2012 |
Oriented animal-mask decoration pattern generation |
MING-TE CHI、Liou, Wei Cheng、MING-TE CHI |
conference |
web page(970) |
2012 |
Clip-on gadgets: Expandable tactile controls for multi-touch devices |
Chang, T.-W.、Yu, Neng-Hao、Tsai, S.-S.、Chen, M.Y.、Hung, Y.-P.、余能豪 |
conference |
web page(912) |
2012 |
Identity-based password-authenticated key exchange for client/server model |
Yi, X.、RAY-LIN TSO、Okamoto, E.、RAY-LIN TSO |
conference |
web page(1230) |
2012 |
Urban multi-layered chord for P2P over vehicular network |
HUNG-CHIN JANG、Hsu, T.-Y.、HUNG-CHIN JANG |
conference |
web page(1067) |
2012 |
A hybrid architecture of routing protocols for VANET with cross-layer design |
HUNG-CHIN JANG、Yang, C.-K.、HUNG-CHIN JANG |
conference |
web page(1134) |
2013 |
Digital latte art |
Hu, Chen-chih、MING-TE CHI、MING-TE CHI |
conference |
web page(959) |
2013 |
An empirical study of concept drift detection for the prediction of TAIEX futures |
Lin, Hong-che、KUO-WEI HSU、KUO-WEI HSU |
conference |
web page(767) |
2013 |
Junction-based traffic-aware routing scheme for vehicular Ad Hoc networks |
Lo, C.-C.、Kuo, Yauh-wang、郭耀煌 |
conference |
web page(1257) |
2013 |
Anonymization for multiple released social network graphs |
Wang, C.-J.L.、Wang, E.T.、Chen, Arbee L P |
conference |
web page(1002) |
2013 |
Geographical forwarding scheme with Location Verification for Vehicular ad hoc networks |
Lo, C.-C.、Chen, S.-C.、Kuo, Y.-H. |
conference |
web page(1058) |
2013 |
Modeling social capital in bureaucratic hierarchy for analyzing promotion decisions |
JYI-SHANE LIU、Lin, Z.-Y.、Ning, K.-C.、JYI-SHANE LIU |
conference |
web page(819) |
2013 |
Deployment scheduling of contingency cellular network for disaster relief operations |
Huang, J.-S.、Wang, Y.-S.、Lien, Yao-nan、YAO-NAN LIEN |
conference |
web page(939) |
2013 |
Music recommendation based on multiple contextual similarity information |
Chen, C.-M.、MING-FENG TSAI、Liu, J.-Y.、RUA-HUAN TSAIH、MING-FENG TSAI |
conference |
web page(1207) |
2012 |
Security analysis concerning the random numbers of threshold ring signatures |
RAY-LIN TSO、RAY-LIN TSO、RAY-LIN TSO |
conference |
web page(850) |
2012 |
Towards law-aware semantic cloud policies with exceptions for data integration and protection |
YUH-JONG HU、Wu, Win-Nan、Cheng, Di-Rong、YUH-JONG HU |
conference |
web page(924) |
2012 |
Placement of control network for mobile agents over opportunistic networks |
Lien, Yao-Nan、Lin, Yi-Shiuan、YAO-NAN LIEN、林怡萱 |
conference |
web page(815) |
2012 |
Influence propagation and maximization for heterogeneous social networks |
Li, C.-T.、Lin, S.-D.、MAN-KWAN SHAN、MAN-KWAN SHAN |
conference |
web page(935) |
2012 |
Regional subgraph discovery in social networks |
Li, C.-T.、MAN-KWAN SHAN、Lin, Shou-De、MAN-KWAN SHAN、林守德 |
conference |
web page(851) |
2012 |
Dynamic selection of activation targets to boost the influence spread in social networks |
Li, C.-T.、MAN-KWAN SHAN、Lin, Shou-De、MAN-KWAN SHAN、林守德 |
conference |
web page(1116) |
2012 |
Finding influential seed successors in social networks |
Li, C.-T.、Hsieh, Hsieh H.-P.、Lin, S.-D.、MAN-KWAN SHAN、MAN-KWAN SHAN |
conference |
web page(996) |
2012 |
Design of contingency cellular network |
Huang, J.-S.、Lien, Yao-Nan、Hu, C.-L.、YAO-NAN LIEN |
conference |
web page(953) |
2012 |
On the improvement of fermat factorization |
RAY-LIN TSO、RAY-LIN TSO、Sun, H.-M.、RAY-LIN TSO |
conference |
web page(918) |
2012 |
Cryptanalysis of exhaustive search on attacking RSA |
RAY-LIN TSO、RAY-LIN TSO、Sun, H.-M.、RAY-LIN TSO |
conference |
web page(1174) |
2012 |
Business opportunity: The weak-tie roaming among tribes |
Hong, C.-F.、Lin, Mu-Hua、Yang, Hsiao-Fang |
conference |
web page(1154) |
2012 |
Affinity Propagation with file similarity based clustering for P2P file sharing in VANET |
HUNG-CHIN JANG、Tzeng, Li-Ji、HUNG-CHIN JANG、曾立吉 |
conference |
web page(1386) |