Browsing by Author 資科系


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 208 to 227 of 936 < previous   next >
DateTitleAuthor(s)
2-Sep-2014Cooperative matching paradigm for the analysis of stereo image sequences廖文宏; Liao,Wen-Hung; J. K. Aggarwal
17-Jun-2015Cooperative Transmission Aid in Intermittent Broken Connection on VANETChuang, Sheng-Chih; 張宏慶; Jang, Hung-chin
8-May-2015Coordinated Motion Planning for 3D Animation - With Use of a Chinese Lion Dance as an ExampleYu, Fu-Sheng; 李蔡彥; Li, Tsai-yen
12-May-2015Coreference resolution of medical concepts in discharge summaries by exploiting contextual informationLai, Po-Ting; 賴柏廷; Chen, C.-Y.; Dai, H.-J.
22-Jun-2016Corporate Default Prediction via Deep LearningYeh, Shu-Hao;Wang, Chuan-Ju;Tsai, Ming-Feng; 蔡銘峰
26-May-2015Crafting a balance between big data utility and protection in the semantic data cloudHu, Yuh-Jong;Cheng, Kua Ping;Huang, Ya Ling; 胡毓忠;黃雅玲
27-Oct-2020Critical factors for the relationship quality of IT-related project virtual teams – Roles of mutual trust and knowledge sharing.謝佩璇; Hsieh, P. H.; Chung, V. K.
2-Sep-2014A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks蔡子傑; Tsai,Tzu-Chieh; Peng,Chen-Tzu
4-Jun-2021Crowd View: Converting Investors` Opinions into Indicators黃瀚萱; Huang, Hen-Hsen
17-Feb-2023Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes曾一凡; Tseng, Yi-Fan
11-Jun-2015Cryptanalysis and improvement of an efficient password authentication scheme based on smart cardTso, Ray-Lin; 左瑞麟; Wu, M.-E.; Lin, Yi Shiuan
2-Sep-2020Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wu, Si-Jing; Kuo, Hsin-Nan; Huang, Jheng-Jia
21-May-2015Cryptanalysis of a Provably Secure Certificateless Short Signature SchemeTso, Ray-Lin; 左瑞麟; Chen, Y.-C.; Horng, G.
17-Apr-2015Cryptanalysis of exhaustive search on attacking RSAWu, M.-E.;Tso, R.;Sun, H.-M.; 左瑞麟
17-Feb-2023Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification曾一凡; Tseng, Yi-Fan
27-Oct-2020Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme曾一凡; Tseng, Yi-Fan; Fan, Chun-I
9-Dec-2021Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia
17-Feb-2023Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption曾一凡; Tseng, Yi-Fan
17-Feb-2023Cryptanalysis to Sowjanya et al.’s Attribute-Based Encryptions from Elliptic Curve Cryptography曾一凡; Tseng, Yi-Fan
22-Apr-2020Cultivating Humanity in Computer Programming Educational Practices— A Study of Teacher Action Research江玥慧; Chiang, Yueh-hui Vanessa