題名 | 作者 | 日期 |
Capacity Analysis for CDMA Based Cellular and Ad hoc Co-existence Networks | Tsai, Chia-Sheng | 2006-10-18T07:46:11Z |
A study on VoIP Security | Sung, Chia-Ming; Lo, Ching-Cheng; Peng, Chung-Hao; Tsai, Wen-Nung | 2006-10-16T05:39:09Z |
The Multi-Image Copyright-Protection Scheme Based on Neural Network | Chen, Chun-Hua; Hsu, Chun-Hua | 2006-10-11T08:02:43Z |
Generalized Fuzzy Automata for Fuzzy Feedback Control with Words | Chen, Chao-Lieh | 2006-10-11T08:08:43Z |
Knowledge Annotation and Discovery for Patent Analysis | Huang, Su-Hsien; Liu, Cheng-Chang; Wang, Chun-Weng; Ke, Hao-Ren; Yang, Wei-Pang | 2006-10-12T08:02:27Z |
Reducing the Variation of Gene Expression Patterns: A Grey Model Approach Applied to Microarray Data Classification | Lin, Tsun-Chen; Liu, Ru-Sheng; Liu, Chen-Chung; Chen, Shu-Yuan; Chen, Chieh-Yu | 2006-10-12T08:01:47Z |
XML-based SCM Environment and Related Metrics | Weng, Ya-Chi; Fan, Chin-Feng | 2006-10-11T07:57:50Z |
Testing-Coverage Dependent Software Reliability Growth Modeling and Its Applications | INOUE, Shinji; YAMADA, Shigeru | 2006-10-16T05:57:06Z |
Using FPGA to Implement a Partial Reconfigurable Architecture of Embedded System | Deng, Yan-Xiang; Chang, Yu-Ching; Hwang, Chao-Jang | 2006-10-16T05:57:19Z |
An Extension of C Preprocessor Directives for Device Programming | Lin, Kuan Jen; Chen, Jian Lung; Huang, Chuang Hsiang | 2006-10-18T07:48:39Z |
New Experiments Towards to Performance Comparison Between CISC and RISC Architecture Cluster Environments | Chang, Hsun-Chang; Chang, Li-Jen; Lin, Yaw-Ling; Li, Kuan-Ching; Yang, Chao-Tung; Lee, Liang-Teh | 2006-10-18T07:51:48Z |
Fast Algorithms for Finding the Common Subsequence of Multiple Sequences | Huang, Kuo-Si; Yang, Chang-Biau; Tseng, Kuo-Tsung | 2006-10-12T07:59:04Z |
Browser-Oriented Data Extraction | Wu, I-Chen; Su, Jui-Yuan; Chen, Loon-Been | 2006-10-16T05:35:58Z |
A Distributed Group k-Exclusion Algorithm using k-Write-Read Coteries | Jiang, Jehn-Ruey | 2006-10-18T07:50:15Z |
Enhancement of Web Sites Security by Utilizing Web Logs Mining | Lin, Ching-Nan; Huang, Chiung-Wei; Lee, Hahn-Ming | 2006-10-16T05:35:27Z |
A Conceptual Model for Business-Oriented Management of Web Services | Lin, Jyhjong; Hsu, Yu-Ying; Hsu, Yu-Ying | 2006-10-16T05:36:06Z |
Using Genetic Algorithm to Solve Sequence Dependent Setup Time Jobs Scheduling Problem | Lo, Shih-Tang; Chen, Ruey-Maw; Huang, Yueh-Min | 2006-10-11T08:06:56Z |
Implementing a Small Scale MANET Testbed based on Geocast-Enhanced AODV-bis Routing Protocol | Ooi, Chia-Ching; Fisal, N. | 2006-10-18T07:53:03Z |
A Low Power-consuming Embedded System Design by Reducing Memory Access Frequencies with Multiple Reference Tables and Encoding the Most Executed Instructions | Chen, Ching-Wen; Chang, Chih-Hung; Ko, Chang-Jung | 2006-10-18T07:43:47Z |
Customer-oriented Policy for Proxy Management System | Bhattarakosol, Pattarasinee; Srisujjalertwaja, Wijak | 2006-10-18T07:53:26Z |