瀏覽 的方式: 題名

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1869 到 1888 筆資料,總共 15457 筆 < 上一頁   下一頁 >
題名作者日期
creo電腦輔助工程設計:檯燈張毓容; 何承儒; 郭芫辰; 許峻銘2016-03-10T06:03:11Z
Cropland Mapping with Multispectral UAV Imagery and Convolutional Neural Networks徐逸祥07-19-19
Cropland Mapping with Multispectral UAV Imagery and Convolutional Neural Networks莊永忠07-19-19
Cropland Mapping with Multispectral UAV Imagery and Convolutional Neural Networks林峰正07-19-19
Cross Layer Design of Handoffs in IEEE 802.16e NetworkHsieh, Fu-Yia; Chen, Yen-Wen; Wu, Po-Wei2007-01-29T07:17:37Z
Cross-Border M&A: Cultural Disparities and the Associated Wealth EffectsFang (Helga) He; Feng-Shun (Leo) Bin; Dar-Hsin Chen2008/08/01
Cross-Cultural Emailing Politeness for Taiwanese StudentsChao-Chih Liao2012/09/19
Cross-layer Cooperative Routing for Vehicular NetworksChen, Wei-Hui Jr; Hu, Shuo-Cheng Jr; Pang, Ai-Chun Jr; Fan Chiang, Chung-Tsen Jr2011-01-10T00:05:19Z
Cross-Site Scripting Attack Detection Based on Hidden Markov ModelWu, Yeng-Ting Jr; Lin, Shiou-Jing Jr; Liu, En-Si Jr; Pao, Hsing-Kuo Jr; Mao, Ching-Hao Jr; Lee, Hahn-Ming Jr2011-03-25T00:45:11Z
Cross-Strait Relations: Recent Developments and the Impact on the U.S. Hegemony in Asia-PacificChih-Cheng Yang2012/10/30
Crowd Wisdom Filtering and Recommendation Technology楊士霆07-03-19
Crown :分散式格網服務搜尋協定李易寰; 蔡昆樺; 王宗一2006-06-15T09:16:22Z
Cryptanalysis and improvement of an improved Identity-Based key exchange protocolTseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung2006-10-16T04:00:56Z
Cryptanalysis of a digital signature scheme based on factoring and discrete logarithmsSun, Hung-Min2006-10-17T03:53:12Z
Cryptanalysis of a More Secure Remote User Authentication SchemeHorng, Wen-Bing Jr; Lee, Cheng-Ping Jr; Peng, Jian-Wen Jr2011-01-10T02:18:09Z
Cryptanalysis of a New Password Authentication Scheme Using Hash FunctionsKu, Wei-Chi; Chiang, Min-Hung; Chang, Shen-Tien2006-10-16T05:33:45Z
Cryptanalysis of A One-Time Password Authentication ProtocolKu, Wei-Chi; Chen, Chien-Ming2006-10-17T03:50:28Z
Cryptanalysis of A Remote User Authentication Scheme Based on Smart CardsHorng, Gwoboa; Liu, Chao-Liang; Chou, Po-Kun2006-06-09T08:54:41Z
Cryptanalysis of an anonymous user identification and key distribution schemeYang, Fuw-Yi2006-10-16T05:38:21Z
Cryptanalysis of an Enhanced Authentication Key Exchange ProtocolYang, Fuw-Yi; Jan, Jinn-Ke2006-10-16T05:38:08Z