English  |  正體中文  |  简体中文  |  Total items :2856565  
Visitors :  53379358    Online Users :  1280
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 190206-190255 of 2348971  (46980 Page(s) Totally)
<< < 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 > >>
View [10|25|50] records per page

Institution Date Title Author
輔英科技大學 2011-03-01 (-)-Anonaine induces DNA damage and inhibits growth and migration of human lung carcinoma H1299 cells Chen, Bing-Hung ;Chang, Hsueh-Wei ;Huang, Hsuan-Min ;Chong, Inn-Wen ;Chen, Jia-Shing ;Chen, Chung-Yi ;Wang, Hui-Min
高雄醫學大學 2011 (-)-Anonaine induces DNA damage and inhibits growth and migration of human lung carcinoma h1299 cells.? Bing-Hung Chen, Hsueh-Wei Chang,Hsuan-Min Huang,鍾飲文,Jia-Shing Chen,Chung-Yi Chen,Hui-Min Wang*?; Bing-Hung Chen, Hsueh-Wei Chang,Hsuan-Min Huang,Inn-Wen Chong,Jia-Shing Chen,Chung-Yi Chen,Hui-Min Wang*?
高雄醫學大學 2011 (-)-Anonaine induces oxidative stress and DNA damage to inhibit growth and migration of human lung carcinoma H1299 cells.  黃宣旻;王惠民;張學偉 
東海大學 2008 Anomaly detection using LibSVM training tools Liu, J.-C., Lin, C.-H., Yu, J.-L., Lai, W.-S., Ho, C.-H.
東海大學 20080424-- Anomaly detection using LibSVM training tools Lin, C.-H., Liu, J.-C., Ho, C.-H.
東海大學 2008-04-24 Anomaly detection using LibSVM training tools?? Lin, C.-H., Liu, J.-C., Ho, C.-H.
國立成功大學 2019 Anomaly detection using one-class SVM for logs of juniper router devices Nguyen, T.-B.-T.;Liao, T.-L.;Vu, T.-A.
臺大學術典藏 2019-10-24T07:38:51Z Anomaly Detection via Online Over-Sampling Principal Component Analysis 王鈺強;YU-CHIANG WANG;Y.-C. F. Wang;Y.-R. Yeh;Y.-J. Lee; Y.-J. Lee; Y.-R. Yeh; Y.-C. F. Wang; YU-CHIANG WANG; 王鈺強
國立臺灣科技大學 2013 Anomaly detection via online oversampling principal component analysis Lee, Y.-J.;Yeh, Y.-R.;Wang, Y.-C.F.
國立臺灣科技大學 2009 Anomaly detection via over-sampling principal component analysis Yeh Y.-R.; Lee Z.-Y.; Lee Y.-J.
中國文化大學 2009 Anomaly detection via over-sampling principal component analysis 葉倚任等著
國立臺灣科技大學 2009 Anomaly foreground detection through background learning in video surveillance Tang C.-Y.; Wu Y.-L.; Chao S.-P.; Chen W.-C.; Chen P.-L.
臺大學術典藏 2022-06-30T02:05:54Z Anomaly Inflow and p-Form Gauge Theories Hsieh C.-T.; Tachikawa Y.; Yonekura K.; Hsieh C.-T.; Tachikawa Y.; Yonekura K.; CHANG-TSE HSIEH
臺大學術典藏 2022-06-30T02:05:56Z Anomaly manifestation of Lieb-Schultz-Mattis theorem and topological phases Cho G.Y.; Hsieh C.-T.; Ryu S.; Cho G.Y.; Hsieh C.-T.; Ryu S.; CHANG-TSE HSIEH
臺大學術典藏 2022-06-30T02:05:55Z Anomaly Matching and Symmetry-Protected Critical Phases in SU (N) Spin Systems in 1+1 Dimensions Yao Y.; Hsieh C.-T.; Oshikawa M.; Yao Y.; Hsieh C.-T.; Oshikawa M.; CHANG-TSE HSIEH
臺大學術典藏 2022-06-30T02:05:56Z Anomaly of the Electromagnetic Duality of Maxwell Theory Hsieh C.-T.; Tachikawa Y.; Yonekura K.; Hsieh C.-T.; Tachikawa Y.; Yonekura K.; CHANG-TSE HSIEH
國立交通大學 2014-12-08T15:33:53Z Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communication? Xiong, Wei; Hu, Hanping; Xiong, Naixue; Yang, Laurence T.; Peng, Wen-Chih; Wang, Xiaofei; Qu, Yanzhen
國立臺灣大學 2007 Anomeric Reactivity-Based One-Pot Synthesis of Heparin-like Oligosaccharides Polat, T?lay; Wong, Chi-Huey
臺北醫學大學 1991 Anomoline及Annonelliptine生物鹼化學全合成之研究 傅玉妃; FU, YU-FEI
國立臺灣海洋大學 2016-12 Anomuran and brachyuran symbiotic crabs in coastal areas between the southern Ryukyu arc and the Coral Triangle Parinya Limviriyakul ; Li-Chun Tseng; Jiang-Shiou Hwang ; Tung-Wei Shih
臺大學術典藏 2018-09-10T04:35:45Z ANON: an IP-layer Anonymizing Infrastructure CM Cheng; HT Kung; KS Tan; S Bradner; CHEN-MOU CHENG
國立政治大學 2013 Anonymization for multiple released social network graphs Wang, C.-J.L.;Wang, E.T.;Chen, Arbee L P
國立高雄大學 2011-12 Anonymizing Multiple K-anonymous Shortest Paths For Social Graphs Wang, Shyue-Liang;Tsai, Zheng-Ze; 洪宗貝; 丁一賢; Tsai, Yu-Chuan
國立高雄大學 2010-12 Anonymizing Set-valued Social Data Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Hong, Tzung-Pei
國立高雄大學 2010-12 Anonymizing Set-Valued Social Data Wang, Shyue-Liang; Tsai, Yu-Chuan; Kao, Hung-Yu; Hong, Tzung-Pei
國立高雄大學 2011-04 Anonymizing Shortest Paths on Social Network Graphs Wang, Shyue-Liang; Tsai, Zheng-Ze; Hong, Tzung-Pei; Ting, I-Hsien
國立臺灣科技大學 2009 Anonymous authentication for wireless access in internet from pairings Wu S.T.; Chiu J.H.; Chieu B.C.
國立臺灣科技大學 2014 Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks Hsieh, W.-B.;Leu, J.-S.
國立中山大學 2007 Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications Chun-I Fan;Vincent Shi-Ming Huang
亞洲大學 2007-06 Anonymous Authentication Scheme for Wireless Communications Lee, J.S. ; Chang, C. C. ; Chang, P. Y.
國立臺灣大學 1996-12 Anonymous Channel and Authentication in Wireless Communication Lei, C. L.; Juang, W. S.; Fan, C. I.
國立臺灣大學 1999 Anonymous channel and authentication in wireless communications Juang, W. -S.; Lei, C. -L.; Chang, C. -Y.
臺大學術典藏 2018-09-10T07:41:38Z Anonymous Channel and Authentication in Wireless Communications W. S. Juang; C. L. Lei; C. Y. Chang; CHIN-LAUNG LEI
國立中山大學 1996 Anonymous Channel and Authentication in Wireless  Communications Wen-Shenq Juang;Chin-Laung Lei;Chun-I Fan
國立臺灣科技大學 2010 Anonymous coexistence proofs for RFID tags Lo N.-W.; Yeh K.-H.
國立中山大學 1999 Anonymous Communication Policies for the Internet: Recommendations of An AAAS Conference R. Kling; M.S. Frankel; A. Teich; Y.C. Lee
亞洲大學 2002-05-16 Anonymous Conditional Purchase Order Electronic Payment System 廖鴻圖;莊文勝;范修維;黃彥穆
國立彰化師範大學 1999 Anonymous Conference Key Distribution Systems Based on the Discrete Logarithm Problem Tseng, Yuh-Min; Jan, J. K.
國立中山大學 2009 Anonymous Electronic Lottery Protocol Chun-I Fan;Chun-Liang Chang;Ming-Te Chen;Pei-Hsiu Ho
國立中山大學 2007 Anonymous Fair Transaction Protocols Based on Electronic Cash Chun-I Fan;Yu-Kuang Liang
臺大學術典藏 2020-06-04T07:49:49Z Anonymous Heterogeneous Distributed Detection: Optimal Decision Rules, Error Exponents, and the Price of Anonymity. Chen, Wei-Ning;Wang, I-Hsiang; Chen, Wei-Ning; Wang, I-Hsiang; I-HSIANG WANG
淡江大學 2005 Anonymous micropayment schemes with anonymity revocation 黃嘉濰; Huang, Chia-wei
國立中山大學 2007 Anonymous Multi-Receiver Identity-Based Encryption Ling-Ying Huang;Chun-I Fan
國立中山大學 2009 Anonymous Multi-Receiver Identity-Based Encryption Chun-I Fan;Ling-Ying Huang;Pei-Hsiu Ho
國立交通大學 2014-12-08T15:09:35Z Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication Lin, Hsiao-Ying; Tzeng, Wen-Guey
淡江大學 2007-03 Anonymous Proxy Automatic Signature Schemes with Compiler Agents for (Unknown) Virus Detection 黃心嘉; Hwang, Shin-jia; Chen, Kuang-his
淡江大學 2014-10 Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks Hwang, Ren-Junn; Hsiao, Yu-Kai
東海大學 2006-10-08 Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem Chung, Y.F.a , Wu, Z.Y.b , Lai, F.ac , Chen, T.S.d
國立臺灣大學 2006 Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem Chung, Y. F.; Wu, Z. Y.; Lai, F. P.; Chen, T. S.
臺大學術典藏 2020-04-16T02:35:08Z Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem Chen, T.S.; FEI-PEI LAI; Chung, Y.F.; Wu, Z.Y.; Lai, F.

Showing items 190206-190255 of 2348971  (46980 Page(s) Totally)
<< < 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 > >>
View [10|25|50] records per page