2018-12 |
Innovative Technologies for Dementia Care |
廖峻鋒*、傅立成*、莊雯莉、陳達夫、邱銘章、許永真、陳淑惠、洪一平、陳佳慧、吳治勳、陳錫中、彭熙寧 |
article |
說明頁(402) |
2019-03 |
Synthesizing electronic health records using improved generative adversarial networks |
劉昭麟、Liu, Chao-Lin、Baowaly*, Mrinal Kanti、Lin, Chia-Ching、Chen, Kuan-Ta |
article |
pdf(218) |
2017-07 |
A Study of Interaction Patterns of Virtual Communities for Knowledge Sharing in 3D Animation Design Forums |
謝佩璇、Hsieh, P. H.、張玨婷、Chang, Chueh-Ting |
article |
pdf(149) |
2017-07 |
Senior high school students’ comprehension and interest in science content: Example of participating in first-hand experimental activities |
謝佩璇、Hsieh, P. H. |
article |
pdf(231) |
2015-12 |
Performance Evaluation of Project Team Tacit Knowledge Management |
謝佩璇、Hsieh, Pei-Hsuan、吳虹霓、Wu, Hung-Ni |
article |
pdf(140) |
2019-09 |
Influence of Culture, Transparency,Trust, and Degree of Automation on Automation Use |
劉吉軒、Liu, Jyi-Shane、Chien, Shih-Yi、Lewis, Michael、Sycara, Katia、Kumru, siye |
article |
pdf(333) |
2019-11 |
On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint |
郭桐惟、Tung-Wei Kuo |
article |
pdf(195) |
2019-02 |
On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint |
郭桐惟、Tung-Wei Kuo |
conference |
pdf(155) |
2016-11 |
How do software users read software installation agreements? An eye-tracking experiment. |
謝佩璇、Hsieh, P. H.、Hsu, P. I. |
article |
pdf(149) |
2015 |
Students` perspectives on e-portfolios` development and implementation: A case study in Taiwanese higher education. |
謝佩璇、Hsieh, P. H.、Lee, C. I.、Chen, W. F. |
article |
pdf(144) |
2019-03 |
Image Haze Removal Using Airlight White Correction, Local Light Filter, and Aerial Perspective Prior |
彭彥璁、Peng, Yan-Tsung、Huang*, S.-C.、呂智慧、Lu, Zhihui、鄭帆捷、Cheng, Fan-Chieh、黃士嘉、Huang, Shih-Chia、Zheng, Yalun |
article |
pdf(299) |
2013-06 |
Thresholds of knowledge development in complex problem solving: a multiple-case study of advanced learners’cognitive processes. |
江玥慧、Chiang, Yueh-Hui Vanessa、Bogard, Treavor、Liu, Min |
article |
pdf(178) |
2018-06 |
Dialogues Between Computer Science and Qualitative Research: Analysis of Visualized Pedestrian Speech Acts in Facebook Check-In Practices |
李蔡彥、吳筱玫 |
article |
pdf(219) |
2019-07 |
On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint |
郭桐惟、Kuo, Tung-Wei |
article |
pdf(188) |
2019-12 |
MS2CNN: Predicting MS/MS spectrum based on protein sequence using deep convolutional neural networks |
張家銘、Chang, Jia-Ming、Lin, Yang Ming、Chen, Ching-Tai |
article |
pdf(191) |
2019-11 |
The CAFA challenge reports improved protein function prediction and new functional annotations for hundreds of genes through experimental screens |
張家銘、Chang, Jia-Ming、organization, CAFA3 |
article |
pdf(200) |
2018 |
A Lattice-Based Group Authentication Scheme |
曾一凡、Tseng, Yi-Fan、Huang, Jheng-Jia、Yang, Qi-Liang、Fan, Chun-I |
article |
pdf(254) |
2018-08 |
An authenticated re‐encryption scheme for secure file transfer in named data networks |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I、Cho, Yan-Fu |
article |
pdf(231) |
2018 |
An Efficient Algorithm for Shortest Vector Problem |
曾一凡、Tseng, Yi-Fan、Chuang, Yu-Lun、Fan, Chun-I |
article |
pdf(283) |
2015 |
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I |
article |
pdf(189) |
2019-10 |
Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I、Wu, Si-Jing、Kuo, Hsin-Nan、Huang, Jheng-Jia |
article |
pdf(202) |
2016 |
Enabled/Disabled Predicate Encryption in Clouds |
曾一凡、Tseng, Yi-Fan、Huang, Shi-Yuan、Fan, Chun-I |
article |
pdf(214) |
2017-07 |
Multireceiver Predicate Encryption for Online Social Networks |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I、Huang, Jheng-Jia、Chen, Shih-Fen、Kikuchi, Hiroaki |
article |
pdf(169) |
2019-07 |
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation |
曾一凡、Tseng, Yi-Fan、Fan, Chun-I、Sung, Cheng-Wei |
article |
說明頁(362) |
2018-07 |
Probably Secure Efficient Anonymous Credential Scheme |
曾一凡、Tseng, Yi-Fan、Wu, Chien-Nan、Fan, Chun-I、Huang, Jheng-Jia、Kikuchi, Hiroaki |
article |
說明頁(245) |