| 國立交通大學 |
2014-12-08T15:36:59Z |
On preventing type flaw attacks on security protocols with a simplified tagging scheme
|
Li, YF; Yang, W; Huang, CW |
| 國立成功大學 |
2005-06 |
On Pricing of the Up-and-Out Call-A Boundary Integral Method Approach
|
Wang, Andrew Ming-Long; Shen, Shih-Yu |
| 國立交通大學 |
2014-12-08T15:04:05Z |
ON PRIME LABELINGS
|
FU, HL; HUANG, KC |
| 國立成功大學 |
2003 |
On prime rings satisfying a certain generalized polynomial identity
|
Chebotar, Mikhail A.; Fong, Yuen; Wang, Chern-Shuh |
| 國立成功大學 |
2017 |
On prime rings whose central closure is finitely generated
|
Chebotar, M.;Ke, W.-F.;Lee, P.-H.;Puczy?owski, E.R. |
| 國立臺灣大學 |
2009 |
On prime rings with commuting nilpotent elements
|
Chebotar, M. A.; Lee, P. H.; Puczylowski, E. R. |
| 國立臺灣大學 |
1974 |
On primitive rings with involution
|
Lee, P.-H |
| 淡江大學 |
2000-05-01 |
On primitive roots conjecture for certain two-dimensional tori
|
陳燕美 |
| 國立臺灣大學 |
2010-01 |
On primitive roots for rank one Drinfeld modules
|
Yao, Wei-Chen; Yu, Jing |
| 臺大學術典藏 |
2018-09-10T08:10:19Z |
On primitive roots for rank one Drinfeld modules
|
Yao, W.-C.; Yu, J.; JING YU |
| 淡江大學 |
2002-03-01 |
On primitive roots of one dimensional tori
|
陳燕美; Chen, Yen-mei J. |
| 淡江大學 |
2000 |
On Primitive Roots of One-Dimensional Tori
|
陳燕美; Chen, Yen-mei J. |
| 淡江大學 |
2003-02 |
On primitive roots of tori : The function field case
|
陳燕美; Chen, Yen-Mei J.; Kitaoka, Yoshiyuki; Yu, Jing |
| 東海大學 |
2010-12 |
On principal Hessian directions for multivariate response regressions.
|
Lue, H.H.; 呂?輝 |
| 東海大學 |
2010-12 |
On principal Hessian directions for multivariate response regressions.
|
Lue, H.H.; 呂?輝 |
| 國立臺灣科技大學 |
2020 |
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining
|
Cha, S.;Wang, H.;Tan, Z.;Joung, Y.;Tseng, Y.;Yeh, K. |
| 臺大學術典藏 |
2022-05-30T02:36:16Z |
On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining
|
Cha, SC; Wang, H; Tan, ZY; YUH-JZER JOUNG; Tseng, YC; Yeh, KH |
| 國立成功大學 |
1999-11 |
On private-key encryption using product codes
|
Sun, Hung-Min |
| 國立政治大學 |
2004-01 |
On probabilistic methods in fuzzy theory
|
Hung T. Nguyen; Tonghui Wang; 吳伯林 |
| 國立東華大學 |
2006 |
On probe permutation graphs
|
Peng,S.-L.; Chandler,D. B.; Liu,J.; Kloks,T.; Chang,M.-S. |
| 國立臺灣大學 |
1990-12 |
On Processing a Class of Linear Complementarity Problems by a Perturbation Method.
|
古思明; Cottle, R. W.; Guu, Sy-Ming; Cottle, R. W. |
| 國立交通大學 |
2014-12-08T15:23:13Z |
On processing continuous frequent K-N-match queries for dynamic data over networked data sources
|
Chiu, Shih-Chuan; Huang, Jiun-Long; Huang, Jen-He |
| 國立成功大學 |
2009-01 |
On products of two Hermitian operators
|
Jiang, Chung-Chou |
| 淡江大學 |
2012-03 |
On Progressive Hybrid Censored Exponential Distribution
|
Lin, Chien-tai; Huang, Yen-lung |
| 臺大學術典藏 |
2018-09-10T05:57:27Z |
On progressive sequential pattern mining
|
Huang, J.-W.; Tseng, C.-Y.; Ou, J.-C.; Chen, M.-S.; MING-SYAN CHEN |