題名 | 作者 | 日期 |
An Energy-Efficient En-route Filtering False Data Scheme in Wireless Sensor Networks | Wang, Chueh; Hwang, Ren-Junn; Liu, Yu-Hang | 2009-02-10T02:21:13Z |
Towards Automatic Load Balancing for Programming Parallel Fuzzy Expert Systems in Heterogeneous Clusters | Wu, Chao-Chin; Lai, Lien-Fu; Chang, Yu-Shuo | 2009-02-12T02:02:34Z |
A Platform for Simulation of Critical Infrastructures Protection | Kao, Yung-Yu; Kuo, Li-Jung; Fan, Chin-Feng; Yih, Swu | 2009-01-20T09:28:18Z |
Network Virus Propagation Model Based on Variable Propagation Rate | Jin, Cong; Deng, Qing-Hua; Liu, Jun | 2009-02-10T04:00:12Z |
Practical anonymous proxy signature schemes without trusted alias issuers | Hwang, Shin-Jia; Hsu, Pi-Hung | 2009-02-09T08:38:29Z |
Conditional Diagnosability of the BC Networks under the Comparison Diagnosis Model*+ | Hsu, Guo-Huang; J. M. Tan, Jimmy | 2009-02-10T07:29:41Z |
SIMPLE AUTOMATIC PATH LEARNING FOR AUTONOMOUS VEHICLE NAVIGATION BY ULTRASONIC SENSING AND COMPUTER VISION TECHNIQUES | Tsai, Shung-Yung; Tsai, Wen-Hsiang | 2009-02-12T03:28:10Z |
A Hybrid Prototype Construction and Feature Selection Method with Parameter Optimization for Support Vector Machine | Wong, Ching-Chang; Leu, Chun-Liang | 2009-02-12T03:15:39Z |
Mining Time-Interval Sequential Patterns Using Clustering Analysis | Chueh, Hao-En; Lin, Nancy P. | 2009-02-12T06:15:15Z |
Breast Cancer Classification and Biomarker Discovery on Microarray Data Using Genetic Algorithms and Bayesian Classifier | Lin, Tsun-Chen | 2009-02-11T07:14:10Z |
Regulate-SAGE: Mining Software for Serial Analysis of Gene Expression Data | Yang, Cheng-Hong; Shih, Tsung-Mu; Gu, De-Leung; Chang, Hsueh-Wei; Chuang, Li-Yeh | 2009-02-12T07:21:35Z |
Analysis and Detection of Process Interaction Errors | Fan, Chin-Feng; Tsai, Shang-Lin | 2009-02-10T03:04:52Z |
Minimal Height and Sequence Constrained Longest Increasing Subsequence | Tseng, Chiou-Ting; Yang, Chang-Biau; Ann, Hsing-Yen | 2009-02-12T03:22:08Z |
H-MAC: A Channel-Hopping Based Multi-Channel MAC Protocol for 802.11 Wireless LANs | Chang, Chih-Yung; Hwang, Lain-Jinn; Lu, Yun-Jung; Chen, Yu-Chieh | 2009-01-10T04:41:45Z |
A Deniable Authentication Protocol with Anonymous Sender Protection | Hwang, Shin-Jia; Ma, Juei-Che | 2009-02-10T02:28:29Z |
A Surveillance Video System Based on Omni-directional and Network Controlled Cameras | Sato, Yousuke; Hashimoto, Koji; Shibata, Yoshitaka | 2009-02-12T02:41:25Z |
Adaptive Compensation Mechanism Considering the Interaction of SLA and Manages for Web Services Management System | Chou, Li-Der; Wang, Yung-Shih; Chen, Zih-Hong | 2009-02-11T02:39:09Z |
Design and Implementation of Multiprocessor System on a Chip (MPSoC) Based on FPGA | Tseng, Chia-Ying; Chen, Yen-Chih | 2009-02-12T07:21:48Z |
Edge-disjoint Undirected Spanning Trees on the Wrapped Butterfly Networks | Kung, Tzu-Liang; Liang, Tyne; Hsu, Lih-Hsing | 2009-02-12T01:41:03Z |
TempFFS: Enabling Delayed Allocation for Existing File Systems | Hsiao, Chih-Wen; Huang, Ting-Chang; Chang, Da-Wei | 2009-02-12T08:54:46Z |