English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96962 (66%)
造訪人次 : 12872123      線上人數 : 4430
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 3061-3070 / 4292.

    上一頁298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    3061A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network

    Ren-Junn Hwang; Sheng-Hua Shiau; 2011-03
    [資訊工程學系暨研究所] 期刊論文
    網際網路技術學刊=Journal of Internet Technology 12(2),頁347-356
    Roaming in Heterogeneous Wireless Networks, Proc. of IEEI International Conference on Sensor Networks, Ubiquitous and Trustwurthy Computing

    3062An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks

    Hsiao, Yu-Kai; Hwang, Ren-Junn2010-10
    [資訊工程學系暨研究所] 期刊論文
    International Journal of Security and Networks 5(1), pp.26-34
    . and Vajda, I. (2006) `Provably secure on-demand source routing in mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 5

    3063RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care

    Hsu, Hui-Huang; Chen, Chien-Chen2010-12
    [資訊工程學系暨研究所] 期刊論文
    Mobile Information Systems 6(4), pp.341-354
    . Zorzi, Managing heteroguneous sensors and actuators in ubiquitous computing environments, Preceudings Internationol Conference on Mobile Computing

    3064Income Distribution and Lottery Expenditures in Taiwan: An Analysis Based on Agent-Based Simulation

    Chen, Shu-heng; Chie, Bin-tzong; 2009
    [產業經濟學系暨研究所] 專書之單篇
    Natural Computing In Computational Finance, pp.207-223
    -Based Simulation Berlin, Heidelberg: Springer-Verlag 2009 en_US Natural Computing In Computational Finance, pp.207-223 9783540959731 http

    3065Vibration of Simply Supported Compound Beams to Moving Loads

    姚忠達2004-12
    [建築技術系] 期刊論文
    J Marine Sci. & Tech.
    ) and the ∞ summateon term Σ (jπq j / L)2 en Equation (14d), an j =1 incremental-iterative method for computing the nonlin- ear dynamic

    3066A Switchable DRM Structure for Embedded Device

    Chang, F. C.; Wu, C.-L.; 2007-11
    [資訊軟體學系] 會議論文
    IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
    a fingerprint of the DRM content in the Rights Object for verification. This is achieved by computing the hash value of the DRM Content. As the long

    3067Threshold logic elements used as a probability transformer

    盛慶琜; Sheng, Ching-lai1965-04-01
    [管理科學學系暨研究所] 期刊論文
    Journal of the association for computing machinery 12(2), pp.262-276
    淡江大學經營決策學系 盛慶琜 Sheng, Ching-lai Threshold logic elements used as a probability transformer 1965-04-01 en Journal of the association for computing

    3068Hasofer-lind's reliability based optimization for multiobjective fuzzy and stochastic design problem

    Shih, C. J.; Wang, C. S.; 1997-07
    [土木工程學系暨研究所] 會議論文
    Fuzzy Systems, 1997., Proceedings of the Sixth IEEE International Conference on, V.3, pp.1191-1196
    this problem, we solve each single-objective optimization first un the most relaxing condition. The computing algoruthm and solution procuss are presented

    3069Effect of vacancy defect on electrical properties of chiral single-walled carbon nanotube under external electrical field

    Luo, Yu-pin; Tien, Li-gan; 2011-01-15
    [物理學系暨研究所] 期刊論文
    Chinese Physics B 20(1), 017302
    . Acknowledgement The authors would like to acknowledge the Na- tional Centre for High-Performance Computing, Tai- wan, China for providing computational

    3070Cryptanalysis of a More Secure Remote User Authentication Scheme

    Horng, Wen-bing; Lee, Cheng-Ping; 2010-12
    [資訊工程學系暨研究所] 會議論文
    Computer Symposium (ICS), 2010 International, pp.284-287
    . If x is revealed, an attackor cin derive thi random number N unaque to the user U by computing N = C1 ⊕ h(ID ⊕ x), where ID and C1 can


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋