瀏覽 的方式: 題名

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 425 到 444 筆資料,總共 15457 筆 < 上一頁   下一頁 >
題名作者日期
A Bucket Index Scheme for Error Tolerant Chinese Phrase MatchingDu, Min-Wen; Wu, Hsi-Hso2006-10-30T01:43:24Z
A Burst Fragmentation and Scheduling Algorithm (BFSA) for Downlink Traffic in IEEE 802.16 OFDMA Systems石, 貴平 Jr; 陳, 弘璋 Jr; 蔣, 季陶 Jr; 陳, 磬霖 Jr2011-05-30T20:56:02Z
A Business-oriented Architecture Compliant with Semantic SOAYou, Yuan-chwen2008-08-05T01:40:59Z
A Capacity Measurement of Workflow Management SystemsCheng, Jian-Chang; Wang, Jian-Wei; Wang, Feng-Jian2006-10-16T05:33:00Z
A Capacity Measurement of Workflow Management SystemsCheng, Jian-Chang; Wang, Jian-Wei; Wang, Feng-Jian2006-10-16T03:29:09Z
A Change of Heart?A Bivariate Probit Model of International Students’ Change of Return IntentionJan-Jan Soon2010/08/01
A Characteristic Based Scheduling Scheme for VBR Traffic over ATM NetworksHu, Shuo-Cheng; Wang, Yu-Fu; Chen, Yaw-Chung2006-10-20T19:51:02Z
A Chinese-Character Stroke Extaction Algorithm Based on Contour InformationLee, Chung-Nan; Wu, Bo-Hom2006-10-30T01:37:18Z
A Classifier Learning Scheme based on Rough Membership and Genetic ProgrammingChien, Been-Chian; Yang, Jui-Hsiang2006-10-24
A Clustering Technique for Digital Communication Channel Equalization Using Wavelet Neural NetworksTsai, Hung-Ming; Lin, Cheng-Jian; Chen, Po-Yueh2006-10-11T07:56:26Z
A CMAC with Content Addressable MemoryHsu, Yuan-Pao; Hwang, Kao-Shing; Wang, Jinn-Shyan2006-10-27T03:49:49Z
A Coating containing Polyacrylate Copolymer with dispersing Nano Zirconium Dioxide朱侯憲08-10-19
A Cognitive MAC Protocol for QoS Provisioning in Overlaying Ad Hoc NetworksWang, Li-Chun; Chen, Anderson; Wei, S. L.2007-01-29T01:33:47Z
A Cointegration Analysis of Purchasing Power Parity and Country RiskSu-Yin Cheng; Jong-Shin Wei; Han Hou2008/12/01
A Collaborative Anti-Spam E-mail FilterHuang, Wei-Li; Lee, Ying-Sung; Tsai, Wen-Nung2007-01-31T01:38:26Z
A COLLABORATIVE INTERNET DOCUMENTS ACCESS SCHEME USING ACIRDLin, Shian-Hua; Shih, Chi-Sheng; Chen, Meng-Chang; Ho, Jan-Ming; Ko, Ming-Ta2006-10-22T12:20:06Z
A Collusion Attack on Ghodosi and Saeednia’s SchemeChen, Chien-Yuan; Hsueh, Chih-Cheng2006-10-17T03:50:42Z
A Column Generation Approach to Solve Proportionate Flexible Flow Shop for Common Due Date SchedulingShiau, Der-Fang; Cheng, Shu-Chen; Huang, Yueh-Min; Hsu, Pi-Chung2006-10-11T07:55:44Z
A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored DataKu, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn2006-10-16T05:38:00Z
A Common-Use Proxy for Economic Performance: Application to Asymmetric Causality between the Stock Returns and GrowthYuan-Ming Lee; Kuan-Min Wang; T. Thanh-Binh Nguyen2008/08/01