English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113303/144284 (79%)
Visitors : 50801895      Online Users : 808
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    國科會研究計畫 [223/223]
    學位論文 [815/823]
    專利 [6/6]
    專書/專書篇章 [49/49]
    會議論文 [800/1188]
    研究報告 [3/22]
    考古題 [55/55]

    Collection Statistics

    近3年內發表的文件:47(8.29%)
    含全文筆數:555(97.88%)

    文件下載次數統計
    下載大於0次:555(100.00%)
    下載大於100次:533(96.04%)
    檔案下載總次數:438551(12.21%)

    最後更新時間: 2024-11-16 22:50


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 401-450 of 566. (12 Page(s) Totally)
    << < 3 4 5 6 7 8 9 10 11 12 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2019-03 Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Chih-Wen
    2016-04 PSI/TM-Coffee: a web server for fast and accurate multiple sequence alignments of regular and transmembrane proteins using homology extension on reduced databases 張家銘; Floden, Evan; Tommaso, Paolo Di; Chatzou, Maria; Magis, Cedrik; Notredame, Cedric; Chang, Jia-Ming
    2022-10 Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro; Chen, Yu-Chi
    2011 Puppet Playing: An Interactive Character Animation System with Hand Motion Control Li, Tsai-yen; Luo, Zhiqiang; Lin, Chih-Chung; Chen, I-Ming; Yeo, Song Huatand; 李蔡彥
    2014 Qos-Constraint Resource Allocation Scheduler for LTE Network Jang, Hung-Chin; Lee, Yun-Jun; 張宏慶
    1998 QoS routing in multihop packet radio environment Tsai, Tzu-chieh; Hsu, Yu-Ching; Lin, Ying-Dar; 蔡子傑
    2022-03 Quantum-resistant anonymous identity-based encryption with trable identities 曾一凡; 左瑞麟; Tseng, Yi-Fan; Tso, Raylin; Liu, Zi-Yuan; Mambo, Masahiro; Chen, Yu-Chi
    2008 Query-level Loss Functions for Information Retrieval 蔡銘峰; Qin,Tao; Zhang,Xu-Dong; Tsai,Ming-Feng; Wang,De-Sheng; Liu,Tie-Yan; Li,Hang
    2013-08 Rapid selection of hard-to-access targets by thumb on mobile touch-screens 余能豪; Yu,Neng-Hao; Huang,Da-Yuan; Hsu,Jia-Jyun; Hung,Yi-Ping
    2018 Rational quantum secret sharing Qin, Huawang; Tang, Wallace K. S.; 左瑞麟; Tso, Raylin
    2007 Realising voice dialogue management in a collaborative virtual environment Li, Tsai-yen; Liao, Chun-feng; 李蔡彥
    2006-08 Realization of Autonomous Digital Actor in Networked Virtual Environment 李蔡彥
    2007-06 Realizing Voice Dialog Management in a Collaborative Virtual Environment 李蔡彥; Liao,Chun-Feng; Li,Tsai-Yen
    2007-03 Real-Time Fine-Grained Multiple-Target Tracking on an Extensible Virtual Fab Architecture Using Multi-Agents 廖峻鋒; Lu,Ching-Hu; Liao,Chun-Feng; Wu,Chao-Lin; Fu,Li-Chen
    2016-05 Real-time Multiple Refraction by Using Image-Space Technology Chi, Ming-Te; Wang, Shi-Hao; Hu, Chen-Chi; 紀明德
    2006 Reducing Calibration Effort for WLAN Location and Tracking System using Segment Technique Tsai, Tzu-chieh; Li, Cheng-lin; Lin, Tsung-ming; 蔡子傑
    1993-12 Refining imprecise data by integrity constraints 陳良弼; Tseng,Frank S.C.; Chen,Arbee L.P.; Yang,Wei-Pang
    2012-06 Region-based Line Field Design Using Harmonic Functions 紀明德; Chi,Ming-Te; Yao,Chih-Yuan; Lee,Tong-Yee; Tao Ju
    2008-03 Relevance feedback for category search in music retrieval based on semantic concept learning 沈錳坤; Meng-Fen Chiang; Fang-Fei Kuo
    2013-03 Risk ranking from financial reports Tsai, Ming-Feng; 蔡銘峰; Wang, C.-J.
    2017-06 Robust good-deal bounds in incomplete markets: The case of Taiwan Chen, Jun Home; Huang, Y.-L.; Chang, J.-R.
    2011-06 Robust refinement methods for camera calibration and 3D reconstruction from multiple images Hor, Maw-Kae; 何瑁鎧; Tang, C.-Y.; 詹凱軒; Tsai, Jeng Jiun; 蔡政君; Chan, Kai-Hsuan; Wu, Y.-L.
    2013 Robust trifocal tensor constraints for structure from motion estimation Hor, Maw-Kae; 何瑁鎧; Chan, Kai-Hsuan; Tang, C.-Y.; Wu, Y.-L.; 詹凱軒
    2017-09 ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home 廖峻鋒; Liao, Chun-Feng; Chen, Peng-Yu
    2009 Satisfaction with Taiwan’s medical institutions of research and analysis Ho, Cheng-Kuang
    2024-04 Scalable and Foldable Origami-Inspired Supernumerary Robotic Limbs for Daily Tasks 蔡欣叡; Tsai, Hsin-Ruey; Kusunoki, Mikiya; Nguyen, Linh Viet; Ho, Van Anh; Xie, Haoran
    1995 Schema Integration and Query Processing for Multiple Object Databases 陳良弼; Chen,Arbee L.P.; Koh,Jia-Ling; Kuo,Tony C.T.; Liu,Chih-Chin
    1993-10 Searching a minimal semantically-equivalent subset of a set of partial values 陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D.
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2013-11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
    2013-07 Security Analysis of Choi et al.`s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
    2009-05 Selecting Baysian-network models based on simulated expectation Liu, Chao-Lin; 劉昭麟
    2008-08 Self-Animating Images: Illusory Motion Using Repeated Asymmetric Patterns 紀明德; Chi, Ming-Te; Lee, Tong-Yee; Qu, Yingge; Wong, TienTsin
    2012-10 Semantic legal policies for data exchange and protection across super-peer domains in the cloud 胡毓忠; 黃雅玲; 鄭國平; 吳穩男
    2012 Semantics-enabled Policies for Super-Peer Data Integration and Protection 胡毓忠; Hu,Yuh-Jong; Wu,Win-Nan; Yang,Jiun-Jan
    2017-07 Senior high school students’ comprehension and interest in science content: Example of participating in first-hand experimental activities 謝佩璇; Hsieh, P. H.
    2019-03 Sentiment Classification for Web Search Results 楊亨利; Yang, Heng-Li; Huang, Hung-Chang
    2007-02 Service-Oriented Smart Home Architecture based on OSGi and Mobile Agent Technology 廖峻鋒; Wu,Chao-Lin; Liao,Chun-Feng; Fu,Li-Chen
    2018-09 Short-Term PM2.5 Forecasting Using Exponential Smoothing Method: A Comparative Analysis 蔡子傑; Tsai, Tzu-Chieh; Mahajan, Sachit*; Chen, Ling-Jyh
    2011-06 Side-Effect Localization for Lazy, Purely Functional Languages via Aspects 陳恭; Chen, Kung; Weng, Shu-Chun; Wang, Meng; Lin, Jia-Yin
    2006 Similarity-based Motion Track Management for Video Retrieval 陳良弼; CHEN,PEI-YI; CHEN,ARBEE L. P.
    1989 Similarity retrieval of iconic image database 沈錳坤; Lee,Suh-Yin; Shan,Man-Kwan; Yang,Wei-Pang
    2006 Similarity Search in Transaction Databases with a Two-Level Bounding Mechanism J-C- Chuang; C-W- Cho; 陳良弼
    2017-11 Single-cell absolute contact probability detection reveals chromosomes are organized by multiple low-frequency yet specific interactions 張家銘; Cattoni, Diego I.; González, Inma; Chang, Jia-Ming; Sexton, Thomas; Marc, A. Marti-Renom; Bantignies, Frédéric
    2022-02 Single Image Reflection Removal Based on Knowledge-Distilling Content Disentanglement 彭彥璁; Peng, Yan-Tsung; Cheng, Kai-Han; Fang, I-Sheng; Peng, Wen-Yi; Wu, Jr-Shian
    2014-08 Smartphone App Usage Log Mining 徐國偉; Hsu, Kuo-Wei
    2014-04 Smartphone App Usage Log Mining 徐國偉; Tseng,Woan-Rou; Hsu,Kuo-Wei
    2016-01 Social Sensor: an Analysis Tool for Social Media 李蔡彥; Wu, Chun-Hsiao; Li, Tsai-Yen
    2007-01 Software Piracy Attacks on Java Software Using Malicious Aspects 陳恭; 陳鉅秉
    2011-12 Some chances and challenges in applying language technologies to historical studies in Chinese 劉昭麟; Liu, Chao-Lin

    Showing items 401-450 of 566. (12 Page(s) Totally)
    << < 3 4 5 6 7 8 9 10 11 12 > >>
    View [10|25|50] records per page

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback