Chung-Hua University Repository:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 8557/14866 (58%)
Visitors : 1429162      Online Users : 633
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Sub-Community

    Department of Bioinformatics [47/99]
    Department of Computer Science and Information Engineering [653/1386]
    Department of Information Management [453/663]

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:1153(53.68%)

    Download counts of the item
    Download times greater than 0:1153(100.00%)
    Download times greater than 100:1153(100.00%)
    Total Bitstream Download Counts:281098(11.25%)

    Last Update: 2024-12-04 18:30

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 1151-1200 of 2148. (43 Page(s) Totally)
    << < 19 20 21 22 23 24 25 26 27 28 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2006 Timing-Constrained Yield-Driven Wire Sizing for Critical Area Minimization 顏金泰; YAN, JIN-TAI
    2007 Timing-Constrained Yield-Driven Wiring Reconstruction for Critical Area Minimization 顏金泰; YAN, JIN-TAI
    2008 Timing-Driven Multi-Layer Steiner Tree Construction with Obstacle Avoidance 顏金泰; YAN, JIN-TAI
    2006 Timing-Driven Octilinear Steiner Tree Construction Based on Steiner-Point Reassignment 顏金泰; YAN, JIN-TAI
    2008 Timing-Driven Octilinear Steiner Tree Construction Based on Steiner-Point Reassignment and Path Reconstruction 顏金泰; YAN, JIN-TAI
    2005 Timing-Driven Steiner Tree Construction Based on Feasible Assignment of Hidden Steiner Points 顏金泰; YAN, JIN-TAI
    2008 Timing-Driven Steiner Tree Construction for Three-Dimensional ICs 顏金泰; YAN, JIN-TAI
    2005 Timing-Driven Steiner Tree Construction with Buffer Insertion 顏金泰; YAN, JIN-TAI
    2007 Timing-Driven Steiner Tree Construction with Wire Sizing, Buffer Insertion and Obstacle Avoidance 顏金泰; YAN, JIN-TAI
    2008 To analyze assessment using SPC Table 張文智; Chang, Wen-Chih
    2009 Tomography of functional organization in protein–protein interaction network 黃俊燕; Huang, Jiun-Yan
    2012 Top-Down-Based Symmetrical Buffered Clock Routing 顏金泰; YAN, JIN-TAI
    2007 Top-Down-Based Timing-Driven Steiner Tree Construction with Wire Sizing and Buffer Insertion 顏金泰; YAN, JIN-TAI
    2013 Top-k Monitoring Queries for Wireless Sensor Database Systems: Design and Implementation 李之中; Lee, Chi-Chung
    2006 Toward Merging of Economy Business Models into Grid Technology in NCHC GOCPortal 許慶賢; Hsu, Ching-Hsien
    2010 Toward Merging Ubiquitous and Grid Services 許慶賢; Hsu, Ching-Hsien
    2008 Towards a Multi-Agent Framework for Intelligent Tutoring Systems 王素華; Wang, Su-Hua
    2013 Towards Automatic Music Performance Comparison with the Multiple Sequence Alignment Technique 劉志俊; Liu, Chih-Chin
    2006 Towards Design of a File Location Selection System in Grid Environments 許慶賢; Hsu, Ching-Hsien
    2006 Towards Implementation of Economy Issues in Grid Environments 許慶賢; Hsu, Ching-Hsien
    2008 Towards Improving QoS-Guided Scheduling in Grids 許慶賢; Hsu, Ching-Hsien
    2008 Towards merging Grid and Pervasive Computing 許慶賢; Hsu, Ching-Hsien
    2006 Tracers Placement for IP Traceback against DDoS Attacks 王俊鑫; Wang, Chun-Hsin
    2006 Tracers Placement for IP Traceback against DDoS Attacks 俞征武; Yu, Chang Wu
    2006 Tracers Placement for IP Traceback against DDoS Attacks 游坤明; Yu, K.M.
    2006 Tracers Placement for IP Traceback against DDoS Attacks 梁秋國; Liang, Chiu-Kuo
    2006 Tracers placement for IP traceback against DDoS attacks 歐陽雯; Ouyang, Wen
    2005 Transactivation of hsp70-1/2 in geldanamycin-treated human non-small cell lung cancer H460 cells: involvement of intracellular calcium and protein kinase C. 張慧玫; Chang, Whei-meih
    2007 Transparent IP Mobility Management 劉懷仁; Liu, Huai-Jen
    2008 Trust-Based Flooding Attacks Prevention in Ad Hoc Networks 梁秋國; Liang, Chiu-Kuo
    2008 A Two-Dimensional Data Fusion Model for Intrusion Detection 游坤明; Yu, K.M.
    2008 A Two-level Hierarchical Scheduling Method for Independent Tasks in Grids 許慶賢; Hsu, Ching-Hsien
    2010 A Two-Level Scheduling Strategy for optimising communications of data parallel programs in clusters 許慶賢; Hsu, Ching-Hsien
    2010 Two-Sided Single-Detour Untangling for Bus Routing 顏金泰; YAN, JIN-TAI
    2010 A Two-tier Test Approach to Developing Location-aware Mobile Learning Systems for Natural Science Courses 曾秋蓉; Tseng, Judy C.R.
    2013 Ubiquitous Geography Learning Smartphone System for 1st Year Junior High Students in Taiwan 張文智; Chang, Wen-Chih
    2012 Ubiquitous Intelligence and Computing: building smart environment in real and cyber space 許慶賢; Hsu, Ching-Hsien
    2012 uFolio:A Conceptual Design Framework for a Learning Platform and assessment system 張文智; Chang, Wen-Chih
    2011 uFolio:A Conceptual Design Framework for a Learning Platform and Assessment System 張文智; Chang, Wen-Chih
    2007 Ultrametric Tree Construction and Evaluation Platform (UTCE) in Grid Computing System 游坤明; Yu, K.M.
    2005 UniBio: A Highly Integrated Genomic and Proteomic Database 劉志俊; Liu, Chih-Chin
    2003 A Unified Scheme for Lightweight Causal Message Ordering 嚴力行
    2005 Unified Schemes for OVSF Code Placement and Replacement 俞征武; Yu, Chang Wu
    2008 Universal serially concatenated trellis coded modulation for space-time channels 翁文彥; Weng, Wen-Yen
    2012 Use of Artificial Immune Algorithm with Memory and Suppressor Cells to Optimize the Placement of RFID Portal Reader Antennas 李之中; Lee, Chi-Chung
    2011 Use of Artificial Immune Systems to Optimize the Reader Antenna Placement at an RFID Portal 李之中; Lee, Chi-Chung
    2010 User-Level Packet Filter for the IP Address Abuse/Counterfeit Problem
    in Wireless/Wired Networks
    劉懷仁; Liu, Huai-Jen
    2010 Using Adventure Game to Facilitate Learning Assessment Process 張文智; Chang, Wen-Chih
    2011 Using CUDA implemented volume rendering applying to medical images 林志陽; Lin, Chih-Yang
    2012 Using DRSA and Fuzzy Measure to Enlighten Policy Making for Enhancing National Competitiveness by WCY 2011 柯宇謙; ko, yu-chien

    Showing items 1151-1200 of 2148. (43 Page(s) Totally)
    << < 19 20 21 22 23 24 25 26 27 28 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback