題名 | 作者 | 日期 |
A 500MHz, 8-Stage Pipeline RISC Microprocessor Design with Sub-Computing | Hu, Ya-Lun; Chang, Ming-Ku; Chen, Tien-Fu; Shiu, Fang-Yu; Cheng, You-Hsiang | 2007-01-25T06:12:32Z |
A Dynamic Visibility Inference Scheme Based on New Spatial Knowledge Representations from Observer’s Perspective | Jean, Yeong-Ren; Chang, Hsing-Pang | 2007-01-31T08:43:46Z |
Remainder Decoding of Binary Quadratic Residue Codes Using the Gao’s Algorithm | Shih, Pei-Yu; Truong, Trieu-Kien; Chang, Yaotsu | 2007-01-31T03:55:40Z |
Detecting the Code Injection by Hooking System Calls in Windows Kernel Mode | Sun, Hung-Min; Tseng, Yu-Tung; Lin, Yue-Hsun | 2007-01-29T08:23:08Z |
Content-Aware Video Adaptation in Low Bit-rate Constraint | Hsiao, Ming-Ho; Chen, Hua-Tsung; Chen, Yi-Wen; Chou, Kuan-Hung; Lee, Suh-Yin | 2007-02-01T02:08:14Z |
Using Dual Ternary Indexing for Music Retrieval Systems | Chang, Chuan-Wang; Jiau, Hewi-Jin | 2007-01-26T02:09:34Z |
Efficient Mining of Maximal Frequent Itemsets with the Closed and Intersection Approach | Cheng, Xian-Hui; Yang, Don-Lin | 2007-01-26T02:05:17Z |
A Cost-effective Ultra-Reliable Fault-tolerant Switching Software Architecture for Next Generation Networks | Chang, Shih-Jeh | 2007-01-29T07:37:53Z |
Testing Heap Overflow Bugs Caused by Integer Overflows | Tsai, Chang-Hsien; Huang, Shih-Kun | 2007-01-26T02:20:14Z |
Code Compression Architecture for Memory Bandwidth Optimization in Embedded Systems | Tsai, Yi-Ying; Lee, Ke-Jia; Chen, Chung-Ho | 2007-01-26T01:52:49Z |
Efficient Face/Pose Detection Based on Machine Learning | Yen, Shwu-Huey; Tsai, Chin-Wei; Li, Tai-Kuang | 2007-01-31T05:44:41Z |
The Influence of Group Identity, Group Trust and Group Norms on Group Learning Participation | Chou, Huey-Wen; Hsu, Jung-Lung | 2007-02-06T06:03:07Z |
Combining Structure-Based Features and Conserved Data for MicroRNA Target Prediction by the Neural Network Method | Chao, Shih-Yi; Chiang, Jung-Hsien | 2007-02-06T02:40:03Z |
EGOE: a Generating System of Multi-View Editing Environments on Eclipse Platform | Chen, Cheng-Chia | 2007-01-26T02:14:33Z |
ViTa: a database of host microRNA targets on viruses | Hsu, Wei-Che; Lin, Li-Zen; Hsu, Sheng-Da | 2007-02-01T03:35:36Z |
Tone Recognition Based on Multi-layer Perceptron with Application for Continuous Mandarin Speech Recognition | Wang, Wern-Jun; Lin, Chih-Heng; Chen, Chien-Hung; Liao, I-Bin; Huang, Eng-Fong | 2007-02-01T02:23:48Z |
Rate-Adaption Channel Assignment and Routing Algorithm for Multi-Channel WirelessMAN Mesh Networks | Chen, Lyu-Han; Chan, Hsuan-Hao; Wu, Hsiao-Kuang | 2007-01-26T08:39:53Z |
By Using of the Gamma Variates to Analyze the performance of MC-DS-CDMA System over Selective Fading Channels | Chen, Iong-Zong; Wang, S. C.; Hsieh, Tai Wen | 2007-01-26T06:58:36Z |
Forward-Secure Subliminal Channels based on GQ Signature | Lin, Dai-Rui; Wang, Chih-I; Fan, Chun-I; Guan, D-J | 2007-01-29T08:37:56Z |
Analysis of the Potential Malicious Code on Control Systems | Tseng, Wan-Hui; Fan, Chin-Feng | 2007-01-26T03:28:48Z |