2015-05 |
Erratum to: Optical illusion shape texturing using repeated asymmetric patterns |
Chi, Ming-Te、Yao, Chih-Yuan、Zhang, Eugene、Lee, Tong-Yee、紀明德 |
article |
pdf(894) |
2013-09 |
Discovering and characterizing political elite cliques with evolutionary community detection |
Liu, Jyi-Shane、劉吉軒、Ning, Ke-Chih、甯格致、Chuang, Wan-Chun、莊婉君 |
article |
說明頁(946) |
2015-03 |
Automatic query rewriting schemes for multitenant SaaS applications |
Liao, Chun-Feng、廖峻鋒、Chen, Kung、陳恭、Chen, Jiu-Jye、陳俊傑、Tan, Deik Hoong |
article |
pdf(835) |
2011-12 |
MeInfoText 2.0: gene methylation and cancer relation extraction from biomedical literature |
Lai, Po-Ting、賴柏廷、Hsu, Wen-Lian、Dai, Hong-Jie、Fang, Yu-Ching |
article |
pdf(690) |
2012 |
Post-Modern Portfolio Theory for Information Retrieval |
Tsai, Ming-Feng、Wang, Chuan-Ju、蔡銘峰 |
article |
pdf(622) |
2012-06 |
Strongly secure certificateless short signatures |
Tso, Raylin、左瑞麟、Susilo, Willy、Huang, Xinyi |
article |
pdf(631) |
2009-04 |
Privacy preserving itemset mining through noisy items |
Lin, Jun-Lin、Cheng, Yung-Wei、鄭雍瑋 |
article |
pdf(656) |
2017-01 |
A semantic frame-based intelligent agent for topic detection |
Chang, Yung-Chun、Hsieh, Yu-Lun、Chen, Cen-Chieh、Hsu, Wen-Lian |
article |
pdf(721) |
2012-06 |
A cognition-based game platform and its authoring environment for learning chinese characters |
Liu, Chao-Lin、劉昭麟、Chou, Chia-Ru、Tzeng, Yu-Lin、Lee, Chia-Ying、Huang, Wei-Jie、黃瑋杰 |
article |
pdf(1008) |
2009-09 |
T--S Model-Based SMC Reliable Design for a Class of Nonlinear Control Systems |
Liang, Yew-Wen、Xu, Sheng.-Dong、Ting, Li-Wei |
article |
說明頁(951) |
2009 |
ID-based group password-authenticated key exchange |
Yi, X.、Tso, Ray Lin、左瑞麟 |
article |
說明頁(1091) |
2009 |
System optimal compensators placement via immune multi-objective algorithm |
Hwang, T.Y.、Tsai, C.M.、Huang, Chih-Chieh |
article |
說明頁(936) |
2007-12 |
Data Analysis |
Chen, Arbee L. P.、陳良弼 |
article |
說明頁(975) |
2015-03 |
Supporting Patients’ Privacy Preferences Using Aspects |
Chen, Kung、Wang, Da-Wei、陳恭 |
article |
pdf(777) |
2012 |
Finding security vulnerabilities in Java web applications with test generation and dynamic taint analysis |
Huang, Yu-Yu、Chen, Kung、Chiang, Shang-Lung、陳恭 |
article |
pdf(719) |
2015-09 |
Certificateless aggregate signature with efficient verification |
Tso, Raylin、左瑞麟 |
article |
說明頁(919) |
1999-12 |
Data Analysis |
Chen, Arbee L.P.、陳良弼 |
article |
說明頁(1046) |
2015 |
A Survey on Security of Certificiateless Signature Schemes |
Chen, Yu-Chi、Tso, Raylin、左瑞麟 |
article |
說明頁(960) |
2009 |
Satisfaction with Taiwan’s medical institutions of research and analysis |
Ho, Cheng-Kuang |
article |
說明頁(750) |
2010 |
Multi-objective optimization via fuzzy-evolution method |
Huang, T. L.、Hwang, T.Y.、Chang, C.H.、Sheu, J.S.、wang, C.T.、Lien, Y.N.、Huang, C.C.、Chen, C.R.、連耀南 |
article |
說明頁(824) |
2010 |
Optimal capacitors appointment though immune multi-objective algorithm |
Huang, T. L.、Tsai, C. M.、Hwang, T. Y.、Huang, C. C.、Lien, Y. N.、Chen, C. R.、Chang, C. H.、連耀南 |
article |
說明頁(735) |
2010 |
Optimal pair-layer stabilizer design |
Sheua, J.S.、Huang, T.L.、Hwang, T.Y.、Chang, C.H.、Wang, C.T.、Lien, Y.N.、Huang, C.C.、Chen, C.R.、連耀南 |
article |
說明頁(782) |
2010 |
Optimal system harmonic filters design |
Hwang, T.Y.、Huang, T.L.、Chang, C.H.、Sheu, J.S.、Wang, C.T.、Lien, Y.N.、Huang, C.C.、Chen, C.R.、連耀南 |
article |
說明頁(797) |
2010 |
Output-regulated optimal grey controller |
Huang, T. L.、Liu, C.W.、Chang, C. H.、Huang, C. C.、Chen, C. R.、Lien, Y. N.、Hwang, T. Y.、Sheu, J. S.、Wang, T. C.、連耀南 |
article |
說明頁(847) |
2012-03 |
傳播與當代思潮 |
臧國仁、鍾蔚文、劉吉軒 |
article |
pdf(331) |