Browsing by Author 資科系


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 660 to 679 of 936 < previous   next >
DateTitleAuthor(s)
28-Aug-2014Schema Integration and Query Processing for Multiple Object Databases陳良弼; Chen,Arbee L.P.;Koh,Jia-Ling;Kuo,Tony C.T.;Liu,Chih-Chin
28-Aug-2014Searching a minimal semantically-equivalent subset of a set of partial values陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D.
27-Oct-2020Secure Certificateless Signature Scheme Supporting Batch Verification曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia
27-Oct-2020Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
2-Sep-2020Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
21-Aug-2014A Secure Software Agent Framework for Robust Agent Management Services胡毓忠; Hu,Yuh-Jong
15-Jun-2015Security analysis and improvement of femtocell access controlChen, C.-M.;Wu, T.-Y.;Tso, Ray-Lin;Wu, M.-E.; 左瑞麟
20-Oct-2014Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol左瑞麟; Tso, Raylin
17-Apr-2015Security analysis concerning the random numbers of threshold ring signaturesHuang, Kaibin;Tso, Ray-Lin; 左瑞麟
31-Aug-2017Security analysis of a NTRU-based mutual authentication scheme左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio
8-Aug-2017Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
20-Oct-2014Security Analysis of Choi et al.`s Certificateless Short Signature Scheme左瑞麟; Tso, Raylin
16-Jun-2023Semantic analyses using NLP for Twitter posts in different languages — An example of sentiments on global warming issues謝佩璇; Hsieh, Pei-Hsuan; Lin, Yi-Chieh;Wu, Yi-Chieh
16-Jun-2015Semantic clustering of morphologically related Chinese wordsLee, C.-L.;Chang, Y.-N.;Liu, Chao Lin;Lee, C.-Y.;Hsu, J.Y.-J.; 劉昭麟
15-Jun-2015Semantic frame-based natural language understanding for intelligent topic detection agentChang, Y.-C.;Hsieh, Y.-L.;Chen, Cen Chieh;Hsu, W.-L.
19-Nov-2014Semantic legal policies for data exchange and protection across super-peer domains in the cloud胡毓忠; 黃雅玲; 鄭國平; 吳穩男
22-Jun-2015Semantics-enabled policies for information sharing and protection in the cloudHu, Yuh-Jong;Wu, Win Nan;Yang, Jiun Jan; 胡毓忠;楊竣展
21-Aug-2014Semantics-enabled Policies for Super-Peer Data Integration and Protection胡毓忠; Hu,Yuh-Jong;Wu,Win-Nan;Yang,Jiun-Jan
16-Jun-2023Semi-automated Quadrotor Teleoperation by Hierarchical Gesture Control and Visual Perception劉吉軒; Liu, Jyi-Shane; Chiu, Ting-Yi;Hsu, Chen-Tao;Chuang, Jen-Hui
17-Jun-2015SemPIF: A Semantic Meta-policy Interchange Format for Multiple Web PoliciesHu, Yuh-jong, Harold Boley; 胡毓忠