政大機構典藏-National Chengchi University Institutional Repository(NCCUR):
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113656/144643 (79%)
造訪人次 : 51745046      線上人數 : 610
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    子類別

    國科會研究計畫 [223/223]
    學位論文 [816/824]
    專利 [6/6]
    專書/專書篇章 [49/49]
    會議論文 [800/1188]
    期刊論文 [564/576]
    研究報告 [3/22]
    考古題 [55/55]

    鄰近社群


    資訊科學系碩士在職專班 [159/165]
    社群網路與人智計算國際研究生博士學位學程(TIGP) [7/7]
    資訊安全碩士學位學程 [2/2]

    社群統計


    近3年內發表的文件:190(6.46%)
    含全文筆數:2513(85.48%)

    文件下載次數統計
    下載大於0次:2376(94.55%)
    下載大於100次:2218(88.26%)
    檔案下載總次數:3629722

    最後更新時間: 2024-12-25 05:14

    上傳排行

    資料載入中.....

    下載排行

    資料載入中.....

    RSS Feed RSS Feed

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目826-850 / 2939. (共118頁)
    << < 29 30 31 32 33 34 35 36 37 38 > >>
    每頁顯示[10|25|50]項目

    日期題名作者
    2016-11 How do software users read software installation agreements? An eye-tracking experiment. 謝佩璇; Hsieh, P. H.; Hsu, P. I.
    2009-12 How do strategic groups handle cognitive complexity to sustain competitive advantage? A commentary essay Huang, Kuofeng; 黃國峯
    1994-05 How to Use a Client-Server Framework to Build Application Systems in the Heterogeneous Environment 胡毓忠
    2005 How to verify the threshold t of the Shamir’s (t,n)-threshold scheme 左瑞麟; Tso,Raylin; Miao,Ying; Takeshi Okamoto; Eiji Okamoto
    2020-12 HRCenterNet: An anchorless approach to Chinese character segmentation in historical documents 劉昭麟; Liu, Chao-Lin; Tang, Chia-Wei; Chiu, Po-Sen
    2021-09 HRRegionNet: Chinese Character Segmentation in Historical Documents with Regional Awareness 劉昭麟; Liu, Chao-Lin; Tang, Chia-Wei; Chiu, Po-Sen
    2001-03 HTML 與 WML 之間的轉換與整合開發環境 張宏慶; 連耀南; 陳宗儀; 何彥德; 吳曉峰; 蔡子傑
    2011 HuayuNavi: A mobile chinese learning application based on intelligent character recognition Kuo, Jen Ho; Huang, Cheng-Ming; Liao, Wen-Hung; Huang, C.-C.; 郭仁和; 黃政明; 廖文宏
    2024-08 Human-Robot Collaboration in Unmanned Aerial Vehicle River Patrol Application 劉吉軒; Liu, Jyi-Shane; Chen, Chia-Wen; Lee, Gong-Yi
    2012 Hybrid ensembles of decision trees and artificial neural networks Hsu, Kuo-Wei; 徐國偉
    2002 Hybrid Network Implementation:Integration of Wireless LAN Multihop and Ethernet 蔡子傑; M.R. Wu; T.Y.Lin
    2007-01 Hydrangea: A Hybrid Ontology Directed Feedback Generation Algorithm for Supporting Creative Problem Solving Dialogues H. C. Wang; R. Kumar; C. Roseacute; 李蔡彥; C. Y. Chang; Li, Tsai-Yen
    2020 Hyperledger Fabric 應用於全民公投之連署書驗證暨查詢平台 陳君虹; Chen, Chun-Hung
    2017-08 ICE: Item Concept Embedding via Textual Information 蔡銘峰; Wang, Chuan-Ju; Wang, Ting-Hsiang; Yang, Hsiu-Wei; Chang, Bo-Sin; Tsai, Ming-Feng
    2009 ID-based group password-authenticated key exchange Yi, X.; Tso, Ray Lin; 左瑞麟
    2022-11 ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Hsu, Ya-Wen; Shie, Cheng-Han
    2007-03 Idea Storming Cube: A Game-based System to Support Creative Thinking C. C. Huang; 李蔡彥; H. C. Wang; C.Y. Chang; Li, Tsai-Yen
    2019-07 Identification of alternative splicing characteristic associated with clear-cell ovarian cancer from paired normal and tumor tissues 張家銘; HUANG, YU-TING; SHIAO, MENG-SHIN; TSAI, CHEN-AN; LAN, KUER-YUAN; LIN, CHIEH-HSI; JIANAWATH, NATINI
    1996-04 Identifying object isomerism in multidatabase systems 陳良弼; Chen,Arbee L. P.; Tsai, Pauray S. M.; Koh, Jia-Ling
    2010-07 Identifying Prototypical Melodies by Extracting Approximate Repeating Patterns from Music Works 陳良弼; LIU,NING-HAN; WU,YI-HUNG; CHEN,ARBEE L. P.
    2017-01 Identifying user profile using facebook photos Liao, Wen-Hung; Chang, Ting-Ya; Wu, Yi-Chieh; 廖文宏
    2019-12 Identity-based Blind Multisignature from Lattices 曾一凡; Tseng, Yi-Fan; Tso, Raylin; Liu, Zi-Yuan
    2023-06 Identity-Based Broadcast Encryption Schemes Supporting Traitor Tracing from Quadratic Residues 曾一凡
    2012 Identity-based password-authenticated key exchange for client/server model Yi, X.; Tso, Ray-Lin; Okamoto, E.; 左瑞麟
    2021-08 Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia

    顯示項目826-850 / 2939. (共118頁)
    << < 29 30 31 32 33 34 35 36 37 38 > >>
    每頁顯示[10|25|50]項目

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋