English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 110182/141115 (78%)
造訪人次 : 46767934      線上人數 : 458
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    子類別

    國科會研究計畫 [225/225]
    學位論文 [764/773]
    專利 [5/5]
    專書/專書篇章 [48/48]
    會議論文 [790/1177]
    期刊論文 [550/562]
    研究報告 [3/22]
    考古題 [52/52]

    社群統計


    近3年內發表的文件:240(8.38%)
    含全文筆數:2437(85.12%)

    文件下載次數統計
    下載大於0次:2327(95.49%)
    下載大於100次:2124(87.16%)
    檔案下載總次數:3511734

    最後更新時間: 2024-05-19 02:14

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目1301-1350 / 2862. (共58頁)
    << < 22 23 24 25 26 27 28 29 30 31 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    1994 Reconstruction of dynamic 3-D structures of biological objects using stereo microscopy Liao, Wen-hung; Aggarwal, Jake K.; Aggarwal, Shanti J.; 廖文宏
    2006-06 Reducing Calibration Effort for WLAN Location and Tracking System using Segment Technique 蔡子傑; Cheng-Lin Li; Tsung-Ming Lin
    2006 Reducing Calibration Effort for WLAN Location and Tracking System using Segment Technique Tsai, Tzu-chieh; Li, Cheng-lin; Lin, Tsung-ming; 蔡子傑
    2006-01 Reducing Calibration Effort for WLAN Location System using Segment Technique with Autocorrelation 蔡子傑; Cheng-Lin Li
    1993-12 Refining imprecise data by integrity constraints 陳良弼; Tseng,Frank S.C.; Chen,Arbee L.P.; Yang,Wei-Pang
    2012 Regional subgraph discovery in social networks Li, C.-T.; Shan, Man-Kwan; Lin, Shou-De; 沈錳坤; 林守德
    2012-06 Region-based Line Field Design Using Harmonic Functions 紀明德; Chi,Ming-Te; Yao,Chih-Yuan; Lee,Tong-Yee; Tao Ju
    2010-08 Region description using extended local ternary patterns Liao, Wen-Hung; 廖文宏
    2010 Region Description Using Extended Local Ternary Patterns Liao, Wen-hung; 廖文宏
    2016-09 Relation between trust attitudes toward automation, Hofstede`s cultural dimensions, and big five personality traits 劉吉軒; Chien, Shih Yi; Lewis, Michael E.; Sycara, Katia P.; Liu, Jyi-Shanel; Kumru, Asiye
    2008-03 Relevance feedback for category search in music retrieval based on semantic concept learning 沈錳坤; Meng-Fen Chiang; Fang-Fei Kuo
    2023-08 Removal of Salt-and-Pepper Impulse Noise using Adaptive Analysis Windows with Min-Max Mean Pooling 張宏慶
    1993-12 Requirements Specification and Specification Verification of Real-Time Distributed Systems 張宏慶
    2009-06 Rescue Information System for Earthquake Disasters Based on MANET Emergency Communication Platform 蔡子傑
    2009-06 Rescue Information System for Earthquake Disasters Based on MANET Emergency Communication Platform 連耀南
    2015 ISMS與PIMS整合導入之研究 -以國防部全球資訊網站系統為例 孫天貴; Sun, Tien Kuei
    2014-04 Resource delivery path dependent deployment scheduling for contingency cellular network Lien, Yao-Nan; Kao, Tsai I.; Huang, Jyh-Shyan; 連耀南; 高采衣; 黃智賢
    Rhythmic Character Animation: Interactive Chinese Lion Dance 李蔡彥
    2005-10 Rhythmic Character Animation: Interactive Chinese Lion Dance J.R. Chen; 李蔡彥
    2004 Rhythm Style Mining of Dance Music Meng-Fen Chiang; 沈錳坤; Chung-Ching Lan
    2013-03 Risk ranking from financial reports Tsai, Ming-Feng; 蔡銘峰; Wang, C.-J.
    2008-11 Robust detection of skin color range using achromatic features 廖文宏
    2017-06 Robust good-deal bounds in incomplete markets: The case of Taiwan Chen, Jun Home; Huang, Y.-L.; Chang, J.-R.
    2007-08 Robust Multipose Face Detection in Video 廖文宏
    2011 Robust Orthogonal Particle Swarm Optimization for estimating the fundamental matrix Chan, Kai-Hsuan; Wu, Y.-L.; Tang, C.-Y.; Hor, Maw-Kae; 詹凱軒; 何瑁鎧
    2010 Robust pupil detection for gaze-based user interface Liao, W.-H.; Yu, L.-C.; 廖文宏
    2011-06 Robust refinement methods for camera calibration and 3D reconstruction from multiple images Hor, Maw-Kae; 何瑁鎧; Tang, C.-Y.; 詹凱軒; Tsai, Jeng Jiun; 蔡政君; Chan, Kai-Hsuan; Wu, Y.-L.
    2004-12 Robust Swimming Style Classification from Color Video Liao, Wen-Hung; Ming-Je Liu; 廖文宏
    2013 Robust trifocal tensor constraints for structure from motion estimation Hor, Maw-Kae; 何瑁鎧; Chan, Kai-Hsuan; Tang, C.-Y.; Wu, Y.-L.; 詹凱軒
    2017-09 ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home 廖峻鋒; Liao, Chun-Feng; Chen, Peng-Yu
    1996-01 ROSE: a Rapid OCR Software Development Environment 連耀南
    2001-09 Route-information management and provision for public transportation systems 劉昭麟; Liu, Chao-Lin; Pai, Tun-Wen; Huang, Shang-Ming; Chang, Chun-Tien
    2007-07 Routing and Admission Control in IEEE 802.16 Distributed Mesh Networks 蔡子傑
    2002-03 Routing for Mobile LAN Topology Management 連耀南; Richard Chiou
    2002-06 Routing Protocol for Mobile LAN 張宏慶; Chin-Wei Meng
    2015-08 S4: An SLA-aware Short-Secret-Sharing cloud storage system 郭耀煌; Chuang, I-Hsun; Huang, Yu-Ting; Su, Wei-Tsung; Lin, Tung-Sheng; Kuo, Yau-Hwang
    2009 Satisfaction with Taiwan’s medical institutions of research and analysis Ho, Cheng-Kuang
    2003-10 SAWA: A School Administration Application Framework with Single-Sign-On and MVC Patterns 李蔡彥
    2003-01 SAWA: A School Administration Application Framework with Single-Sign-On and MVC Patterns J.F. Liao; 李蔡彥
    1995 Schema Integration and Query Processing for Multiple Object Databases 陳良弼; Chen,Arbee L.P.; Koh,Jia-Ling; Kuo,Tony C.T.; Liu,Chih-Chin
    1993-10 Searching a minimal semantically-equivalent subset of a set of partial values 陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D.
    1998-04 Search of Mobile Agents 連耀南
    2013 Secure Certificateless Signature Scheme Supporting Batch Verification 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2018 Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2023-12 Securing NLP Systems: A Comprehensive AI-Based Approach 曾一凡; Tseng, Yi-Fan
    2014-10 Security analysis and improvement of femtocell access control Chen, C.-M.; Wu, T.-Y.; Tso, Ray-Lin; Wu, M.-E.; 左瑞麟
    2013-11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
    2011-12 Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 黃凱彬; 左瑞麟
    2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin; Tso, Ray-Lin; 左瑞麟

    顯示項目1301-1350 / 2862. (共58頁)
    << < 22 23 24 25 26 27 28 29 30 31 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋