English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 110934/141854 (78%)
造訪人次 : 47759235      線上人數 : 612
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    國科會研究計畫 [224/224]
    學位論文 [764/773]
    專利 [5/5]
    專書/專書篇章 [48/48]
    會議論文 [790/1177]
    研究報告 [3/22]
    考古題 [52/52]

    類別統計

    近3年內發表的文件:43(7.64%)
    含全文筆數:551(97.87%)

    文件下載次數統計
    下載大於0次:551(100.00%)
    下載大於100次:521(94.56%)
    檔案下載總次數:417248(11.83%)

    最後更新時間: 2024-06-21 13:14


    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目426-450 / 562. (共23頁)
    << < 13 14 15 16 17 18 19 20 21 22 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    1993-10 Searching a minimal semantically-equivalent subset of a set of partial values 陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D.
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2013-11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
    2013-07 Security Analysis of Choi et al.`s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
    2009-05 Selecting Baysian-network models based on simulated expectation Liu, Chao-Lin; 劉昭麟
    2008-08 Self-Animating Images: Illusory Motion Using Repeated Asymmetric Patterns 紀明德; Chi, Ming-Te; Lee, Tong-Yee; Qu, Yingge; Wong, TienTsin
    2012-10 Semantic legal policies for data exchange and protection across super-peer domains in the cloud 胡毓忠; 黃雅玲; 鄭國平; 吳穩男
    2012 Semantics-enabled Policies for Super-Peer Data Integration and Protection 胡毓忠; Hu,Yuh-Jong; Wu,Win-Nan; Yang,Jiun-Jan
    2017-07 Senior high school students’ comprehension and interest in science content: Example of participating in first-hand experimental activities 謝佩璇; Hsieh, P. H.
    2019-03 Sentiment Classification for Web Search Results 楊亨利; Yang, Heng-Li; Huang, Hung-Chang
    2007-02 Service-Oriented Smart Home Architecture based on OSGi and Mobile Agent Technology 廖峻鋒; Wu,Chao-Lin; Liao,Chun-Feng; Fu,Li-Chen
    2018-09 Short-Term PM2.5 Forecasting Using Exponential Smoothing Method: A Comparative Analysis 蔡子傑; Tsai, Tzu-Chieh; Mahajan, Sachit*; Chen, Ling-Jyh
    2011-06 Side-Effect Localization for Lazy, Purely Functional Languages via Aspects 陳恭; Chen, Kung; Weng, Shu-Chun; Wang, Meng; Lin, Jia-Yin
    2006 Similarity-based Motion Track Management for Video Retrieval 陳良弼; CHEN,PEI-YI; CHEN,ARBEE L. P.
    1989 Similarity retrieval of iconic image database 沈錳坤; Lee,Suh-Yin; Shan,Man-Kwan; Yang,Wei-Pang
    2006 Similarity Search in Transaction Databases with a Two-Level Bounding Mechanism J-C- Chuang; C-W- Cho; 陳良弼
    2017-11 Single-cell absolute contact probability detection reveals chromosomes are organized by multiple low-frequency yet specific interactions 張家銘; Cattoni, Diego I.; González, Inma; Chang, Jia-Ming; Sexton, Thomas; Marc, A. Marti-Renom; Bantignies, Frédéric
    2022-02 Single Image Reflection Removal Based on Knowledge-Distilling Content Disentanglement 彭彥璁; Peng, Yan-Tsung; Cheng, Kai-Han; Fang, I-Sheng; Peng, Wen-Yi; Wu, Jr-Shian
    2014-08 Smartphone App Usage Log Mining 徐國偉; Hsu, Kuo-Wei
    2014-04 Smartphone App Usage Log Mining 徐國偉; Tseng,Woan-Rou; Hsu,Kuo-Wei
    2016-01 Social Sensor: an Analysis Tool for Social Media 李蔡彥; Wu, Chun-Hsiao; Li, Tsai-Yen
    2007-01 Software Piracy Attacks on Java Software Using Malicious Aspects 陳恭; 陳鉅秉
    2011-12 Some chances and challenges in applying language technologies to historical studies in Chinese Liu, Chao-Lin; Jin, Guantao; Liu, Qingfeng; Chiu, Wei-Yun; Yu, Yih-Soong; 劉昭麟
    2011-12 Some chances and challenges in applying language technologies to historical studies in Chinese 劉昭麟; Liu, Chao-Lin
    2005-05 Some Optimal Parallel Algorithms on Interval and Circular-Arc Graphs 許芳榮; 沈錳坤; 趙考蜀; 李家同

    顯示項目426-450 / 562. (共23頁)
    << < 13 14 15 16 17 18 19 20 21 22 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋