Selected(0)Clear
Items/Page: Sort: |
| English Textbook Selection in Taiwan: Voices of Two Book Sales Representatives Journal article Education Research International, 2022,Volume: 2022 Authors: Barry Lee Reynolds ; Xuan Van Ha; Melissa H. Yu
 Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/06/07 |
| The Dome of Thought: Phrenology and the Nineteenth-Century Popular Imagination Book Manchester:Manchester University Press, 2022 Authors: HUGHES, William
Adobe PDF | Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/31 Phrenology Victorian Medicine Scottish History Pseudoscience English History Newspapers |
| On Consortium Blockchain Consistency: A Queueing Network Model Approach Journal article IEEE Transactions on Parallel and Distributed Systems, 2021,Volume: 32,Issue: 6,Page: 1369-1382 Authors: Meng,Tianhui; Zhao,Yubin; Wolter,Katinka; Xu,Cheng Zhong
 Favorite | | TC[WOS]:10 TC[Scopus]:13 | Submit date:2021/03/09 Analyzing Framework Consistency Consortium Blockchain Delay Attack Permissoned Blockchain Queueing Networks |
| Stigma, discrimination and hate crimes in Chinese-speaking world amid Covid-19 pandemic Journal article Asian Journal of Criminology, 2021 Authors: Xu JH(徐建華)
Adobe PDF | Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/31 |
| An N × N Multiplier-Based Multi-Bit Strong PUF Using Path Delay Extraction Conference paper IEEE International Symposium on Circutis and Systems (2020) Authors: Xu, C.; Zhang, J.; Law, M. K. ; Zhao, X.; Mak, P. I.; Martins, R. P.
 Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/01/25 Multiplier Multi-Bit Physical Unclonable Function Path Delay Extraction |
| Characteristics of cybercrimes: evidence from Chinese judgment documents Journal article Police Practice and Research, 2018,Volume: 19,Issue: 6,Page: 582-595 Authors: Tianji Cai ; Li Du ; Yanyu Xin; Lennon Y.C. Chang
Adobe PDF | Favorite | | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/06/25 Cybercrimes Sentencing Documents Underground Economy Value Chain |
| Life history theory Book chapter 出自: The SAGE Encyclopedia of Lifespan Human Development:SAGE Publications, 2018, 2018 Authors: Chang, L. ; Lu, H. J.
Adobe PDF | Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/08/07 |
| Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article Security and Communication Networks, 2015,Volume: 9,Issue: 1,Page: 43-53 Authors: Yushu Zhang; Di Xiao; Kwok-Wo Wong; Jiantao Zhou ; Sen Bai; Moting Su
Adobe PDF | Favorite | | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22 Arithmetic Coding Chaotic Map Joint Compression And Encryption Perturbation |
| Conference proceedings of The Twenty-third ICMI Study: Primary Mathematics Study on Whole Numbers Conference proceedings Macau SAR, 2015-6-3-10 Authors: Sun XH(孫旭花) ; Berinderjeet Kaur; Jarmila Novotna
Adobe PDF | Favorite | | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/27 Whole Number Arithmatic |
| Cyber security and privacy issues in smart grids Journal article IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981 Authors: Liu J.; Xiao Y.; Li S.; Liang W.; Chen C.L.P.
View | Adobe PDF | Favorite | | TC[WOS]:309 TC[Scopus]:376 | Submit date:2018/10/30 Accountability Ami Privacy Scada Security Smart Grid |