung
;
Wang, Tzu-lin
;
Hsiao, Chin-yao
;
張志勇
2007-05-21
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks
Chang, Shih-Hao
;
Merabti, M.
;
Mokhtar, H.M.
2011-01
A Coordinate Transformation System Based on the Human Feature Information
Chang, Shih-ming
;
TSai, Joseph
;
Shih, Timothy K.
;
Hsu, Hui-huang
;
施國琛
;
許輝煌
1992-01
Coping with failure : disciplined exception handling in logic programming
施國琛
;
Shih, Timothy K.
2019-04-06
Copy-Move Forgery Detection by Deep Fusion Neural Network
Chen, Chien-Chang
;
Duan, Wei-Kang
2002-07
Copyright protection with program gene
Hung, Jason C.
;
Chang, Chin-chen
;
Shih, Timothy K.
2007-09-14
Corrosion Evaluation of Hot Dip Galvanized Insulator Pins with Image Processing Techniques
Cheng, Jiin-rong
;
Horng, Wen-bing
;
Chen, Chih-yuan
;
Peng, Jian-wen
2002-10
Course Authoring and On-Line Learning System with Student Assessment Algorithm for Distance Education
Shih, Timothy K.
;
Lin, Nigel H.
;
Huang, Chun-Hung
2002-09
Course authoring and student assessment system for distance learning
Chang, Flora Chia-i
;
Shih, Timothy K.
;
Lin, Nigel H.
2007-09
A Courseware Authoring Tool for Achieving Interoperability among Various E-Learning Specifications Based on Web 2.0 Technologies
Wang, te-hua
;
Yen, neil Y.
;
Du, yue-in
;
施國琛
;
Shin, timothy K
2004-06
Courseware development using influence diagram with SCORM compatibility
Chang, F.C.-I.
;
Chang, Wen-chih
;
Yang, Hsuan-che
;
Shih, Timothy K.
;
Keh, Huan-chao
2024-07-09
Courtroom Transcription: A Deep Learning Approach to Legal Terminology and Speaker Identification
Jhang, Syu-Jhih
;
Chang, Hsiang-Chuan
;
Zhang, Qiao-yun
;
Chang, Chih-Yung
2005-08
Create non-duplicated simultaneous web search by six-direction search mechanisms
陳瑞發
;
Chen, Jui-fa
;
Lin, Wei-chuan
;
Bai, Hua-sheng
;
Chiou, Heng-yi
2000-10
Criteria of virtual university operation
Shih, Timothy K.
2008-10
A Crossover-Imaged Clustering Algorithm with Bottom-up Tree Architecture
Chang, Chung-i
;
Lin, N.P.
;
張忠義
;
林丕靜
2014-11-03
A Crowdsourcing Approach to Promote Safe Walking for Visually Impaired People
Lin, Chi-Yi
;
Huang, Shih-Wen
;
Hsu, Hui-Huang
;
Hsu, Hui-Huang
2010-12
Cryptanalysis of a More Secure Remote User Authentication Scheme
Horng, Wen-bing
;
Lee, Cheng-Ping
;
Peng, Jian-Wen
2012-11
Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
Horng, Wen-Bing
;
Peng, Jian-Wen
;
Liu, Chao-Sheng
;
Chiu, Ying-Ching
;
Horng, Wen-Bing
2002-05
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
Hwang, Shin-Jia
;
Chen, Chiu-Chin
2003-12
Cryptanalysis of publicly verifiable authenticated encryption
黃仁俊
2010-11
Cryptanalysis on Sun-Yeh's password-based authentication and key distribution protocols with perfect forward secrecy
洪文斌
;
Horng, Wen-bing
1991-10
Cryptographic authentication of passwords
Chang, C. C.
;
黃心嘉
;
Hwang, Shin-jia
1992-01
A cryptographic key management scheme for access control in a tree structure
Hwang, yen-junn
;
黃仁俊
2016-07-13
Curriculum Design – A Data-Driven Approach
Chang, Jung-Kuei
;
Tsao, Nai-Lung
;
Kuo, Chin-Hwa
;
Hsu, Hui-Huang
2024-07-09
Customized Expertise: Compact Language Models with Enhanced QA for Enterprises
Chang, Y. J.
;
Huang, Y. J.
;
Tao, H. S.
;
Chang, C. Y.
1992-11
Cyclic inheritance detection for object-oriented database
Chiang, Ding-an
;
Lee, Ming-chi
2021-01-10
Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification
Chen, Shih-Hsin
;
Tai, I-Hsin
;
Chen, Yi-Hui
;
Weng, Ken-Pen
;
Hsieh, Kai-Sheng
2010-12
A Data Collection Mechanism for Disconnected Regions in Mobile Wireless Sensor Networks
藍念慈
;
蔡鏸容
;
林志宇
;
張志勇
2019-04-27
Data Collection Mechanism for Maximizing Throughput Using Uncontrolled Mobile Sink in Wireless Sensor Networks
Lin, Chung-Chih
;
Chang, Chih-Yung
;
Liao, Wen-Hwa
;
Shih, Kuei-Ping
2010-12
Data Collection Mechanisms for Localized Mobile Targets in Wireless Mobile Sensor Networks
蔡鏸容
;
藍念慈
;
陳正昌
;
張志勇
;
陳俊豪
2019-07-18
Data Collection using Multiple Mobile Sinks for Prolonging Network Lifetime in WSNs
Wen, W. M.
;
Shang, C. J.
;
Chang, C. Y.
2017-07-09
Data Consideration for At-risk Students Early Alert
Tsao, Nai-Lung
;
Kuo, Chin-Hwa
;
Guo, Ting-Lun
;
Sun, Tzu-Jui
2016-05-15
Data Gathering in Wireless Sensor Networks with Uncontrolled Sink Mobility
Cheng, C.F.
;
Lee, H.
2000-07-08
Data management in university 21 using object-oriented database and CORBA
施國琛
;
Shih, Timothy K.
2009-12
A Data-Centric Mechanism for Wireless Sensor Networks with Weighted Queries
Hung, Li-Ling
;
Chang, Sheng-Wen
;
Chang, Chih-Yung
;
Chen, Yu-Chieh
1996-07
Database support for intelligent tutoring software
Shih, Timothy K.
;
Kuo, Chin-hwa
2000-06
Database support of Web course development with design patterns
Shih, Timothy K.
;
Chang, Shi-Kuo
;
Arndt, Timothy
2018-04-15
DBS: A Dynamic Bandwidth Selection MAC Protocol for Channel Bonding in IEEE 802.11ac WLANs
Chen, Yen-Da
;
Wu, De-Ren
;
Sung, Ti-Chun
;
Shih, Kuei-Ping
2010-06
A Dead-End Free Deployment Algorithm for Wireless Sensor Networks with Obstacles
張志勇
2018-09-11
Deblurring a Camera- Shake Image Using a Thinning Kernel
Yen, Shwu-Huey
;
Chen, Pin-An
;
Lin, Hwei-Jen
2007-10
Decentralized Hole-Shape Regulation Technique for Enhancing Patrol and Deployment Tasks in Mobile WSNs
張志勇
;
Chang, Chih-yung
2009-09
A Decentralized Minislot Scheduling Protocol (DMSP) for Uplink and Downlink Traffic in IEEE 802.16 Wireless Mesh Networks
石貴平
;
Shih, kuei-ping
;
Chen, hung-chang
;
Chiang,chi-tao
2008-12
A Decentralized Uplink and Downlink Traffic Scheduling in IEEE 802.16 Wireless Mesh Networks
石貴平
;
Shih, kuei-ping
;
Chang, hung-chang
;
Chiang, chi-tao
;
Lin, po-yu
1997-05-05
Decomposition of multiple inheritance DAGs for object-oriented software measurement
施國琛
;
Shih, Timothy K.
;
Chung, Chi-ming
;
Wang, Chun-Chia
1996-10-28
Decomposition of multiple inheritance DAGs for testing
Chung, Chi-ming
;
Shih, Timothy K.
;
Kuo, Ying-feng
;
Wang, Chun-chia
;
施國琛
2024-10-29
Deep-Learning-Based Risk Prediction with Urban Sensing Data for Consumer Driving Safety
Lin, Kun-Yu
;
Liu, Pei-Yi
;
Hu, Chih-Lin
;
Huang, Shang-Zhi
;
Chen, Yung-Hui
;
Hui, Lin
2010-03
Delay-Tolerant Data Collection Mechanisms for Disconnected Targets in Wireless Mobile Sensor Networks
謝震宇
;
張志勇
;
洪麗玲
;
鄭建富
2013-08-23
A Delegation-based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation
黃心嘉
;
黃心嘉
1999-12
Delivering voice on the internet
郭經華
;
Kuo, Chin-hwa
;
Chio, Chia-lin
;
Hsu, Tsung-chieh
;
Chen, Wei-hao
2000-08
Delivering voice over the Internet
Kuo, Chin-Hwa
;
Chio, Chia-Lin
;
Hsi, Wen-Ching
;
Chen, Wei-Hao
顯示項目501-550 / 1852. (共38頁)
<<
<
6
7
8
9
10
11
12
13
14
15
>
>>
每頁顯示[
10
|
25
|
50
]項目
DSpace Software
Copyright © 2002-2004
MIT
&
HP
/
Enhanced by
NTU Library IR team
Copyright © -
回饋