Search alternatives:
chen » when (Expand Search)
checks » check (Expand Search)
checkeds » checked (Expand Search), checkers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checker » checked (Expand Search)
chen » when (Expand Search)
checks » check (Expand Search)
checkeds » checked (Expand Search), checkers (Expand Search)
attackers » attacker (Expand Search), attacks (Expand Search)
checker » checked (Expand Search)
-
321
Improving Disaster Response: Role of Knowledge Sharing
Published 2017Get full text
Get full text
Commentary -
322
-
323
-
324
-
325
Longing for (a Taiwanese) academy: practical theology as an essentially hospitable and balanced discipline
Published 2024Journal article -
326
An optimized Gaussian beam for multicell indoor optical wireless communications
Published 2015Get full text
Get full text
Journal Article -
327
Fostering public service motivation through workplace trust : evidence from public managers in Taiwan
Published 2014Get full text
Get full text
Journal Article -
328
-
329
An investigation on the role of W doping in BiVO 4 photoanodes used for solar water splitting
Published 2019Get full text
Get full text
Journal Article -
330
Can training enhance public employees’ public service motivation? A pretest–posttest design
Published 2021Get full text
Journal Article -
331
Adjoint-state traveltime tomography for azimuthally anisotropic media in spherical coordinates
Published 2023Get full text
Journal Article -
332
Deep Koopman operator-informed safety command governor for autonomous vehicles
Published 2024Get full text
Journal Article -
333
-
334
-
335
Effective control of polarity in Bi0.9La0.1FeO3 thin films by dopant-related internal bias
Published 2012Get full text
Get full text
Journal Article -
336
Secure code execution on cloud-based infrastructure with application containers
Published 2017“…It provides a place for students to check the correctness of their code online. It will definitely decreases the workload of professors and protect their PC from the untrusted code. …”
Get full text
Final Year Project (FYP) -
337
Web vulnerabilities and countermeasures
Published 2014“…The attacker site, which belongs to the attacker, will also be used to keep a log of the sensitive data the attacker has acquired. …”
Get full text
Final Year Project (FYP) -
338
-
339
-
340