2017-03 |
Towards a platform for studying and analyzing Chinese poetry |
CHAO-LIN LIU、Liu, Chao-Lin |
conference |
|
2018-07 |
Evaluation of Student’s 3D Modeling Capability Based on Model Completeness and Usage Pattern in K-12 Classrooms |
YI-CHIEH WU、WEN-HUNG LIAO、劉貞佑、TSAI-YEN LI、MING-TE CHI |
conference |
pdf(272) |
2014-12 |
The Historical Study under the Context of Digital Humanities-verification and Interpretation of Free China |
江子揚、HUA-YUAN HSUEH、JYI-SHANE LIU、MING-FENG TSAI、黃文全、JYI-SHANE LIU |
conference |
pdf(292) |
2018-12 |
大數據分析技術與研究意涵 |
JYI-SHANE LIU、 黃三益、MING-TE CHI |
book/chapter |
web page(486) |
2016-11 |
How do software users read software installation agreements? An eye-tracking experiment. |
PEI-HSUAN HSIEH、Hsieh, P. H.、Hsu, P. I. |
article |
pdf(187) |
2015 |
Students` perspectives on e-portfolios` development and implementation: A case study in Taiwanese higher education. |
PEI-HSUAN HSIEH、Hsieh, P. H.、Lee, C. I.、Chen, W. F. |
article |
pdf(196) |
2018-11 |
Design and Evaluation of a Collaborative Learning System for 3D Model Sharing |
TSAI-YEN LI、TSAI-YEN LI、 Lin, I-Sheng |
book/chapter |
web page(457) |
2018-12 |
Big Data in Computational Social Science and Humanities - Understanding “The User-Generated”: The Construction of the “ABC Model” and the Imagination of “Digital Humanities” |
MING-TE CHI、MING-TE CHI、Liu, Hui-Wen、Lin, I-Ying、KUO-WEI HSU |
專書篇章 |
web page(412) |
2015-07 |
An investigation of leadership styles during adoption of E-government for an innovative city: Perspectives of taiwanese public servants |
PEI-HSUAN HSIEH、Hsieh, P. H.、Chen, Wen-Sung、Lo, Chi-Jui |
專書篇章 |
web page(393) |
2018-06 |
The importance of online transaction textual labels for making a purchasing decision – An experimental study of consumers` brain waves. |
PEI-HSUAN HSIEH、Hsieh, P. H. |
專書篇章 |
pdf(233) |
2013-06 |
Thresholds of knowledge development in complex problem solving: a multiple-case study of advanced learners’cognitive processes. |
YUEH-HUI CHIANG、Chiang, Yueh-Hui Vanessa、Bogard, Treavor、Liu, Min |
article |
pdf(229) |
2018-06 |
Dialogues Between Computer Science and Qualitative Research: Analysis of Visualized Pedestrian Speech Acts in Facebook Check-In Practices |
TSAI-YEN LI、HSIAOMEI WU |
article |
pdf(272) |
2019 |
A study on handover mechanism in 5G Non-standalone network |
張凱勝、Chang, Kai-Sheng |
thesis |
pdf(0) |
2018 |
A Lattice-Based Group Authentication Scheme |
YI-FAN TSENG、Tseng, Yi-Fan、Huang, Jheng-Jia、Yang, Qi-Liang、Fan, Chun-I |
article |
pdf(288) |
2018-08 |
An authenticated re‐encryption scheme for secure file transfer in named data networks |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I、Cho, Yan-Fu |
article |
pdf(263) |
2018 |
An Efficient Algorithm for Shortest Vector Problem |
YI-FAN TSENG、Tseng, Yi-Fan、Chuang, Yu-Lun、Fan, Chun-I |
article |
pdf(371) |
2015 |
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(236) |
2016 |
Enabled/Disabled Predicate Encryption in Clouds |
YI-FAN TSENG、Tseng, Yi-Fan、Huang, Shi-Yuan、Fan, Chun-I |
article |
pdf(240) |
2017-07 |
Multireceiver Predicate Encryption for Online Social Networks |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I、Huang, Jheng-Jia、Chen, Shih-Fen、Kikuchi, Hiroaki |
article |
pdf(203) |
2018-07 |
Probably Secure Efficient Anonymous Credential Scheme |
YI-FAN TSENG、Tseng, Yi-Fan、Wu, Chien-Nan、Fan, Chun-I、Huang, Jheng-Jia、Kikuchi, Hiroaki |
article |
web page(288) |
2018-11 |
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(217) |
2014 |
Strongly Secure Certificateless Signature Scheme Supporting Batch Verification |
YI-FAN TSENG、Tseng, Yi-Fan、Fan, Chun-I、Ho, Pei-Hsiu |
article |
pdf(189) |
2018-07 |
An fMRI study of information accuracy’s impact on emotion and trust: A case of dementia knowledge content |
PEI-HSUAN HSIEH、Hsieh, P. H.、Lee, T. K. |
article |
web page(290) |
2016-11 |
The mediating role of sense of virtual community |
PEI-HSUAN HSIEH、Hsieh, P. H.、Chang, H. H.、Fu, C. S. |
article |
pdf(300) |
2018-04 |
A Lattice-Based Group Authentication Scheme |
YI-FAN TSENG、Tseng, Yi-Fan、Huang, Jheng-Jia、Yang, Qi-Liang、Fan, Chun-I |
conference |
pdf(252) |