English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46833/50693 (92%)
造訪人次 : 11842336      線上人數 : 661
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版

    子類別

    博碩士論文 [549/621]
    會議論文 [78/103]
    期刊論文 [108/140]
    研究計畫 [46/46]
    專書 [2/2]
    教師升等著作 [120/120]
    研究所考古題 [21/21]
    轉學考考古題 [24/24]

    社群統計


    近3年內發表的文件:43(3.99%)
    含全文筆數:948(88.02%)

    文件下載次數統計
    下載大於0次:946(99.79%)
    下載大於100次:858(90.51%)
    檔案下載總次數:581479(2.47%)

    最後更新時間: 2024-11-28 10:39

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目201-250 / 1077. (共22頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2009 A NEW ALGORITHM FOR APPLYING FUZZY SET THEORY TO THE FACILITY SITE SELECTION Lee, HM (Lee, Huey-Ming); Lin, LL (Lin, Lily)
    2008 A NEW ALGORITHM OF SOFTWARE QUALITY EVALUATION FOR USER SATISFACTION Lin, Lily; Lee, Huey-Ming
    2008 A new assessment model for global facility site selection Lin, Lily; Lee, Huey-Ming
    2008 A new parallel session attack to Khan-Zhang's authentication scheme 謝文恭等著
    2012-12 A New Subclass of Integer Linear Programming Problems and Its Applications Wang, YL (Wang, Yue-Li); Hsu, CJ (Hsu, Cheng-Ju); Liu, JJ (Liu, Jia-Jie); Ko, MT (Ko, Ming-Tat); Wang, FH (Wang, Fu-Hsing)
    2010 A note on leader election in directed split-stars and directed alternating group graphs Wang, FH (Wang, Fu-Hsing)
    2012-08 A novel automatic virtual metrology system architecture for TFT-LCD industry based on main memory database Hung, MH (Hung, Min-Hsiung); Tsai, WH (Tsai, Wen-Huang); Yang, HC (Yang, Haw-Ching); Kao, YJ (Kao, Yi-Jhong); Cheng, FT (Cheng, Fan-Tien)
    2017-01 A novel hybrid image authentication scheme based on absolute moment block truncation coding Lin, CC (Lin, Chia-Chen); Huang, YH (Huang, Yuehong); Tai, WL (Tai, Wei-Liang)
    1983-06 On Oriented Bordism 李惠明
    2010 On the design of authentication mechanisms for RFID systems 葉國暉
    2005 On the design of protection scheme for digital images and documents based on visual secret sharing and steganography 杜淑芬著
    2022-09 Online Peer-Tutoring for Programming Languages Based on Programming Ability and Teaching Skill Kuo, Yu-Chen; Yao, Ching-Bang; Wu, Zhe-Yu
    2012-11-26 OpenID結合行動裝置PUSH功能之身分認證研究 李裔方; 馮維本
    2006 An optimization model for visual cryptography schemes with unexpanded shares Hsu, Ching-Sheng; Tu, Shu-Fen; Hou, Young-Chang
    2008 Optimization of Job Schedule Model Based on Grid Environment 吳宏文等撰
    2010-12 Probability-based tampering detection scheme for digital images Hsu, CS (Hsu, Ching-Sheng); Tu, SF (Tu, Shu-Fen)
    2007 A process schedule analyzing model based on grid environment Lee, Huey-Ming; Lee, Tsang-Yean; Hsu, Mu-Hsiu
    2007 Processing Authentication Based on Grid Environment 陳恆生等著
    2008 Processing Logical Access Control Command in Computer System 陳恆生等著
    2014-09-20 Protecting secret documents via a sharing and hiding scheme Tu, Shu-Fen; Hsu, Ching-Sheng
    2014 Protecting secret documents via a sharing and hiding scheme 杜淑芬等著
    1992 Query containment theory and its relevance to secure query processing 謝文恭
    2011-03 Reshaping Government and Politics--Web 2.0 Applications 崔灝東; 李中彥
    2011-05 RESOURCE ALLOCATION ANALYSIS MODEL BASED ON GRID ENVIRONMENT Lee, HM (Lee, Huey-Ming); Su, JS (Su, Jin-Shieh); Chung, CH (Chung, Chia-Hsien)
    2009 A resource performance analysis model based on grid environment 陳恆生等著
    2010 RFID存取控制協定之安全性與效率改良 黃敏思
    2005 RFID於交通運輸整合應用之研究 鄭明達
    2009 RFID智慧型展場導覽曁管理系統 陳恆生等著
    2012 RFID標籤所有權移轉協定之改良 劉柏緯
    2012-12 RFID標籤所有權移轉協定之改良 劉柏緯; Liu, Po-Wei
    2009 RFID與ZigBee室內定位之比較 劉宗吉
    2001 RMON MIB在網路安全上的應用 鄭添源
    2002-01 The Rook Problem on a Saw-toothed Chessboard 王福星; 何定燕; 王有禮
    2012 SaaS雲端系統發展生命週期-以知識管理系統為例 馬坤宏
    2008 Secure remote control model for information appliances 謝文恭等著
    2010 Secure Site Authentication and Message Transmission Based on Grid Environment 陳恆生等著
    2007 A security and efficiency improvement to Chen and Yeh's nonce-based authentication scheme 謝文恭等著
    2006 Security of efficient password authenticated key agreement using smart cards 謝文恭著
    2005 Security of Lee et al.'s remote authentication model of information appliances Shieh, Wen-Gong; Wang, Jian-Min
    2005 Security of Lee et al.'s remote authentication model of information appliances 謝文恭等著
    2009 Security of Message Passing Based on Grid Environment 陳恆生等著
    2006 A self-tuning emergency model of home network environment Lee, Huey-Ming; Liao, Shih-Feng; Lee, Tsang-Yean; Hsu, Mu-Hsiu; Su, Jin-Shieh
    2005 SEM應用在農民對自然災害認知風險與行為反應之硏究 楊琇如撰
    2018-01 Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography Tai, WL (Tai, Wei-Liang); Chang, YF (Chang, Ya-Fen)
    2009 A SOA-BASED MEDICAL DIAGNOSIS DECISION SUPPORT SYSTEM USING THE BAYESIAN THEOREM AND WEB SERVICE TECHNOLOGY Chang, CC (Chang, Chung C.); Lu, HM (Lu, Hsueh-Ming)
    2009 A soa-based medical diagnosis decision support system using the bayesian theorem and web service technology 張重正等著
    2014-03 A social interaction system based on cloud computing for mobile video telephony Yu, Yuan-Chih
    2009 SPECIAL ISSUE ON MANAGEMENT ENGINEERING Lee, HM (Lee, Huey-Ming); Watada, J (Watada, Junzo)
    2009 Special Issue on Soft Computing and Applications PREFACE Lee, HM (Lee, Huey-Ming); Samatsu, T (Samatsu, Takashi)
    2006 A statistical approach for ownership identification of digital images Hsu, Ching-Sheng; Tu, Shu-Fen; Hou, Young-Ch

    顯示項目201-250 / 1077. (共22頁)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋