2004-11 |
眼鏡偵測與人臉特徵定位 |
鄒博岱、WEN-HUNG LIAO |
conference |
|
2004-06 |
Embedding Information within Dynamic Visual Patterns |
WEN-HUNG LIAO、Chi-Chi Chang |
conference |
web page(66) |
2003 |
Homomorphic Processing Techniques for Near-Infrared Image |
WEN-HUNG LIAO、D. Li |
conference |
web page(70) |
2003 |
Objective Functions for Hybrid Restoration Filters |
WEN-HUNG LIAO |
conference |
|
2002-01 |
健保IC 卡隱私權問題與解決方案之探討 |
WEN-HUNG LIAO、孫新民 |
conference |
|
2001 |
Building a Personalized Information Broadcasting System |
WEN-HUNG LIAO、邱彥中、劉宏浩 |
conference |
|
2006-01 |
An Aspect-Oriented Approach to Declarative Access Control for Web Applications |
KUNG CHEN、林經緯 |
conference |
|
2005-11 |
A Flexible Function Menu Generator for Supporting Access Control in Web Applications |
KUNG CHEN、張志祥 |
conference |
|
2004-12 |
A Two-Stage Approach to Modular Access Control for Java-Based Web Applications |
KUNG CHEN |
conference |
web page(998) |
2004-01 |
國內商業網站對會員電子郵件隱私保護的實驗與觀察 |
KUNG CHEN、陳忠信 |
conference |
|
2004-01 |
Toward Configurable Access Control for Healthcare Information Systems |
KUNG CHEN、Da-Wei Wang |
conference |
|
2004-09 |
應用面向技術設計嵌入式即時作業系統之資源存取控制 |
蘇惠明、陳敬、KUNG CHEN |
conference |
|
2004-06 |
運用方面導向技術處理電子商務應用中的業務規則 |
KUNG CHEN、黃植懋 |
conference |
|
2005 |
Automatic Musical Form Analysis |
P.H. Weng、LIANG-PEI CHEN |
conference |
|
2004 |
A New Approach for Rating-Based Collaborative Music Recommendation |
C.R. Lin、N.H. Liu、Y.H. Wu、LIANG-PEI CHEN |
conference |
|
2004 |
Hiding Sensitive Patterns in Association Rules Mining |
G. Lee、C.Y. Chang、LIANG-PEI CHEN |
conference |
|
2004 |
Music Segmentation by Rhythmic Features and Melodic Shapes |
H.C. Chen、C.H. Lin、LIANG-PEI CHEN |
conference |
|
2001-06 |
An Agent-Based Secure E-Commerce Environment with Distributed Authentication and Authorization Services |
YUH-JONG HU |
conference |
|
2000-01 |
Agent-Based Attack and Defense for an Intranet Environment |
YUH-JONG HU |
conference |
|
2002 |
個人化的美術影像風格查詢系統 |
MAN-KWAN SHAN、劉勁男 |
conference |
pdf(1085) |
1998-01 |
Autonomous Security Agents: Negotiating Compatible Crypto Protocols on Behalf of the End-User |
YUH-JONG HU |
conference |
|
1997-12 |
My Secure Java Agents Use Secure Agent Communication Protocols to Autonomously Proceed Secure Conversation |
YUH-JONG HU |
conference |
|
1996-02 |
Interaction Protocols for Intelligent Agents in Distributed Services Environment |
YUH-JONG HU |
conference |
|
1996-01 |
Cooperation Negotiation and Conflict Resolution Protocols for Automatic Services and Resources Allocation |
YUH-JONG HU |
conference |
|
1995-11 |
Intelligent Autonomous Resources Allocation in Distributed Open Multi agent Systems |
YUH-JONG HU |
conference |
|