題名 | 作者 | 日期 |
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing | Horng, Gwoboa; Liu, Chao-Liang; Liu, Hsin-Yu | 2006-10-16T05:38:51Z |
APPROXIMATE MATCHING USING INTERVAL JUMPING SEARCHING ALGORITHMS FOR DNA SEQUENCES | CHU, JIA-HAN; CHANG, WEI-YUAN; PAI, TUN-WEN; CHANG, MARGARET DAH-TSYR; TAI, HSIU-LING; CHANG, HAO-TENG | 2006-10-12T07:58:23Z |
Integrating Fuzzy Databases with Inconsistent Data Redundancy | Liu, Yu-Chih; Lin, Jun-Lin | 2006-10-11T08:07:59Z |
An Efficient Fair Blind Signature Scheme with Message Recovery Using Pairing-based Cryptosystems with Provable Security | Tsaur, Woei-Jiunn; Guo, Chii-Jyh | 2006-10-13T01:20:19Z |
Heuristics for Multicast Routing and Wavelength Assignment with Delay Constraint in WDM Network with Heterogeneous Capability | Chen, Ming-Tsung; Tseng, Shian-Shyong | 2006-10-18T07:44:49Z |
Representative Music Fragments Extraction by Using Segmentation Techniques | Ke, Wen-Jie; Chang, Chuan-Wang; Jiau, Hewijin Christine | 2006-10-18T07:53:42Z |
Constraint-based Software Specifications for Safety-critical Applications | Wu, Chia-Kuo; Fan, Chin-Feng | 2006-10-11T07:57:04Z |
Novel Algorithms for Deductive Games | Chen, Shan-Tai; Lin, Shun-Shii | 2006-10-11T08:04:54Z |
Efficient Computation of the Weil Pairing in ID-based Cryptosystems | Hwu, Jing-Shyang; Chen, Rong-Jaye; Lue, Huei-Shyong; Lin, Jer-Shyong | 2006-10-16T05:39:15Z |
Real-Time Shadow Rendering Using Projective Texture | Chen, Jyun-Ming; Tung, Kai-Pin | 2006-10-13T01:11:03Z |
Support Vector Machines for Mandarin Phonetic Morse Code Recognition | Yang, Cheng-Hong; Chuang, Li-Yeh; Chen, Shih-Chung; Luo, Ching-Hsing | 2006-10-11T08:06:23Z |
Automatic Score Recording System | Pao, Tsang-Long; Pan, Wei-Chih; Cheng, Hsiu-Wen | 2006-10-11T08:05:33Z |
Automatic Extraction of Chinese-English Synonyms Based on a Three-Phase Approach | Lin, Yih-Jeng; Huang, Fong-Long | 2006-10-11T08:02:33Z |
A Decentralized Approach To Topology Aware Clustering of Peer-to-Peer Systems | Wang, Chou-kai; Hwang, Shyh-In; Hwang, Ertai | 2006-10-18T07:50:23Z |
Hash Based Collision Resolution for Passive RFID Tags | Yen, Wei | 2006-10-18T03:40:31Z |
Integrating Region Distribution and Edge Detection for Color Image Segmentation | Huang, Yong-Ren; Kuo, Chung-Ming; Hsieh, Chaur-Heh; Pai, Chia-Yu | 2006-10-16T05:55:14Z |
Speckle Reduction of Ultrasound Image Based on Contourlet Transform | Huang, Mao-Yu; Huang, Yueh-Min; Wang, Ming-Shi | 2006-10-11T07:56:14Z |
A Fault-tolerant Multipath Routing Protocol in Wireless Sensor Networks | Huang, Shih-Kang; Ssu, Kuo-Feng; Wu, Tzu-Ting | 2006-10-18T07:53:17Z |
Progressive Pattern Matching Approach Using Discrete Cosine Transform | Chiang, Te-Wei; Tsai, Tienwei; Lin, Yi-Chen | 2006-10-11T08:05:59Z |
A new construction of resilient functions over GF(p) with good cryptographic properties | Huang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:35:19Z |