題名 | 作者 | 日期 |
Efficient Search and Topology Adaptation in Mobile Peer-to-Peer Networks | Huang, Kuan-Kung; Lu, Chun-Hsien; Lin, Hsin-Hung | 2007-01-29T07:54:13Z |
Graph/Image Legend Retrieval | Huang, Ying-Wen; Lu, Kuo-Hao | 2007-01-31T07:39:26Z |
Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection | Wu, Jing-Lin; Juang, Wen-Shenq; Chen, Sian-Teng | 2007-01-26T07:07:34Z |
Genotyping Polymorphic Bands of Microsatellite DNA with Automatic Object Segmentation and Translated Absolute Size | Chang, Chun-Fan; Shen, Chang-Chih; Huang, Chong-Long; Chu, Hsueh-Ting; Kuo, Hsiao-Yun 等 | 2007-02-01T06:29:07Z |
RFID-based Automatic Airport Baggage Handling System | Chien, Jung-Yin; Wu, Chen-Yang; Hsiung, Pao-Ann; Lin, Keng-Hsien | 2007-01-25T06:29:53Z |
An Internet-Radio Receiver and Real-Time Recorder on SBC-2410x Embedded System | Hwang, Lain-Jinn; Tu, Tang-Hsun; Lin, Tzu-Hao; Kuo, I-Ting; Chen, Chih-Yuan | 2007-01-25T06:20:18Z |
A New Operation for Two R-trees to Efficiently Migrate Spatial Objects | Chen, Jeang-Kuo | 2007-01-31T08:28:44Z |
Case-Based Service Requests Interpretation | Lee, Chiung-Hon; Liu, Alan | 2007-01-26T03:06:20Z |
Performance Evaluation Model for Critical Information Infrastructure Protection Activities | Cheng, Chung-Wei; Yih, Swu; Fan, Chin-Feng | 2007-01-26T02:51:51Z |
A Fair Scheduling Mechanism for the IEEE 802.11e Wireless LAN | Ferng, Huei-Wen; Lee, Chung-Fan; Peng, Cheng-Ching; Liau, Han-Yu | 2007-01-26T06:40:50Z |
Facial Expression Recognition Based on Supervised LLE Analysis of Optical Flow and Ratio Image | Wu, Yu-Kuen; Lai, Shang-Hong | 2007-01-31T05:43:22Z |
An Experimental Model of the Mobile Power-Line Communication Systems | Tang, Cheng-jen; Pan, Jian-Ming | 2007-01-29T01:45:53Z |
Indoor Security Patrolling With Intruding Person Detection and Following Capabilities By Vision-Based Autonomous Vehicle Navigation | Wang, Yu-Tzu; Tsai, Wen-Hsiang | 2007-01-31T02:57:15Z |
Designs and Evaluations of a Novel Mobility Model in Mobile Ad Hoc Networks | Chen, Chun-Hung; Wu, Ho-Ting; Ke, Kai-Wei | 2007-01-29 |
A Test Case Generation Method and a Tool Implementation for Acceptance Testing of GUI Software | Chen, Deng-Jyi; Tsai, Ming-Jyh; Lee, Jen-Gaw; Chen, Chien-Yuan | 2007-01-26T03:19:03Z |
Robust Cross-generation and Cross-laboratory Predictions of Affymetrix Microarrays by Rank-based Methods | Liu, Hsi-Che; Chen, Chien-Yu; Liu, Yu-Ting; Chu, Cheng-Bang; Liang, Der-Cherng | 2007-02-06T02:34:44Z |
VMITN: A Novel Intrusion Tolerance Architecture for Treating the Rapid Propagation of Malicious Programs | Sun, Wen-Chun; Chen, Yi-Ming | 2007-01-29T08:19:17Z |
Using Essential Inverters for Interconnect Delay Reduction | Lee, Lung-Jen; Lin, Rung-Bin | 2007-01-25T06:33:31Z |
Cognitive Conflicts as a Teaching Strategy to Enhance the Need of Mathematical Proofs with Technology Support | Lee, Chun-Yi; Chen, Ming-Puu | 2007-02-06T03:23:48Z |
A Secure Protocol for Mobile IP Using Smartcards | Lin, Chu-Hsing; Tsai, Chien-Liang; Lee, Chen-Yu | 2007-01-26T07:05:22Z |