顯示 425 到 444 筆資料,總共 15457 筆
< 上一頁
下一頁 >
題名 | 作者 | 日期 |
A Bucket Index Scheme for Error Tolerant Chinese Phrase Matching | Du, Min-Wen; Wu, Hsi-Hso | 2006-10-30T01:43:24Z |
A Burst Fragmentation and Scheduling Algorithm (BFSA) for Downlink Traffic in IEEE 802.16 OFDMA Systems | 石, 貴平 Jr; 陳, 弘璋 Jr; 蔣, 季陶 Jr; 陳, 磬霖 Jr | 2011-05-30T20:56:02Z |
A Business-oriented Architecture Compliant with Semantic SOA | You, Yuan-chwen | 2008-08-05T01:40:59Z |
A Capacity Measurement of Workflow Management Systems | Cheng, Jian-Chang; Wang, Jian-Wei; Wang, Feng-Jian | 2006-10-16T05:33:00Z |
A Capacity Measurement of Workflow Management Systems | Cheng, Jian-Chang; Wang, Jian-Wei; Wang, Feng-Jian | 2006-10-16T03:29:09Z |
A Change of Heart?A Bivariate Probit Model of International Students’ Change of Return Intention | Jan-Jan Soon | 2010/08/01 |
A Characteristic Based Scheduling Scheme for VBR Traffic over ATM Networks | Hu, Shuo-Cheng; Wang, Yu-Fu; Chen, Yaw-Chung | 2006-10-20T19:51:02Z |
A Chinese-Character Stroke Extaction Algorithm Based on Contour Information | Lee, Chung-Nan; Wu, Bo-Hom | 2006-10-30T01:37:18Z |
A Classifier Learning Scheme based on Rough Membership and Genetic Programming | Chien, Been-Chian; Yang, Jui-Hsiang | 2006-10-24 |
A Clustering Technique for Digital Communication Channel Equalization Using Wavelet Neural Networks | Tsai, Hung-Ming; Lin, Cheng-Jian; Chen, Po-Yueh | 2006-10-11T07:56:26Z |
A CMAC with Content Addressable Memory | Hsu, Yuan-Pao; Hwang, Kao-Shing; Wang, Jinn-Shyan | 2006-10-27T03:49:49Z |
A Coating containing Polyacrylate Copolymer with dispersing Nano Zirconium Dioxide | 朱侯憲 | 08-10-19 |
A Cognitive MAC Protocol for QoS Provisioning in Overlaying Ad Hoc Networks | Wang, Li-Chun; Chen, Anderson; Wei, S. L. | 2007-01-29T01:33:47Z |
A Cointegration Analysis of Purchasing Power Parity and Country Risk | Su-Yin Cheng; Jong-Shin Wei; Han Hou | 2008/12/01 |
A Collaborative Anti-Spam E-mail Filter | Huang, Wei-Li; Lee, Ying-Sung; Tsai, Wen-Nung | 2007-01-31T01:38:26Z |
A COLLABORATIVE INTERNET DOCUMENTS ACCESS SCHEME USING ACIRD | Lin, Shian-Hua; Shih, Chi-Sheng; Chen, Meng-Chang; Ho, Jan-Ming; Ko, Ming-Ta | 2006-10-22T12:20:06Z |
A Collusion Attack on Ghodosi and Saeednia’s Scheme | Chen, Chien-Yuan; Hsueh, Chih-Cheng | 2006-10-17T03:50:42Z |
A Column Generation Approach to Solve Proportionate Flexible Flow Shop for Common Due Date Scheduling | Shiau, Der-Fang; Cheng, Shu-Chen; Huang, Yueh-Min; Hsu, Pi-Chung | 2006-10-11T07:55:44Z |
A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data | Ku, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn | 2006-10-16T05:38:00Z |
A Common-Use Proxy for Economic Performance: Application to Asymmetric Causality between the Stock Returns and Growth | Yuan-Ming Lee; Kuan-Min Wang; T. Thanh-Binh Nguyen | 2008/08/01 |