English  |  正體中文  |  简体中文  |  總筆數 :2856565  
造訪人次 :  53394116    線上人數 :  1240
教育部委託研究計畫      計畫執行:國立臺灣大學圖書館
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
關於TAIR

瀏覽

消息

著作權

相關連結

跳至: [ 中文 ] [ 數字0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
請輸入前幾個字:   

顯示項目 748326-748375 / 2348973 (共46980頁)
<< < 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 > >>
每頁顯示[10|25|50]項目

機構 日期 題名 作者
亞洲大學 2014-04 Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178. Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang
亞洲大學 201404 Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178. Anonymous
國立交通大學 2014-12-08T15:22:19Z Security optical data storage in Fourier holograms Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn
國立彰化師範大學 2012-03 Security Optical Data Storage in Fourier Holograms Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn
亞洲大學 2001-08 Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques R. C. Liu;W. H. Tsai
淡江大學 2008 Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait 白揚恩; Polisensky, Jan
臺大學術典藏 2021-08-09T08:34:47Z Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA
中國文化大學 2017-07 Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles 吳盈德
中國文化大學 2021-02 Security Privacy and Policy for Cryptographic Based Electronic Medical Information System Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu)
亞洲大學 2008-05 Security protection of face images transmitted on networks by information hiding techniques D. C. Wu, C. S. Li;W. H. Tsai
亞洲大學 2010-01 Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes I. S. Lee;W. H. Tsai
亞洲大學 2008-08 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes I. S. Lee;W. H. Tsai
國立成功大學 2020 Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S.
國立政治大學 2008 Security Relations among China, Japan and Taiwan, 1995-2008 羅思婷
淡江大學 2011 Security Robot Simulator Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C.
大葉大學 2004-07 Security Schemes for Protecting Mobile Agent Based Networks Ho;Tsaur, Woei-Jiunn
佛光大學 2009-06-10 Security Sector Reform and Its Practices in Taiwan 張中勇
佛光大學 2007-03-07 Security Sector Reform in Taiwan 張中勇
國立交通大學 2018-08-21T05:52:42Z Security Semantics Modeling with Progressive Distillation Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston
中國科技大學 2013-07-20 Security Software based on Windows NDIS Filter Drivers Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
國立臺灣海洋大學 2011-10 Security Threats in Advanced Metering Infrastructure He-Ming Ruan;Yu-Sheng Yang;I-An Fan;Pei-Jinn Chai;Chun-Ying Huang;Chin-Laung Lei
臺大學術典藏 2018-09-10T08:46:17Z Security Threats in Advanced Metering Infrastructure He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI
臺大學術典藏 1989-09 Security Valuation Models and the Accounting Data Wang, Tay-Chang; Wang, Tay-Chang
國立臺灣大學 1989-09 Security Valuation Models and the Accounting Data 王泰昌; Wang, Tay-Chang
元智大學 May-21 Security Verification for Cyber-Physical Systems Using Model Checking Ching-Chieh Chan; Cheng-Zen Yang; Chin-Feng Fan
淡江大學 2010-12 Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen
國立彰化師範大學 2009 Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment Chuang, Y. H. ; Tseng, Yuh-Min
國立成功大學 2015 Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs Gope, Prosanta; Hwang, Tzonelih
淡江大學 1998-03-29 Security, transparency and accountability : an analysis of R.O.C. arms acquisition process 陳一新; Chen, I-hsin
臺大學術典藏 2020-05-04T07:53:54Z Security-Aware Design Methodology and Optimization for Automotive Systems. Lin, Chung-Wei;Zheng, Bowen;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zheng, Bowen; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN
臺大學術典藏 2020-05-04T07:53:55Z Security-aware mapping for CAN-based real-time distributed automotive systems. Lin, Chung-Wei;Zhu, Qi;Phung, Calvin;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Phung, Calvin; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN
臺大學術典藏 2020-05-04T07:53:55Z Security-aware mapping for TDMA-based real-time distributed systems. CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.
臺大學術典藏 2020-05-04T07:53:54Z Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems. Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.
臺大學術典藏 2005 Security-Enhanced Data Delivery in Sensor Networks Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei; Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei
國立臺灣大學 2005 Security-Enhanced Data Delivery in Sensor Networks Kuo, C.-F.; Lu, Y.-F.; 逄愛君; Kuo, T.-W.; Kuo, C.-F.; Lu, Y.-F.; Pang, A.-C.; Kuo, T.-W.
國立臺灣大學 2005 Security-Enhanced Data Delivery in Sensor Networks Kuo, Chin-Fu; Lu, Yung-Feng; Pang, Ai-Chun; Kuo, Tei-Wei
國立成功大學 2009-06-15 SEC內線交易宣告對公司股價之影響 黃虹儒; Huang, Hung-Ju
國立政治大學 2018 SEC的執法強度對於內線交易的影響—基於不同性質公司的角度 李炯亮; Li, Jiong-Liang
輔英科技大學 2015-10-01 Sedanolide induces autophagy through the PI3K, p53 and NF-κB signaling pathways in human liver cancer cells. Hsieh SL; Chen CT;Jyh-Jye Wang; Kuo YH; Li CC; Hsieh LC; Wu CC;
臺大學術典藏 2018-09-10T05:47:25Z Sedation and analgesia for invasive procedures in intensive care unit Yu-Chang Yeh; YU-CHANG YEH
國立臺灣大學 2001 Sedation for Refractory Symptoms of Terminal Cancer Patients in Taiwan 邱泰源; 胡文郁; 呂碧鴻; 程劭儀; 陳慶餘; CHIU, TAI-YUAN; HU, WEN-YU; LUE, BEE- HORNG; CHENG, SHAO-YI; CHEN, CHING-YU
臺大學術典藏 2021-08-13T05:34:54Z Sedation for refractory symptoms of terminal cancer patients in Taiwan Chiu T.-Y.; Hu W.-Y.; Lue B.-H.; SHAO-YI CHENG; Chen C.-Y.
臺大學術典藏 2020-12-03T06:38:33Z Sedation for refractory symptoms of terminal cancer patients in Taiwan Chiu T.-Y.; Hu W.-Y.; Lue B.-H.; SHAO-YI CHENG; Chen C.-Y.
臺大學術典藏 2021-02-02T02:28:34Z Sedation for refractory symptoms of terminal cancer patients in Taiwan Tai-Yuan Chiu;Hu W.-Y.;Lue B.-H.;Cheng S.-Y.;Chen C.-Y.; TAI-YUAN CHIU; Hu W.-Y.; Lue B.-H.; Cheng S.-Y.; Chen C.-Y.
臺大學術典藏 2022-04-28T06:13:58Z Sedation for refractory symptoms of terminal cancer patients in Taiwan Chiu T.-Y.; WEN-YU HU; Lue B.-H.; Cheng S.-Y.; Chen C.-Y.
中國醫藥大學 2008-01-05 Sedation in NS patients 劉時凱(Shih-Kai Liu)
國立臺灣大學 2000 SEDATION OF UPPER GI ENDOSCOPY IN TAIWAN. (EDITORIAL) GASTROINTESTINAL ENDOSCOPY 王德宏; 林肇堂; WANG, TEH-HONG; LIN, JAW-TOWN
義守大學 2012-07 Sedation-associated hiccups in adults undergoing gastrointestinal endoscopy and colonoscopy Chien Cheng Liu;Cheng Yuan Lu;Ping Hsin Liu;Daw Shyong Perng;Chih Fang Changchien

顯示項目 748326-748375 / 2348973 (共46980頁)
<< < 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 > >>
每頁顯示[10|25|50]項目