| 國立臺灣大學 |
2007-02 |
On the effect of error correlation on matched-field geoacoustic inversion
|
Huang, C.F.; Gerstoft, P.; Hodgkiss, W. S. |
| 國立交通大學 |
2014-12-08T15:16:38Z |
On the effect of group mobility to data replication in ad hoc networks
|
Huang, JL; Chen, MS |
| 臺大學術典藏 |
2006-05 |
On the Effect of Group Mobility to Data Replication in Ad Hoc Networks
|
Huang, Jiun-Long; Chen, Ming-Syan; Huang, Jiun-Long; Chen, Ming-Syan |
| 國立臺灣大學 |
2006-05 |
On the Effect of Group Mobility to Data Replication in Ad Hoc Networks
|
Huang, Jiun-Long; Chen, Ming-Syan |
| 國立屏東大學 |
2011-07 |
On the Effect of Idioms Comprehension of ESL College Students
|
徐佩瑜 |
| 元智大學 |
2011-05 |
On the Effect of Link Break Problem on Routing Protocols in Wireless Ad Hoc Networks
|
蔡耀斌; Ying-Kwei Ho; Ching-Chuan Chiang; Liu R.-S. |
| 國立交通大學 |
2014-12-08T15:35:46Z |
On the Effect of Population Size and Selection Mechanism from the Viewpoint of Collaboration between Exploration and Exploitation
|
Lin, Jih-Yiing; Chen, Ying-ping |
| 國立政治大學 |
2002 |
On the Effect of Stock Stabilization Fund: A Case of Taiwan
|
Liu, Yu-Jane; 劉玉珍 |
| 臺大學術典藏 |
2018-09-10T08:35:48Z |
On the effective temperature and Reynolds number concept for a heated circular cylinder: Commentary of the article by Baranyi et al
|
AN-BANG WANG;Wang, A.-B.;Tr?vn??ek, Z.; Tr?vn??ek, Z.; Wang, A.-B.; AN-BANG WANG |
| 臺大學術典藏 |
2020-05-05T08:40:28Z |
On the effective temperature and Reynolds number concept for a heated circular cylinder: Commentary of the article by Baranyi et al
|
Tr?vn??ek Z.; Wang A.-B.; AN-BANG WANG |
| 臺大學術典藏 |
2018-09-10T06:22:03Z |
On the effective temperature concept in the problem of laminar vortex shedding behind a heated circular cylinder
|
AN-BANG WANG;Wang, A.-B.;Tr?vn??ek, Z.;Fedorchenko, A.I.; Fedorchenko, A.I.; Tr?vn??ek, Z.; Wang, A.-B.; AN-BANG WANG |
| 臺大學術典藏 |
2020-05-05T08:40:31Z |
On the effective temperature concept in the problem of laminar vortex shedding behind a heated circular cylinder
|
Fedorchenko A.I.; Tr?vn??ek Z.; Wang A.-B.; AN-BANG WANG |
| 國立臺灣海洋大學 |
2011-12 |
On the effective throughput gain of cooperative diversity with a fast retransmission scheme for delay-sensitive flows
|
Yao-Liang Chung; Z. Tsai |
| 臺大學術典藏 |
2018-09-10T08:46:20Z |
On the effective throughput gain of cooperative diversity with a fast retransmission scheme for delay-sensitive flows
|
Y.-L. Chung; Z. Tsai; ZSEHONG TSAI |
| 國立交通大學 |
2014-12-08T15:49:21Z |
On the effective traffic control of ABR services in ATM networks
|
Chen, YC; Chan, CT; Hu, SC |
| 國立中正大學 |
2013 |
On the Effectiveness of Detecting Obfuscated Repackages in Android Applications
|
黃翊綾; Huang, Yi-Ling |
| 國立交通大學 |
2014-12-08T15:26:18Z |
On the effectiveness of distributing information among vehicles using inter-vehicle communication
|
Wang, SY |
| 中國文化大學 |
2002-06-01 |
On the Effectiveness of Integrating Probabilistic Neural Networks with Influence Diagrams
|
曾敏烈 |
| 中國醫藥大學 |
2013-11-23 |
ON THE EFFECTIVENESS OF PROBLEM-BASED LEARNING (PBL) IN INTER-PROFESSIONAL ETHICS TRAINING
|
辛幸珍(Hsin-Chen Hsin);辛幸珍(Hsin-Chen Hsin) |
| 國立交通大學 |
2019-04-02T06:04:33Z |
On the Effectiveness of Scheduling Fuzz Testing
|
Chen, Wei-Jun; Tyan, Hsiao-Rong; Huang, Shih-Kun |
| 亞洲大學 |
2008 |
On the effectiveness of speech enhancement to a proposed speech recognition process that applied to noisy isolated-word recognition
|
Liu, Lih-Cherng; Lu, Ching-T.A. ; Tsai, H.O.-Hsuan |
| 亞洲大學 |
2008-07 |
On the effectiveness of speech enhancement to a proposed speech recognition process that applied to noisy isolated-word recognition
|
劉利誠;Liu, Lih-Cherng;陸清達;Lu, Ching-Ta;劉利誠;Liu, Lih-Cherng |
| 亞洲大學 |
2008.07 |
On the effectiveness of speech enhancement to a proposed speech recognition process that applied to noisy isolated-word recognition
|
劉利誠;Liu, Lih-Cherng;陸清達;Lu, Ching-Ta |
| 臺大學術典藏 |
2018-09-10T09:25:13Z |
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks
|
JW Chou; SD Lin; CM Cheng; CHEN-MOU CHENG; SHOU-DE LIN |
| 臺大學術典藏 |
2020-05-04T08:05:05Z |
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
|
Cheng, Chen-Mou; SHOU-DE LIN; Lin, Shou-De; Chou, Jung-Wei |