2013 |
Anonymization for multiple released social network graphs |
Wang, C.-J.L.、Wang, E.T.、Chen, Arbee L P |
conference |
說明頁(953) |
2013 |
Geographical forwarding scheme with Location Verification for Vehicular ad hoc networks |
Lo, C.-C.、Chen, S.-C.、Kuo, Y.-H. |
conference |
說明頁(992) |
2013 |
Modeling social capital in bureaucratic hierarchy for analyzing promotion decisions |
Liu, Jyi-shane、Lin, Z.-Y.、Ning, K.-C.、劉吉軒 |
conference |
說明頁(758) |
2013 |
Deployment scheduling of contingency cellular network for disaster relief operations |
Huang, J.-S.、Wang, Y.-S.、Lien, Yao-nan、連耀南 |
conference |
說明頁(895) |
2013 |
Music recommendation based on multiple contextual similarity information |
Chen, C.-M.、Tsai, Ming-feng、Liu, J.-Y.、Yang, Y.-H.、蔡銘峰 |
conference |
說明頁(1131) |
2012 |
Security analysis concerning the random numbers of threshold ring signatures |
Huang, Kaibin、Tso, Ray-Lin、左瑞麟 |
conference |
說明頁(775) |
2012 |
Towards law-aware semantic cloud policies with exceptions for data integration and protection |
Hu, Yuh-Jong、Wu, Win-Nan、Cheng, Di-Rong、胡毓忠 |
conference |
說明頁(878) |
2012 |
Placement of control network for mobile agents over opportunistic networks |
Lien, Yao-Nan、Lin, Yi-Shiuan、連耀南、林怡萱 |
conference |
說明頁(766) |
2012 |
Influence propagation and maximization for heterogeneous social networks |
Li, C.-T.、Lin, S.-D.、Shan, Man-Kwan、沈錳坤 |
conference |
說明頁(884) |
2012 |
Regional subgraph discovery in social networks |
Li, C.-T.、Shan, Man-Kwan、Lin, Shou-De、沈錳坤、林守德 |
conference |
說明頁(793) |
2012 |
Dynamic selection of activation targets to boost the influence spread in social networks |
Li, C.-T.、Shan, Man-Kwan、Lin, Shou-De、沈錳坤、林守德 |
conference |
說明頁(1060) |
2012 |
Finding influential seed successors in social networks |
Li, C.-T.、Hsieh, Hsieh H.-P.、Lin, S.-D.、Shan, Man-Kwan、沈錳坤 |
conference |
說明頁(916) |
2012 |
Design of contingency cellular network |
Huang, J.-S.、Lien, Yao-Nan、Hu, C.-L.、連耀南 |
conference |
說明頁(909) |
2012 |
On the improvement of fermat factorization |
Wu, M.-E.、Tso, R.、Sun, H.-M.、左瑞麟 |
conference |
說明頁(866) |
2012 |
Cryptanalysis of exhaustive search on attacking RSA |
Wu, M.-E.、Tso, R.、Sun, H.-M.、左瑞麟 |
conference |
說明頁(1107) |
2012 |
Business opportunity: The weak-tie roaming among tribes |
Hong, C.-F.、Lin, Mu-Hua、Yang, Hsiao-Fang |
conference |
說明頁(1081) |
2012 |
Affinity Propagation with file similarity based clustering for P2P file sharing in VANET |
Jang, Hung-Chin、Tzeng, Li-Ji、張宏慶、曾立吉 |
conference |
說明頁(1349) |
2010 |
Design and analysis of "flexible" k-out-of-n signatures |
Tso, Ray-Lin、Yi, X.、Ito, T.、Okamoto, T.、Okamoto, E.、左瑞麟 |
conference |
說明頁(939) |
2010 |
Performance evaluation of telecommunication industry between China and Taiwan |
Chang, Y.-L.、Shih, T.-T.、Wang, Chih Hong |
conference |
說明頁(688) |
2010-10 |
Certificateless proxy signature and its extension to blind signature |
Tso, R.、Yi, X.、左瑞麟 |
conference |
說明頁(963) |
2010 |
A multi-hop walkie-talkie-like emergency communication system for catastrophic natural disasters |
Lien, Yao-Nan、Chi, L.-C.、Huang, C.-C.、連耀南 |
conference |
說明頁(875) |
2010 |
Automatic generation of caricatures with multiple expressions using transformative approach |
Liao, Wen-Hung、Lai, C.-A.、廖文宏 |
conference |
說明頁(1182) |
2010 |
A better strategy of discovering link-pattern based communities by classical clustering methods |
Lin, C.-Y.、Koh, J.-L.、Chen, Arbee L. P.、陳良弼 |
conference |
說明頁(957) |
2010 |
Continuous probabilistic skyline queries over uncertain data streams |
Su, H.Z.、Wang, E.T.、Chen, Arbee L. P.、陳良弼 |
conference |
說明頁(919) |
2010 |
The effect of school facility allocation to city center development base on dynamic spatial structure model |
Chyan, S.-H.、Liu, Hsiao-Lan、Lin, F.-T.、劉小蘭 |
conference |
說明頁(966) |