English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90120/105278 (86%)
Visitors : 9211882      Online Users : 556
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    其他研究計畫 [0/2]
    博碩士論文 [1642/1704]
    專書 [0/21]
    會議論文 [302/1061]
    科技部大專學生研究計畫 [0/5]
    科技部研究計畫 [68/70]

    Collection Statistics

    近3年內發表的文件:47(2.96%)
    含全文筆數:921(58.03%)

    文件下載次數統計
    下載大於0次:921(100.00%)
    下載大於100次:726(78.83%)
    檔案下載總次數:280344(42.08%)

    最後更新時間: 2020-08-15 03:34


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 526-550 of 1586. (64 Page(s) Totally)
    << < 17 18 19 20 21 22 23 24 25 26 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    1995-04 Formal Specification and Verification in Z for Synchronous Concurrent Computation Fuyau Lin; Timothy K. Shih
    1998 Formal Specification in Software Reuse Designs: an Object-Oriented Database Example Huan-Chao Keh; Timothy K. Shih
    1997-04 Formal Specification of a Graph-Based Object-Oriented Software Testing Chi-Ming Chung; Timothy K. Shih; Chun-Chia Wang
    1999 Formal Specification of an Object-Oriented database for Intelligent Multimedia Presentation Huan-Chao Keh; Timothy K. Shih; Ching-Sheng Wang
    2008-02 Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery Chang, C. C.; Fan, Y. H.; Tai, W. L.
    2009-02 A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes Chang, C. C.; Chou, Y. C.
    2009 A fragile digital image authentication scheme inspired by wet paper codes Chang, Chin-Chen; Chou, Yung-Chen
    2009 A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes Chang; Chin-Chen; Chou; Yung-Chen
    2009-02 A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes 張真誠; Chang, Chin-Chen; 周永振; Chou, Yung-Chen
    2007-09 Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference Chang, C. C.; Lin, P. Y.; Chuang, J. C.
    2014 A framework of educational app repositories with recommendation powered by social tag mining Shih), 時文中(Wen-Chung
    2009-08 A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN 陳興忠; Chen, Hsing-Chung
    2008 A Frequency Assessment Expert System of PiezoelectricTransducers in Paucity of Data Chang; F.M.; Chen; Y-C.
    2008-01 A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems Chang, C. C.; Lee, C. Y.
    2007-01 Full-Searching-Equivalent Vector Quantization Method Using Two-Bounds Triangle Inequality Chang, C. C.; Chen, C. C.
    2015-07 Fundamental frequency analysis on a harmonic power signal using Fourier series and zero crossing algorithms 陳永欽;YEONG-CHIN CHEN;Shen, Hui-Yu;Shen, Hui-Yu;Hsu, Chao-Hs;Hsu, Chao-Hsing
    2015-07 Fundamental frequency analysis on a harmonic power signal using Fourier series and zero crossing algorithms CHEN), 陳永欽(YEONG-CHIN; Shen, Hui-Yu(Shen, Hui-Yu); Hsu, Chao-Hs(Hsu, Chao-Hsing)
    2008-12 Further Improvement on A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments 黃明祥; Hwang, Min-Shiang
    2007-06 A fuzzy Lyapunov function approach for robust fuzzy control design of nonlinear systems with model uncertainties 張耀仁; Chang, Yau-Zen; 蔡志仁; Tsai, Zhi-Ren
    2007-10 Fuzzy tracker with self-tuning PID and identifier design using conditional-LMI and improved random optimal algorithm 蔡志仁; Tsai, Zhi-Ren; 黃景東; Hwang, Jiing-Dong; 張耀仁; Chang, Yau-Zen
    2005-07 The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain Lin, I. C.; Hwang, M. S.; Chang, C. C
    2015-07 A Generalization of Fully Exploiting Modification Directions Data Hiding Scheme Kuo), Wen-Chung Ku(Wen-Chung; Kao), Ming-Chih Ka(Ming-Chih; CHang)*, 張真誠(Chin-Chen
    2003 Generalization of Proxy Signature Based on Discrete Logarithms 黃明祥; Hwang, Min-Shiang
    2004-03 Generalization of Proxy Signature Based on Elliptic Curves 黃明祥; Hwang, Min-Shiang
    2011-03 Generalization of Proxy Signature Based on Factorization 黃明祥; Hwang, Min-Shiang

    Showing items 526-550 of 1586. (64 Page(s) Totally)
    << < 17 18 19 20 21 22 23 24 25 26 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback