All Of Publications(Limit:College of Informatics、2010-2019)

Showing 326-350 of 1175
Date Title Author Type Full Text(downloads)
2012 Oriented animal-mask decoration pattern generation MING-TE CHI、Liou, Wei Cheng、MING-TE CHI conference web page(970)
2012 Clip-on gadgets: Expandable tactile controls for multi-touch devices Chang, T.-W.、Yu, Neng-Hao、Tsai, S.-S.、Chen, M.Y.、Hung, Y.-P.、余能豪 conference web page(912)
2012 Identity-based password-authenticated key exchange for client/server model Yi, X.、RAY-LIN TSO、Okamoto, E.、RAY-LIN TSO conference web page(1230)
2012 Urban multi-layered chord for P2P over vehicular network HUNG-CHIN JANG、Hsu, T.-Y.、HUNG-CHIN JANG conference web page(1067)
2012 A hybrid architecture of routing protocols for VANET with cross-layer design HUNG-CHIN JANG、Yang, C.-K.、HUNG-CHIN JANG conference web page(1134)
2013 Digital latte art Hu, Chen-chih、MING-TE CHIMING-TE CHI conference web page(959)
2013 An empirical study of concept drift detection for the prediction of TAIEX futures Lin, Hong-che、KUO-WEI HSUKUO-WEI HSU conference web page(767)
2013 Junction-based traffic-aware routing scheme for vehicular Ad Hoc networks Lo, C.-C.、Kuo, Yauh-wang、郭耀煌 conference web page(1257)
2013 Anonymization for multiple released social network graphs Wang, C.-J.L.、Wang, E.T.、Chen, Arbee L P conference web page(1002)
2013 Geographical forwarding scheme with Location Verification for Vehicular ad hoc networks Lo, C.-C.、Chen, S.-C.、Kuo, Y.-H. conference web page(1058)
2013 Modeling social capital in bureaucratic hierarchy for analyzing promotion decisions JYI-SHANE LIU、Lin, Z.-Y.、Ning, K.-C.、JYI-SHANE LIU conference web page(819)
2013 Deployment scheduling of contingency cellular network for disaster relief operations Huang, J.-S.、Wang, Y.-S.、Lien, Yao-nan、YAO-NAN LIEN conference web page(939)
2013 Music recommendation based on multiple contextual similarity information Chen, C.-M.、MING-FENG TSAI、Liu, J.-Y.、RUA-HUAN TSAIHMING-FENG TSAI conference web page(1207)
2012 Security analysis concerning the random numbers of threshold ring signatures RAY-LIN TSORAY-LIN TSORAY-LIN TSO conference web page(850)
2012 Towards law-aware semantic cloud policies with exceptions for data integration and protection YUH-JONG HU、Wu, Win-Nan、Cheng, Di-Rong、YUH-JONG HU conference web page(924)
2012 Placement of control network for mobile agents over opportunistic networks Lien, Yao-Nan、Lin, Yi-Shiuan、YAO-NAN LIEN、林怡萱 conference web page(815)
2012 Influence propagation and maximization for heterogeneous social networks Li, C.-T.、Lin, S.-D.、MAN-KWAN SHANMAN-KWAN SHAN conference web page(935)
2012 Regional subgraph discovery in social networks Li, C.-T.、MAN-KWAN SHAN、Lin, Shou-De、MAN-KWAN SHAN、林守德 conference web page(851)
2012 Dynamic selection of activation targets to boost the influence spread in social networks Li, C.-T.、MAN-KWAN SHAN、Lin, Shou-De、MAN-KWAN SHAN、林守德 conference web page(1116)
2012 Finding influential seed successors in social networks Li, C.-T.、Hsieh, Hsieh H.-P.、Lin, S.-D.、MAN-KWAN SHANMAN-KWAN SHAN conference web page(996)
2012 Design of contingency cellular network Huang, J.-S.、Lien, Yao-Nan、Hu, C.-L.、YAO-NAN LIEN conference web page(953)
2012 On the improvement of fermat factorization RAY-LIN TSORAY-LIN TSO、Sun, H.-M.、RAY-LIN TSO conference web page(918)
2012 Cryptanalysis of exhaustive search on attacking RSA RAY-LIN TSORAY-LIN TSO、Sun, H.-M.、RAY-LIN TSO conference web page(1174)
2012 Business opportunity: The weak-tie roaming among tribes Hong, C.-F.、Lin, Mu-Hua、Yang, Hsiao-Fang conference web page(1154)
2012 Affinity Propagation with file similarity based clustering for P2P file sharing in VANET HUNG-CHIN JANG、Tzeng, Li-Ji、HUNG-CHIN JANG、曾立吉 conference web page(1386)