題名 | 作者 | 日期 |
Generation of Multiple Primary Input Blocking Patterns for Power Minimization during Scan Testing | Tseng, Wang-Dauh; Lin, Hsu-Yang | 2007-01-26T02:03:29Z |
A Predictive Algorithm for Replication Optimization in Data Grids | Chang, Ruay-Shiung; Huang, Ning-Yuan; Chang, Jih-Sheng | 2007-01-26T01:34:20Z |
Development and Evaluation of SCCR Digital Learning System for improving scientific conceptual change and scientific reasoning | She, Hsiao-Ching; Lee, Chin-Quen | 2007-02-06T03:25:11Z |
An Image Resolution Enhancement Algorithm Using Undecimated Wavelet Transform | Tai, Shen-Chuan; Yen, Wen-Chien; Yang, Shih-Hsien | 2007-01-31T05:49:55Z |
IP-Based DRM - A Fair and Privacy Preserving DRM Framework | Sun, Hung-Min; Wang, King-Hang; Kao, Yih-Sien | 2007-01-29T08:07:43Z |
Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks | Lee, Ying-Sung; Chien, Hsien-Te; Tsai, Wen-Nung | 2007-01-29T07:55:52Z |
Bandwidth Allocation Strategy for Intelligent Digital Home Networks | Sue, Chuan-Ching; Hsu, Shih-Chang; Hsu, Chi-Yu; Chen, Wei-Chu | 2007-01-29T07:43:19Z |
Combined Power Allocation and Diversity for Multi-Cell Networks | Wang, Jui Teng | 2007-01-29T08:01:23Z |
A Simple Method to Extract Fuzzy Rules by Measure of Fuzziness | Chang, Jieh-Ren; Wang, Nai-Jian | 2007-01-26T02:34:32Z |
A Model for Achieving the Goals of Requirement Development Process Area in CMMI Level3 on Workflow Applications | Wang, Ching Huey; Wang, Feng Jian | 2007-01-26T02:57:04Z |
On the Extension of Wiener Attack on RSA with Short Secret-Exponents | Sun, Hung-Min; Wu, Mu-En; Chen, Shiuan-Tung | 2007-01-29T08:40:54Z |
A Coverage and Connectivity Approach to Node Optimum Clustering in Wireless Sensor Networks | Wang, Ying-Hong; Yu, Chin-Yung; Huang, Shi-Yi | 2007-01-26T07:53:22Z |
VLSI Implementation of CORDIC-Based Geometry Rotation for High-Speed 3-D Computer Graphic Systems | Sung, Tze-Yun; Hsin, Hsi-Chin | 2007-01-25T06:59:39Z |
Power Consumption Reduction by Memory Compression in Java Embedded Systems | Dan Lo, Chia-Tien; Kato, Mayumi | 2007-01-26T01:49:18Z |
Holonic Formation Control for Mobile Robots | Hsu, Chia-Hung; Liu, Alan; Yen-Ru Cheng | 2007-01-26T03:17:03Z |
Video Quality in Set-Top Box: Improving Test Productivity While Retaining Quality Index | Liu, Pai-Chen; Lin, Ying-Dar; Tsai, Wen-Jiin | 2007-02-01T01:28:55Z |
A Novel Approach to Comparison-Based Diagnosis for Hypercube-Like Multiprocessor Systems | Chieh-Feng Chiang; Jimmy J. M. Tan | 2007-01-26T01:19:34Z |
Automatic Segmentation of Brain MRI Images by Threshold Level Set Method | Hsu, Chih-Yu; Yang, Chih-Hung; Chang, Lin-huang; Zchang, Zsu- Uei | 2007-02-01T06:33:06Z |
Adaptive Proxy-Assisted Cache Scheme for Multiple-version Video Transmission | Kao, Chi-Feng; Lee, Chung-Nan | 2007-02-01T02:15:13Z |
Secure E-Voting System with Collision-Free AID | Wu, Lih-Chyau; Chen, Bae-Ling; Chen, Lih-Woei | 2007-01-29T08:45:28Z |