English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46833/50693 (92%)
造訪人次 : 11865481      線上人數 : 323
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版

    子類別

    博碩士論文 [549/621]
    會議論文 [78/103]
    期刊論文 [108/140]
    研究計畫 [46/46]
    專書 [2/2]
    教師升等著作 [120/120]
    研究所考古題 [21/21]
    轉學考考古題 [24/24]

    社群統計


    近3年內發表的文件:43(3.99%)
    含全文筆數:948(88.02%)

    文件下載次數統計
    下載大於0次:948(100.00%)
    下載大於100次:862(90.93%)
    檔案下載總次數:582474(2.47%)

    最後更新時間: 2024-12-01 08:24

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目201-225 / 1077. (共44頁)
    << < 4 5 6 7 8 9 10 11 12 13 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2009 A NEW ALGORITHM FOR APPLYING FUZZY SET THEORY TO THE FACILITY SITE SELECTION Lee, HM (Lee, Huey-Ming); Lin, LL (Lin, Lily)
    2008 A NEW ALGORITHM OF SOFTWARE QUALITY EVALUATION FOR USER SATISFACTION Lin, Lily; Lee, Huey-Ming
    2008 A new assessment model for global facility site selection Lin, Lily; Lee, Huey-Ming
    2008 A new parallel session attack to Khan-Zhang's authentication scheme 謝文恭等著
    2012-12 A New Subclass of Integer Linear Programming Problems and Its Applications Wang, YL (Wang, Yue-Li); Hsu, CJ (Hsu, Cheng-Ju); Liu, JJ (Liu, Jia-Jie); Ko, MT (Ko, Ming-Tat); Wang, FH (Wang, Fu-Hsing)
    2010 A note on leader election in directed split-stars and directed alternating group graphs Wang, FH (Wang, Fu-Hsing)
    2012-08 A novel automatic virtual metrology system architecture for TFT-LCD industry based on main memory database Hung, MH (Hung, Min-Hsiung); Tsai, WH (Tsai, Wen-Huang); Yang, HC (Yang, Haw-Ching); Kao, YJ (Kao, Yi-Jhong); Cheng, FT (Cheng, Fan-Tien)
    2017-01 A novel hybrid image authentication scheme based on absolute moment block truncation coding Lin, CC (Lin, Chia-Chen); Huang, YH (Huang, Yuehong); Tai, WL (Tai, Wei-Liang)
    1983-06 On Oriented Bordism 李惠明
    2010 On the design of authentication mechanisms for RFID systems 葉國暉
    2005 On the design of protection scheme for digital images and documents based on visual secret sharing and steganography 杜淑芬著
    2022-09 Online Peer-Tutoring for Programming Languages Based on Programming Ability and Teaching Skill Kuo, Yu-Chen; Yao, Ching-Bang; Wu, Zhe-Yu
    2012-11-26 OpenID結合行動裝置PUSH功能之身分認證研究 李裔方; 馮維本
    2006 An optimization model for visual cryptography schemes with unexpanded shares Hsu, Ching-Sheng; Tu, Shu-Fen; Hou, Young-Chang
    2008 Optimization of Job Schedule Model Based on Grid Environment 吳宏文等撰
    2010-12 Probability-based tampering detection scheme for digital images Hsu, CS (Hsu, Ching-Sheng); Tu, SF (Tu, Shu-Fen)
    2007 A process schedule analyzing model based on grid environment Lee, Huey-Ming; Lee, Tsang-Yean; Hsu, Mu-Hsiu
    2007 Processing Authentication Based on Grid Environment 陳恆生等著
    2008 Processing Logical Access Control Command in Computer System 陳恆生等著
    2014-09-20 Protecting secret documents via a sharing and hiding scheme Tu, Shu-Fen; Hsu, Ching-Sheng
    2014 Protecting secret documents via a sharing and hiding scheme 杜淑芬等著
    1992 Query containment theory and its relevance to secure query processing 謝文恭
    2011-03 Reshaping Government and Politics--Web 2.0 Applications 崔灝東; 李中彥
    2011-05 RESOURCE ALLOCATION ANALYSIS MODEL BASED ON GRID ENVIRONMENT Lee, HM (Lee, Huey-Ming); Su, JS (Su, Jin-Shieh); Chung, CH (Chung, Chia-Hsien)
    2009 A resource performance analysis model based on grid environment 陳恆生等著

    顯示項目201-225 / 1077. (共44頁)
    << < 4 5 6 7 8 9 10 11 12 13 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋