All Of Publications(Limit:College of Informatics、Proceedings、2010-2019)

Showing 101-125 of 413
日期 題名 Author Type Full Text(downloads)
2013 Anonymization for multiple released social network graphs Wang, C.-J.L.、Wang, E.T.、Chen, Arbee L P conference 說明頁(953)
2013 Geographical forwarding scheme with Location Verification for Vehicular ad hoc networks Lo, C.-C.、Chen, S.-C.、Kuo, Y.-H. conference 說明頁(992)
2013 Modeling social capital in bureaucratic hierarchy for analyzing promotion decisions Liu, Jyi-shane、Lin, Z.-Y.、Ning, K.-C.、劉吉軒 conference 說明頁(758)
2013 Deployment scheduling of contingency cellular network for disaster relief operations Huang, J.-S.、Wang, Y.-S.、Lien, Yao-nan、連耀南 conference 說明頁(895)
2013 Music recommendation based on multiple contextual similarity information Chen, C.-M.、Tsai, Ming-feng、Liu, J.-Y.、Yang, Y.-H.、蔡銘峰 conference 說明頁(1131)
2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin、Tso, Ray-Lin、左瑞麟 conference 說明頁(775)
2012 Towards law-aware semantic cloud policies with exceptions for data integration and protection Hu, Yuh-Jong、Wu, Win-Nan、Cheng, Di-Rong、胡毓忠 conference 說明頁(878)
2012 Placement of control network for mobile agents over opportunistic networks Lien, Yao-Nan、Lin, Yi-Shiuan、連耀南、林怡萱 conference 說明頁(766)
2012 Influence propagation and maximization for heterogeneous social networks Li, C.-T.、Lin, S.-D.、Shan, Man-Kwan、沈錳坤 conference 說明頁(884)
2012 Regional subgraph discovery in social networks Li, C.-T.、Shan, Man-Kwan、Lin, Shou-De、沈錳坤、林守德 conference 說明頁(793)
2012 Dynamic selection of activation targets to boost the influence spread in social networks Li, C.-T.、Shan, Man-Kwan、Lin, Shou-De、沈錳坤、林守德 conference 說明頁(1060)
2012 Finding influential seed successors in social networks Li, C.-T.、Hsieh, Hsieh H.-P.、Lin, S.-D.、Shan, Man-Kwan、沈錳坤 conference 說明頁(916)
2012 Design of contingency cellular network Huang, J.-S.、Lien, Yao-Nan、Hu, C.-L.、連耀南 conference 說明頁(909)
2012 On the improvement of fermat factorization Wu, M.-E.、Tso, R.、Sun, H.-M.、左瑞麟 conference 說明頁(866)
2012 Cryptanalysis of exhaustive search on attacking RSA Wu, M.-E.、Tso, R.、Sun, H.-M.、左瑞麟 conference 說明頁(1107)
2012 Business opportunity: The weak-tie roaming among tribes Hong, C.-F.、Lin, Mu-Hua、Yang, Hsiao-Fang conference 說明頁(1081)
2012 Affinity Propagation with file similarity based clustering for P2P file sharing in VANET Jang, Hung-Chin、Tzeng, Li-Ji、張宏慶、曾立吉 conference 說明頁(1349)
2010 Design and analysis of "flexible" k-out-of-n signatures Tso, Ray-Lin、Yi, X.、Ito, T.、Okamoto, T.、Okamoto, E.、左瑞麟 conference 說明頁(939)
2010 Performance evaluation of telecommunication industry between China and Taiwan Chang, Y.-L.、Shih, T.-T.、Wang, Chih Hong conference 說明頁(688)
2010-10 Certificateless proxy signature and its extension to blind signature Tso, R.、Yi, X.、左瑞麟 conference 說明頁(963)
2010 A multi-hop walkie-talkie-like emergency communication system for catastrophic natural disasters Lien, Yao-Nan、Chi, L.-C.、Huang, C.-C.、連耀南 conference 說明頁(875)
2010 Automatic generation of caricatures with multiple expressions using transformative approach Liao, Wen-Hung、Lai, C.-A.、廖文宏 conference 說明頁(1182)
2010 A better strategy of discovering link-pattern based communities by classical clustering methods Lin, C.-Y.、Koh, J.-L.、Chen, Arbee L. P.、陳良弼 conference 說明頁(957)
2010 Continuous probabilistic skyline queries over uncertain data streams Su, H.Z.、Wang, E.T.、Chen, Arbee L. P.、陳良弼 conference 說明頁(919)
2010 The effect of school facility allocation to city center development base on dynamic spatial structure model Chyan, S.-H.、Liu, Hsiao-Lan、Lin, F.-T.、劉小蘭 conference 說明頁(966)