題名 | 作者 | 日期 |
A CMAC with Content Addressable Memory | Hsu, Yuan-Pao; Hwang, Kao-Shing; Wang, Jinn-Shyan | 2006-10-27T03:49:49Z |
The Fetch Mechanism Issue of X86 Superscalar Processor with Fetch Rules | Chiu, Jih-Ching; Chung, Chung-Ping | 2006-10-27T03:18:26Z |
Rating Information Collecting and Distributing in PICS Protocol | Lin, Yao-Tsung; Tseng, Shian-Shyong; Zhong, Yu-Xiu; Jiang, Mon-Fong | 2006-11-17T01:12:29Z |
Effective Techniques to Reduce Memory Access Latency for F-COMA Multiprocessor | Chung, Lan-Mao; Pean, Der-Lin; Chen, Cheng | 2006-10-26T03:33:58Z |
New Code Construction for Multirate Transmission In Optical Fiber CDMA Networks | Wen, Jyh-Horng; Lin, Jen-Yung; Lee, Kung-Tien | 2006-11-16T02:57:25Z |
GAT: A Genetic Algorithms Toolkit | Liao, Ying-Hong; Sun, Chuen-Tsai | 2006-10-26T02:49:51Z |
Some Interesting Properties Of Splicing Languages | Raj, Pethuru; Ishii, Naohiro | 2006-10-25T07:30:49Z |
Predictive Resource Reservation in Wireless Cellular Networks | Chang, Ruay-Shiung; Lu, Hsua-Yan | 2006-11-16T03:41:18Z |
A Novel Approach to Evaluate the Top K Interesting Ranks from Web Search Engines | Lee, Chien-I; Tsai, Cheng-Jung; Li, Yu-Chiang; Wu, Cheng-Tao | 2006-10-30T01:55:38Z |
A Generalized Secret Sharing Scheme Realizing Ordered Access Structures | Wu, Tzong-Chen; Lin, Chih-Yin; Lin, Tzuoh-Yi; Hwang, Jing-Jang | 2006-10-27T06:44:50Z |
Secure Schemes for an On-Line Auction Service | Tsaur, Woei-Jiunn; Hu, Kao-Hsin | 2006-10-27T07:08:45Z |
A 1.25 GHz 8-bit Tree-Structured Carry Lookahead Adder | Wang, Chua-Chin; Lee, Po-Ming; Huang, Chenn-Jung; Lee, Rong-Chin | 2006-10-27T03:05:23Z |
Mining Components From Legacy Systems Through Reverse Engineering | Tang, Z.; Yang, H.; Chu, W. C.; Pen, Y. C.; Chang, C. H. | 2006-10-27T07:59:42Z |
Automatic Segmentation of Psoriasts Images Using Neuro-Fuzzy Techniques | Taur, J.S.; Tao, C.W.; Chen, C.C.; Yang, C.W. | 2006-10-26T03:09:50Z |
Hamiltonian Problems on Ptolemaic Graphs | Chang, Maw-Shang; Wu, Shaur-Ching | 2006-10-25T05:57:03Z |
Complete-rotation Graph : A New Interconnection Network | Lee, Cheng-Ta; Hsu, Chiun-Chieh | 2006-10-27T02:05:26Z |
Study of IP Multimedia Traffic Running over ABR ATM Connections and Using Diffserv Policies Within the Internet Segments | Martínez, Alejandro; Gallardo, R.; Makrakis, Dimitrios | 2006-11-16T03:36:23Z |
A Recursive Chain Code to Quadtree Converting Method with A Lookup Table | Chen, Zen; Chen, I-Pin | 2006-11-17T07:59:29Z |
Robust Spatial-Domain Watermarking Methods Based on a Weighting Table with Fine-Tune Technique | Chung, Mu-San; Chang, Kai-Hsiang; Hsiao, Shen-Fu | 2006-11-17T01:10:35Z |
Design And Performance Evaluation Of A Non-Preemptive Priority Based Access Control Scheme For IEEE 802.11 DCF Access Method | Deng, Dr-Jiunn; Yen, Hsu-Chun | 2006-11-16T02:54:30Z |