Showing results 681 to 700 of 1305
< previous
next >
Date | Title | Author(s) |
10-Apr-2015 | Older-users` acceptance of smartcard payment systems: An investigation of an old-street venders | Yu, S.-C.;Ting, C.-J.;Lu, H.-C.;Fu, Fong-Ling; 傅豐玲 |
26-May-2020 | On Addressing RFID/NFC-based Relay Attacks: An Overview | 杜雨儒; Tu, Tony Yu-Ju; Piramuthu, Selwyn |
28-May-2015 | On crowdsourcing of service imagery | Yuan, Soe-Tsyr;Hsieh, Ching Fang;Hsieh, P.-H.; 苑守慈;謝靜芳 |
6-Jan-2022 | On group ownership delegate protocol for RFID systems | 杜雨儒; Yu-Ju Tu; Kapoor , Gaurav; Piramuthu, Selwyn |
24-Jun-2020 | On Improving the Accuracy of RFID Tag Identification in Supply Chain Applications | 杜雨儒; Tu, Yu-Ju; Piramuthu, S. |
28-May-2015 | On interoperation of hybrid cloud | Chiang, Johannes K.;Yen, Eric H W;Lin, Yu Long; 姜國輝;林育龍 |
5-Oct-2023 | On searching information leakage of Python model execution to detect adversarial examples | 郁方; Yu, Fang;Guo, Cheng-Yao |
12-Feb-2015 | On Service Productivity: The Emerging Platforms Perspective | 苑守慈; Hung, Wei-Tien;Yuan, Soe-Tsyr |
6-Aug-2014 | On Spiking Neural P Systems and Partially Blind Counter Machines | Oscar H. Ibarra;Sara Woodworth;郁方;Andri Paun |
9-Aug-2017 | On the lower bound of monitor solutions of maximally permissive supervisors for a subclass α-S3PR of flexible manufacturing systems | 趙玉; Chao, Daniel Yuh |
3-Feb-2016 | On-shelf availability, retail performance, and external audits: A field experiment | 莊皓鈞; Chuang, Howard Hao-Chun;Oliva, Rogelio;Liu, Sheng |
16-Jun-2015 | One-day-ahead load forecast using an adaptive approach | Xia, X.;Rui, X.;Bai, X.;Wang, H.;Jin, F.;Yin, W.;Dong, J.;Lee, Hsin Ying |
1-Sep-2015 | Online privacy control via anonymity and pseudonym: Cross-cultural implications | Chen, Houn-Gee;Chen, Charlie C.;Lo, Louis;Yang, Samuel C.; 羅亦斯 |
5-Mar-2015 | Ontology-Based Agent Community for Information Gathering and Integration | 苑守慈; Yuan, Soe-Tsyr |
22-Sep-2021 | Open Collaboration Framework centric to Federated Cloud for Smart Earth : on Case of Disaster Mitigation and Environment Technology | 姜國輝; Chiang, Johannes K.; Yen, Eric |
26-Mar-2015 | Operationalizing the opportunistic behavior in model formulation | 曾淑峰; Vinze, Ajay S.;Sen, Arun;Liou, Shue Feng T. |
5-Oct-2018 | Opinion Mining for Multiple Types of Emotion-Embedded Products/Services through Evolution Strategy | Yang, Heng-Li;Lin, Qing-Feng; 楊亨利; Yang, Heng-Li |
29-Jul-2015 | Opportunities for Crossing the Chasm between Early Adopters and the Early Majority through New Uses of Innovative Products | Lin, Mu-Hua;Hong, Chao-Fu |
29-Jun-2015 | Optimal control policy for a well-known S 3PR | Chao, Daniel Yuh;Chen, Jiun-Ting;Wu, Kuo-Chiang; 趙玉;陳俊廷 |
24-Aug-2015 | Optimal maintenance policy and length of extended warranty within the life cycle of products | Chang, Wen Liang;Lin, Jyh-Horng; 林志弘 |