題名 | 作者 | 日期 |
Design and Implementation of a Secure File Synchronization and Backup System | Wang, Rix; Tseng, Frank S.C. | 2008-11-07T08:52:27Z |
Performance Evaluation of Neighborhood Signature Techniques | Li, Mei; Lee, Wang-Chien; Sivasubramaniam, Anand | 2008-11-10T07:32:38Z |
An Adaptive Distributed Document Access System | Lo, Win-Tsung; Sheu, Ruey-Kai; Chen, Lun-Chi | 2008-11-10T01:59:51Z |
Applying SCORM in Cooperative Learning | Chang, Wen-Chih | 2008-11-10T06:57:15Z |
Reversible Watermarking for Relational Database Authentication | Zhang, Yong; Yang, Bian; Niu, Xia-Mu | 2008-11-10T03:53:12Z |
Application Architecture of Semantic QA System | Wang, Ying-Hong; Liao, Cheng-Horng; Huang, Shih-Hao; Wang, Wen-Nan | 2008-11-10T07:05:02Z |
A Semantic-Aware Methodology Adapt to e-Learning Environment | Wang, Ying-Hong; Huang, Chu-Chi; Wang, Wen-Nan | 2008-11-10T07:10:53Z |
The Designs and Analyses of Improved Algorithms for the Counterfeit Coins Problem | Liu, Yao-Tsai; Lin, Shun-Shii | 2008-11-10T08:13:44Z |
Data Mining for Library Borrowing History Records | Tsai, Pauray S.M.; Zhuang, Wan-Ying | 2008-11-10T07:58:19Z |
Apply Semi-Fragile Watermarking to Authentication of Compressed Video Data | Wang, Da-Jinn; Chen, Tsong-Yi; Chen, Thou-Ho (Chao-Ho); Huang, Chien-Hua; Lee, Chung-Yih | 2008-11-10T03:49:58Z |