題名 | 作者 | 日期 |
AN IMAGE PROCESSING APPROACH FOR WAFER SCRATCH IDENTIFICATOIN | Wang, Chua-Chin; Huang, Chenn-Jung; Chen, Sheng-Hua | 2006-10-19T15:20:48Z |
A Receipt-Free Voting Scheme Using Partially Compatible Homomorphisms | Wang, Chin-Hung; Hwang, Tzonelih | 2006-10-20T03:39:05Z |
Genetic Algorithms for Channel Assignment in PCS | Chen, Chih-Jen; Chang, Ming-Feng; Chen, Rong-Jaye | 2006-10-20T17:41:52Z |
Development and Application of Reverse Engineering Measures in a Re-engineering Tool | Zhou, S.; Yang, H.; Luker, P.; Chu, C. | 2006-10-23T06:40:06Z |
An improved splitting-box algorithm for volume visualization | Yang, Shi-Nine; Wu, Tian-Sheng; Chang, Shann-Horng | 2006-10-16T06:39:49Z |
The Study on Constructing an Immersive Visualization Environment for High-Performance Computing | Chu, San-Liang; Wang, Alpha; Hsu, Mei-Ling; Chang, Charlie H. | 2006-10-16T05:58:40Z |
The application of photometric stereo to 3D facial surface measurement | Cheng, kuo-sheng; Hu, Ja-ming; Chen, Yen-ting | 2006-10-16T08:38:33Z |
HOW TO HANDLE UNKNOWN INPUTS | Redondo, Mercedes Fernandez; Espinosa, Carlos Hernandez | 2006-10-23T03:31:04Z |
On the complexity of the maximum biplanar subgraph problem | Chang, Wu-Yu | 2006-10-24T08:19:22Z |
Hierarchical motion estimation algorithm based on pyramidal sucessive elimination | Lin, Chia-Wen; Chang, Yao-Jen; Chen, Yung-Chang | 2006-10-17T11:24:30Z |
The construction of optimal K-fault-tolerant designs for token rings | Hung, Chun-Nan; Hsu, Lih-Hsing | 2006-10-17T07:59:19Z |
Collaborative active textbooks:algorithms animation on the web | Chang, Yi-Hsing; Chen, Rong | 2006-10-17T07:42:48Z |
DATA HIDING IN IMAGES VIA MULTIPLE-BASED NUMBER CONVERSION AND LOSSY COMPRESSION | Wu, Da-Chun; Tsai, Wen-Hsiang | 2006-10-20T03:50:23Z |
A HYPER-CONTROLLABLE AND HYPER-RECORDABLE MEDICAL IMAGE APPLICATION BASED ON PATTERN TECHNOLOGY | Chang, Ku-Yaw; Chen, Lih-Shyang | 2006-10-22T08:02:59Z |
A Public Key Infrastructure based on the Secure DNS | Im, Chan-Soon; Byeon, Ok Hwan; Shim, Young-Chul | 2006-10-20T02:36:56Z |
EFFICIENT CHEATER IDENTIFICATION IN SEQUENTIAL SECRET SHARING SCHEMES | Lei, Chin-Laung; Cho, Cheng-Tsung | 2006-10-20T05:34:22Z |
Designing proxies for stock market indices is computationally hard | Kao, Ming-Yang; Tate, Stephen R. | 2006-10-24T07:44:54Z |
Solving the all-pair-shortest-length problem on chordal bipartite graphs | Ho, Chin-Wen; Chang, Jou-Ming | 2006-10-24T09:02:15Z |
A PROBABILITY MODEL FOR RECONSTRUCTION SECRET SHARING UNDER THE INTERNET ENVIRONMENT | Lee, Ching-Yun; Yeh, Yi-Shiung; Chen, Deng-Jyi | 2006-10-20T05:27:11Z |
Usage Based Test Scenario Generation from Object-Z Formal Specification | Chen, Chun-Yu; Chang, Kai H. | 2006-10-22T14:17:20Z |