English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 112881/143847 (78%)
Visitors : 50335745      Online Users : 675
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Sub-Community

    資訊科學系 [2494/2921]
    資訊科學系碩士在職專班 [158/164]
    社群網路與人智計算國際研究生博士學位學程(TIGP) [7/7]
    資訊安全碩士學位學程 [2/2]

    Siblings


    創新國際學院 [96/100]
    國際金融學院 [66/67]
    文學院 [11081/14924]
    社會科學學院 [21482/27960]
    數位內容與科技學士學位學程 [141/150]
    商學院 [26429/35227]
    傳播學院 [6573/8559]
    外國語文學院 [5050/6946]
    法學院 [6911/7931]
    理學院 [4097/5436]
    國際事務學院 [5006/6790]
    教育學院 [5735/7028]
    研究中心 [2365/4375]
    行政單位 [406/424]
    學術期刊 [12616/12677]
    政大會議論文集 [2234/2240]
    政大學報 [1279/1281]

    Community Statistics


    近3年內發表的文件:381(11.74%)
    含全文筆數:2802(86.37%)

    文件下載次數統計
    下載大於0次:2599(92.76%)
    下載大於100次:2367(84.48%)
    檔案下載總次數:3689197

    最後更新時間: 2024-10-21 12:12

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed
    Jump to a point in the index:
    Or type in a year:
    Ordering With Most Recent First Show Oldest First

    Showing items 1676-1700 of 3243. (130 Page(s) Totally)
    << < 63 64 65 66 67 68 69 70 71 72 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2012 A commutative encryption scheme based on ElGamal encryption Huang, K.; Tso, Ray-Lin; 左瑞麟
    2012 Commensurate dimensionality reduction for extended local ternary patterns Liao, Wen-Hung; 廖文宏
    2012 An empirical study of applying data mining techniques to the prediction of TAIEX Futures Lin, H.-C.; Hsu, Kuo-Wei; 徐國偉
    2012 Challenges of emergency communication network for disaster response Huang, J.-S.; Lien, Yao-Nan; 連耀南
    2012 Applications of parallel corpora for Chinese segmentation Wang, J.-P.; Liu, Chao-Lin; 劉昭麟
    2012 Toward a tenant-aware query rewriting engine for Universal Table schema-mapping Liao, C.-F.; Chen, Kung; Chen, J.-J.; 陳恭; 陳俊傑
    2012 Incorporating fuzziness in extended local ternary patterns Liao, Wen-Hung; 廖文宏
    2012 Hidden trends in 90 years of Harvard Business Review Tsai, C.-C.; Liu, C.-L.; Huang, W.-J.; Shan, Man-Kwan; 沈錳坤
    2012 Hybrid ensembles of decision trees and artificial neural networks Hsu, Kuo-Wei; 徐國偉
    2012 Efficient time series disaggregation for non-intrusive appliance load monitoring Fan, Y.-C.; Liu, X.; Lee, W.-C.; Chen, Arbee L. P.; 陳良弼
    2012 Message from UIPM-12 workshop chairs Wang, S.-J.; Kwak, J.; Liu, J.; Wang, W.-J.; Desell, T.; Su, P.-C.; Chang, C.-L.; Chen, C.-C.; Chen, Y.-L.; Cheng, H.-Y.; Huang, C.-W.; Kumar, S.; Huang, L.; Huang, S.-H.; Kim, C.; Kim, C.; Kim, J.W.; Sheu, R.-K.; Song, H.; Tsai, M.-F.; Tso, H.-K.; Tso, Ray-Lin; Varela, C.A.; Yang, C.-H.; Yu, C.-C.; Yuan, S.-M.; 左瑞麟
    2012 Message from WiNA-12 workshop chairs James, C.W.Y.; Cai, Z.; Chang, Y.; Chen, T.-S.; Chi, K.-H.; Jiang, S.; Eidenbenz, S.; Govindaswamy, V.; Hwang, S.-F.; Li, F.; Li, M.M.; Li, Q.; Lien, Yao-Nan; Makki, K.; Shu, L.; Song, M.; Xin, Q.; Yang, B.; Yen, L.-H.; Zhang, W.; Zhao, B.; 連耀南
    2012 A web-based interaction design tool: Pattern Toolkit, L.; Chen, C.J.; Teng, C.H.; Li, Tsai-Yen; 李蔡彥
    2012 On continuous top-k similarity joins Li, D.J.; Wang, E.T.; Tsai, Y.-C.; Chen, Arbee L. P.; 陳良弼
    2012 Oriented animal-mask decoration pattern generation Chi, Ming Te; Liou, Wei Cheng; 紀明德
    2012 Clip-on gadgets: Expandable tactile controls for multi-touch devices Chang, T.-W.; Yu, Neng-Hao; Tsai, S.-S.; Chen, M.Y.; Hung, Y.-P.; 余能豪
    2012 Identity-based password-authenticated key exchange for client/server model Yi, X.; Tso, Ray-Lin; Okamoto, E.; 左瑞麟
    2012 Urban multi-layered chord for P2P over vehicular network Jang, Hung-Chin; Hsu, T.-Y.; 張宏慶
    2012 A hybrid architecture of routing protocols for VANET with cross-layer design Jang, Hung-Chin; Yang, C.-K.; 張宏慶
    2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin; Tso, Ray-Lin; 左瑞麟
    2012 Towards law-aware semantic cloud policies with exceptions for data integration and protection Hu, Yuh-Jong; Wu, Win-Nan; Cheng, Di-Rong; 胡毓忠
    2012 Placement of control network for mobile agents over opportunistic networks Lien, Yao-Nan; Lin, Yi-Shiuan; 連耀南; 林怡萱
    2012 Influence propagation and maximization for heterogeneous social networks Li, C.-T.; Lin, S.-D.; Shan, Man-Kwan; 沈錳坤
    2012 Regional subgraph discovery in social networks Li, C.-T.; Shan, Man-Kwan; Lin, Shou-De; 沈錳坤; 林守德
    2012 Dynamic selection of activation targets to boost the influence spread in social networks Li, C.-T.; Shan, Man-Kwan; Lin, Shou-De; 沈錳坤; 林守德

    Showing items 1676-1700 of 3243. (130 Page(s) Totally)
    << < 63 64 65 66 67 68 69 70 71 72 > >>
    View [10|25|50] records per page

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback