Showing results 580 to 599 of 936
< previous
next >
Date | Title | Author(s) |
17-Jun-2015 | P-40: Color Bias Elimination Technique for Motion Image | Liao, Wen-hung;Chang, Kai-Chieh;Lai, Yueh-Yi; 廖文宏 |
28-Sep-2018 | Parallel algorithms for connected domination problem on interval and circular-arc graphs. | Hsu, F.R.; 沈錳坤; Shan, M.K. |
28-Aug-2014 | A parallel execution method for minimizing distributed query response time | 陳良弼; Wang, C.;Shyu, S.-C;Chen,Arbee L.P. |
21-Aug-2014 | Partial Natural Outerjoin - An Operation for Interoperability in a Multidatabase Environment | 陳良弼; TSAI,PAURAY S. M.;CHEN,ARBEE L. P. |
9-Dec-2021 | Partially Blind ECDSA Scheme and Its Application to Bitcoin | 左瑞麟; Tso, Raylin; Huang, Hongxun; Liu, Zi-Yuan |
28-Aug-2014 | Partition strategy for distributed query processing in fast local networks | 陳良弼; Yu,C.T.;Keh-Chang Guh;Brill, D;Chen,Arbee L. P. |
7-Aug-2014 | A Pattern-based Tool for Creating Virtual Cinematography in Interactive Storytelling | 李蔡彥; Lai,Pei-Chun;Wu,Hui-Yin;Cunka Sanokho;Marc Christie;Li,Tsai-Yen |
8-Apr-2015 | Pedestrian detection using covariance descriptor and on-line learning | Liao, Wen-Hung;Huang, Ling-Wei; 廖文宏 |
29-Jun-2015 | PeerIIR: Peer-to-Peer interactive internet radio system | Tsai, Tzu-Chieh;Hsieh, Tong Y.;Lo, Wen Ching; 蔡子傑;謝東諺;羅文卿 |
17-Jun-2015 | Performance evaluation of a hierarchical hybrid adaptive routing algorithm for large scale computer communication networks | Lien, Yao-nan;Amer, Fathy;Ghieth, Ahmed; 連耀南 |
17-Apr-2015 | Performance evaluation of telecommunication industry between China and Taiwan | Chang, Y.-L.;Shih, T.-T.;Wang, Chih Hong |
4-Jun-2021 | Personal Knowledge Base Construction from Text-based Lifelogs | 黃瀚萱; Huang, Hen-Hsen; Yen, An-Zi; Chen, Hsin-Hsi |
27-May-2010 | Phonological and logographic influences on errors in written Chinese words | 劉昭麟; Liu, Chao-Lin; Tien, Kan-Wen; Lai, Min-Hua; Chuang, Yi-Hsuan; Wu, Shih-Hung |
22-Jun-2015 | Physically-based virtual glove puppet | Huang, Ssu Shin;Chi, Ming-Te;Li, Tsai-Yen; 黃嗣心;紀明德;李蔡彥 |
16-Jun-2015 | Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID | Chen, C.M.;Pan, J.S.;Tso, Ray-Lin;Huang, Szu Wei;Wu, M.E.; 左瑞麟 |
15-Jan-2016 | PKE-AET: Public Key Encryption with Authorized Equality Test | HUANG, KAIBIN;TSO, RAYLIN;CHEN, YU-CHI;RAHMAN, SK MD MIZANUR;ALMOGREN, AHMAD;ALAMRI, ATIF; 左瑞麟 |
17-Apr-2015 | Placement of control network for mobile agents over opportunistic networks | Lien, Yao-Nan;Lin, Yi-Shiuan; 連耀南;林怡萱 |
11-Apr-2016 | Popularity Prediction of Social Multimedia Based on Concept Drift | Jheng, S. H.;Li, C. T.;Shan, M. K.; 沈錳坤 |
21-May-2015 | Popularity spray and utility-based forwarding scheme with message priority scheduling in delay tolerant networks | Tsai, Tzu-Chieh; 蔡子傑; Chen, Ying Ming; 陳英明 |
24-Aug-2015 | Post-Modern Portfolio Theory for Information Retrieval | Tsai, Ming-Feng;Wang, Chuan-Ju; 蔡銘峰 |