題名 | 作者 | 日期 |
Rotation Distance between Two Binary Trees | Chen, Yen-Ju; Chang, Jou–Ming; Wang, Yue-Li | 2006-10-16T06:01:58Z |
Extracting Caption Content on Sports Videos by Caption Identification | Su, Yih-Ming; Hsieh, Chaur-Heh | 2006-10-12T07:59:21Z |
Web Document Classification based on Tagged-Region Progressive Analysis | Sung, Li-Chun; Chen, Meng-Chang; Kao, Chin-Hwa | 2006-10-18T07:53:34Z |
A Fault-Tolerant and Region-Based Scheme for Mobility Management | Yang, Ming-Jeng; Yeh, Yao-Ming | 2006-10-18T07:43:56Z |
The Visuel Performance Analysis and Monitoring Tool for Cluster Enviroments | Chang, Li-Jen; Cheng, Hsiang-Yao; Chang, Hsun-Chang; Li, Kuan-Ching; Wang, Hsiao-Hsi; Yang, Chao-Tung; Lee, Liang-Teh | 2006-10-18T07:51:55Z |
Hyperspectral Image Classification Using Dynamic Classifier Selection with Multiple Feature Extractions | Pai, Chia-Hao; Kuo, Bor-Chen; Sheu, Tian-Wei; Yang, Jinn-Min; Ko, Li-Wei | 2006-10-11T08:07:09Z |
Mining Navigation Behaviors for Term Suggestion of Search Engines | Lee, Hahn-Ming; Huang, Chi-Chun; Hung, Wei-Tang | 2006-10-11T07:58:04Z |
Construct QoS End-to-end Virtual Path With Lagrangean Relaxation Method | Chen, Chang-Jiu; Liu, Ming-Su | 2006-10-18T07:45:40Z |
Cryptanalysis of a New Password Authentication Scheme Using Hash Functions | Ku, Wei-Chi; Chiang, Min-Hung; Chang, Shen-Tien | 2006-10-16T05:33:45Z |
Card Secure Code for Preventing Fraudulent Use of Credit Cards Online | Sue, Kuen-Liang; Juan, Chien-Lin | 2006-10-16T05:33:31Z |
A method for performing color reduction in index images | Lee, Hsiu-Hui; Lo, Shih-Chieh | 2006-10-18T07:50:31Z |
A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board Meeting | Ting, Pei-yih; Hung, Po-Yueh; Chen, Ching-Yi | 2006-10-16T05:33:38Z |
A Hybrid Method for Protein Secondary Structure Prediction | Doong, Shing-Hwang; Yeh, Chi-Yuan | 2006-10-12T08:00:18Z |
Three Methods of Control Flow Obfuscation on Java Software | Tsai, Ming-Hsiu; Chen, Hsiang-Yang; Hou, Ting-Wei | 2006-10-13T01:20:53Z |
Evaluating New Drugs by Fuzzy Inference System | Chou, Hsin-Chuan; Lin, Ching-Wei; Cheng, Ching-Hsue | 2006-10-11T08:07:51Z |
Strategies for Translating UML/OCL Design Models to JAVA/JML Designs | Hamie, Ali | 2006-10-11T07:57:16Z |
Statistical Approaches to Biomedical Entities Recognition | Liang, Tyne; Shih, Ping-Ke; Wu, Diang-Song | 2006-10-12T08:00:27Z |
Probability Model and Replica Allocation Methods in a Multimedia Mobile Learning System | Liang, Pi-Feng; Peng, Shih-Jung; Chen, Deng-Jyi | 2006-10-12T08:19:47Z |
An Algorithm to Compute Transitive Closure Matrix for Acyclic Dirtcted Graph | Lee, Ming-Chi; Dong, Chen-Huang | 2006-10-16T05:55:28Z |
Explanation-Based Constraint Programming for a University Timetabling Problem | Hsieh, Chia-Lin | 2006-10-11T08:06:44Z |