顯示 406 到 425 筆資料,總共 15605 筆
< 上一頁
下一頁 >
題名 | 作者 | 日期 |
A Shallow Triple Stream Three-dimensional CNN (STSTNet) for Micro-expression Recognition System | 梁詩婷 | 05-14-19 |
A 1.25 GHz 8-bit Tree-Structured Carry Lookahead Adder | Wang, Chua-Chin; Lee, Po-Ming; Huang, Chenn-Jung; Lee, Rong-Chin | 2006-10-27T03:05:23Z |
A 3D Model Alignment and Retrieval System | Chen, Ding-Yun; Ming Ouhyoung | 2006-10-23T15:45:06Z |
A 3D Scenes Reconstruction Method Based on Less Featured Block Matching with a Binocular Vision System | Fahn, Chin-Shyurng; Chang, Chia-Hua | 2011-03-31T22:54:49Z |
A 500MHz, 8-Stage Pipeline RISC Microprocessor Design with Sub-Computing | Hu, Ya-Lun; Chang, Ming-Ku; Chen, Tien-Fu; Shiu, Fang-Yu; Cheng, You-Hsiang | 2007-01-25T06:12:32Z |
A application of karaata's self-stabilizing center-finding algorithm | Huang, Tetz C.; Lin, Ji-Cheng; Chen, Hsueh-Jen | 2006-10-18T01:43:46Z |
A Bacterial Textual Processing and Retrieval System | Liang, Tyne; Chang, Yu-teng; Wu, Dian-song | 2006-06-08T06:32:04Z |
A Balanced Scheduling Algorithm for High-speed ATM Switch | 曾學文; 梁維真 | 2006-10-16T05:35:12Z |
A Ballooned Wireless Adhoc Network System for Disaster Cases | Shibata, Yoshitaka; Sato, Yosuke; Ogasawara, Naoki; Chiba, Go | 2009-01-10T04:42:09Z |
A basic pipelined parallel programming environment | Lo, Chiang-Ping Jr; Kuo, Wen-Yan Jr | 2011-04-01T00:15:26Z |
A Basic-Cycle Calculation Technique for Efficient Dynamic Data Redistribution | Chung, Yeh-Ching; Sheu, Ching-Sheng; Bai, Sheng-Wen | 2006-10-24T01:22:47Z |
A Bayesian Model Averaging Approach to Enhance Value Investment | Ron Bird; Richard Gerlach | 2006/08/01 |
A Bayesian network-based Simulation Environment for Investigating Assessment Issues in Intelligent Tutoring Systems | Liu, Chao-Lin; Wang, Yu-Ting; Liu, Yu-Chih | 2006-10-12T08:19:05Z |
A Better Form of Peer Review with the Integration of Critical Thinking Training in an EFL Writing Class—CMPR or OPPR? | Chi-An Tung; Shu-Ying Chang; Fang-May | 2011/06/01 |
A BINARY FOREST QUORUM STRATEGY FOR K-MUTUAL EXCLUSION IN DISTRIBUTED SYSTEMS | Chang, Ye-In; Chen, Bor-Hsu | 2006-10-16T06:13:45Z |
A BLOCK-BASED APPROACH TO SECURE ATM NETWORKING | Gamage, Chandana; Leiwo, Jussipekka; Zheng, Yuliang | 2006-10-20T02:11:33Z |
A Book Review of Gulliver’s Travels | 潘穎詩 | 2016-01-29T03:19:29Z |
A Book Review on the novel Persuasion by Jane Austen | Wang, Chia-Hung; 王家虹 | 2015-05-30T03:34:47Z |
A Boosted Wordline Voltage Generator for Embedded Low-Voltage Memories | Wang, Chua-Chin; Hsueh, Ya-Hsin; Kuo, Ting-Wan; Hu, Ron | 2006-10-16T01:34:54Z |
A Broadcast-VOD Protocol in an Integrated Wireless Mobile Network | Chen, Yuh-Shyan; Lin, Yuan-Chun | 2006-11-17T06:52:59Z |