題名 | 作者 | 日期 |
Another Approach of Mesh-Connected trees | Jan, Gene Eu; Leu, Shao-Wei; Li, Cheng-Hung; Liou, Wan-Rone | 2006-10-18T07:49:52Z |
Design and Implementation of an IEEE 802.15.3-based Ultra-Wideband MAC Controller | Hsieh, Cheng-En; Wu, Ping-Nan; Huang, Ting-Chang; Chang, Da-Wei; Chang, Hsung-Pin; Chen, Po-Ning; Chang, Ruei-Chuan | 2006-10-18T07:46:55Z |
An Intrusion Prevention System using Wrapper | Tsai, Tsung-Yi; Cheng, Kuang-Hung; Chen, Chi-Hung; Tsai, Wen-Nung | 2006-10-16T03:32:52Z |
Performance Evaluation of Multicode Allocation System in WCDMA | Chen, Jui-Chi; Chen, Wen-Shyen E. | 2006-10-18T03:40:22Z |
PFC: A New High-Performance Packet Filter Cache | Shen, Chuan-Hsing; Chung, Tein-Yaw | 2006-10-18T07:43:29Z |
Fail-Stop Blind Signature Scheme Based on the Integer Factorization | Wu, Lin-Chuan; Fan, Chun-I; Yeh, Yi-Shiung; Liu, Tsann-Shyong | 2006-10-13T01:20:10Z |
On The Implementation and Experiences of A MIL-STD-188-220C Ad Hoc Routing Protocol | Yu, Chih-Min; Hsiao, Wen-Cheng; Cheng, Hsueh-Chin; Hsieh, Chuan-Yi | 2006-10-18T07:52:47Z |
Improvement on a Provable Secure Access Control using Smart Cards | Yang, Fuw-Yi; Jan, Jinn-Ke | 2006-10-13T01:17:18Z |
Distributed Security and Reliable Routing In the Cluster-Based Ad Hoc Network | Hsieh, Meng-Yen; Huang, Yueh-Min | 2006-10-18T03:42:53Z |
Image Hiding Based on a Hybrid Technique of VQ Compression and Discrete Wavelet Transformation | Chu, Yen-Ping; Guo, Shu-Wei; Chan, Yung-Kuan; Wu, Hsien-Chu | 2006-10-13T01:20:32Z |
Preventing Information Leakage within Object-Oriented Systems Using RBAC-Based Model | Chou, Shih-Chien; Wu, Chien-Jung | 2006-10-16T05:39:29Z |
An Improved Similarity Measure for Image Database Based on 2D C+-string | Jean, Yeong-Ren; Lo, Hao-Yu | 2006-10-16T05:40:02Z |
The Study of Home Appliances Remote Control Based on OSGi | Chang, Chia-Ming; Liu, Chih-Fang | 2006-10-16T06:01:53Z |
Exploiting Data Mining Techniques to Support Context-aware M-services in Mobile Web Service Systems | Tseng, Vincent Shin-Mu; Lin, Kawuu Wei-Cheng | 2006-10-18T07:42:00Z |
Comparative Review of Common Reconfigurable Architectures | Lee, Woo Hyong; Saha, Arindam; Lee, Eun Ji; Park, Sung Bae | 2006-10-18T07:51:40Z |
Routing Path Selection Algorithm Based On Price Mechanism In Ad-Hoc Network | Chen, Chih-Chan; Jian, Ming-Shen; Lee, Chung-Nan | 2006-10-18T03:47:48Z |
A Layer 2 IP sharing device based on the NPT mechanism | Chen, Wen-Sung; Jia, Wen-Kang | 2006-10-18T07:52:30Z |
Error Spreading Control in Steganographic Embedding Schemes Using UEP Codes | Yang, Ching-Nung; Chen, Guo-Jau | 2006-10-13T01:21:24Z |
A Mechanism for Data Conversion between XML and Network Data Model | Chen, Jeang-Kuo; Liu, Ching-Jen | 2006-10-16T05:35:50Z |
A New Approach of Seed-Set Finding for Iso-Surface Extraction | Hung, Chiang-Han; Yang, Chuan-kai | 2006-10-16T05:57:39Z |