-
1Dissertation/ Thesis
-
2Dissertation/ Thesis
-
3Dissertation/ Thesis
-
4Dissertation/ Thesis
-
5Dissertation/ Thesis
-
6Dissertation/ Thesis
-
7Dissertation/ Thesis
-
8Dissertation/ Thesis
-
9Dissertation/ Thesis
-
10Conference
وصف الملف: 66474 bytes; application/pdf
Relation: TANET 2006 台灣網際網路研討會論文集; 數位典藏、內容與圖書館數位化; http://nccur.lib.nccu.edu.tw//handle/140.119/115223; http://nccur.lib.nccu.edu.tw/bitstream/140.119/115223/1/682.pdf
-
11Academic Journal
Time: 16
وصف الملف: application/
Relation: 產業論壇,Vol. 8, No. 1, 123-144 (NSC93-2218-E- 164-006); http://ir.hust.edu.tw/dspace/handle/310993100/1107
-
12
المؤلفون: 林坤億
مصطلحات موضوعية: 微透鏡光罩, 微針陣列, 接觸式曝光, 光纖雷射, SU-8, micro-lens mask, micro- needle array, contact exposure, fiber laser
Relation: http://ir.lib.ntust.edu.tw/handle/987654321/38042; http://ir.lib.ntust.edu.tw/bitstream/987654321/38042/-1/index.html
-
13
المؤلفون: 林坤億, Lin, Kun-Yi
المساهمون: 淡江大學資訊工程學系博士班, 葛煥昭, Keh, Huan-Chao
مصطلحات موضوعية: 代理人系統, 時間戳記, SHA-256, Agent system, Time Stamp
Relation: [1] Schneiderman, B., Direct Manipulation: A Step Beyond Programming Languages, IEEE Computer, Vol. 16, No. 8, pp. 57-69, 1983. [2] Kay, A., User Interface: A Personal View. In: The Art of Human- Computer Interface Design, B. Laurel (ed), Addison-Wesley, 1990. [3] P. Maes., Agents that Reduce Work and Information Overload, Communications of the ACM, Vol. 37, No.7,pp. 31-40, 146, ACM Press, July 1994. [4] Finin T, Weber J, Wiederhold G, Genesereth M, Fritzon R, McKay D, McGuire J, Pelavin R, Shapiro S and Beck C., Specification of the KQML Agent- Communication Language, Draft, February 1994. [5] Appleby S and Steward S., Mobile Software Agents for Control in Telecommunications Networks, BT Technol J, Vol. 12, No. 2, pp. 104-113, April 1994. [6] Thomas, C.G., BASAR: a framework for integrating agents in the World Wide Web, Computer, Vol. 28, No. 5, pp. 84 –86, May 1995. [7] Watt S N K, Zdrahal Z and Brayshaw M., Multiple Agent System for Configuration Design, in Hallam J(Ed):”Frontiers in artificial intelligence and applications”, IOS Press, pp. 217-228, 1994 [8] Available at http://www.cs.cmu.edu/afs/cs.cmu.edu/project/theo-5/www/pleiades.html [9] Wayner P., Agents Unleashed: A Public Domain Look at Agent Technology, Boston, MA, AP Professional, 1995. [10] Huhns, M.N., Agent teams: building and implementing software, IEEE Internet Computing, Vol. 4, No. 1, pp. 93 –95, Jan.-Feb. 2000. [11] R.L. Rivest., Request for Comments 1321: The MD5 Message Digest Algorithm, Internet Engineering Task Force, 1992. (Available at http://www.ietf.org/rfc/rfc1321.txt) [12] Available at http://en.wikipedia.org/wiki/MD5 [13] Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu., Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive Report 2004/199. (Available at http://eprint.iacr.org/2004/199.pdf) [14] Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin., Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-Crypto 05, LNCS 3621: 1-16, 2005. [15] NIST, NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1, 2004. (Available at http://csrc.nist.gov/hash_standards_comments.pdf) [16] Available at http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf [17] Available at http://en.wikipedia.org/wiki/SHA-2 [18] Xiaoyun Wang, Yiqun Yin, Hongbo Yu., Finding Collisions in the Full SHA-1, Advances in Cryptology-Crypto 05, LNCS 3621: 17-36, 2005. [19] BIBLINK project Web (Available at http://hosted.ukoln.ac.uk/biblink/) [20] Available at http://www.ietf.org/proceedings/46/46th-99nov-ietf-129.html [21] Available at http://www.pgpi.org/doc/pgpintro/; U0002-0911201018520900; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/54178; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/54178/-1/index.html
-
14
المساهمون: 休閒事業管理系
وصف الملف: 110 bytes; text/html
Relation: 59頁。指導教授:吳素玲; http://120.106.11.159/ir/handle/310997200/15614; http://120.106.11.159/ir/bitstream/310997200/15614/1/index.html
-
15
المساهمون: 休閒事業管理系所