題名 | 作者 | 日期 |
An Object Space Approach for Outermost Silhouettes Extraction | Lee, Ren-Long; Tai, Wen-Kai | 2006-10-23T15:33:21Z |
Software Variant Managements Based On Architectural Introduction | Wu, I-Mei; Zheng, Shouqi | 2006-10-16T01:54:40Z |
Reaching Real Agreement in an Unknown Network Environment | Yan, K.Q.; Wang, S.C.; Chiang, M.L. | 2006-10-16T03:40:50Z |
FUSION OF DEFOCUSED IMAGES USING TRANSFORMS WITH SEGMENTATION | Liou, Ren-Jean; Hsu, Wen-Hou; Chen, Mu-Song | 2006-10-24 |
The Design of Multi-Tier Internet Computer Assisted Instruction System Constructed by the Serial Communication Technology Theory and Practice | Kao, Fu-Chien | 2006-10-16T03:52:19Z |
A hybird method for automatically tagging Chinese sentences | Chang, Tao-Hsing; Lee, Chia-Hoang | 2006-10-24T01:14:27Z |
Pinned Demand Paging Based on the Access Frequency of Video Files in Video Servers | Huang, Yin-Fu; Ho, Hung-Ming | 2006-10-24 |
An Iterative Integer Linear Programming Method for Bounding Program Performance on Embedded Systems | Huang, Tai-Yi; Huang, Kuang-Li; Chung, Yeh-ching | 2006-10-13T08:36:59Z |
THPTB: A SMP-based PC Cluster with Channel Bonding for High-Performance Computing | Yang, Chao-Tung; Chang, Yao-Chung | 2006-10-16T01:50:36Z |
Acquisition for W-CDMA RAKE Receiver System | Shih, Ing-Heng; Chen, Sheng-Jie | 2006-10-16T01:34:16Z |
A Note on Neighbor Finding in Images Reoresented by Quadtrees | Chang, Ye-In; Chen, HueLing | 2006-10-16T03:30:18Z |
A New Normal Walk Model for Cellular Networks | Tuan, Chiu-Ching; Yang, Chen-Chau | 2006-10-16T02:06:54Z |
A Novel Non-Hierarchical Cache Only Memory Architecture | Chang, Yeim-kuan | 2006-10-16T01:50:56Z |
An Efficient Anonymous Buyer-Seller Watermarking Protocol | Lei, Chin-Laung; Chan, Ming-Hwa | 2006-10-16T01:42:53Z |
Assessing Check Credit With Skewed Data: A Knowledge Discovery Case Study | Hung, Chun-Min; Huang, Yueh-Min; Chen, Tse-Sheng | 2006-10-24 |
Fast Fractal Image Encoding | Wang, Yi-Chun; Chen, Shu-Yuan | 2006-10-24 |
A Web-based Distance PLC Laboratory | Wu, Yu-Chi; Chang, Wei-Fu; Chiu, Chui-Wen; Yu, Wen-Ching | 2006-10-24 |
A Secure Authentication System for Distributed Computing Environment Based on PKI Biometric Verification and Kerberos | Yen, Chih-Chen; Hsu, Wen-Hsing | 2006-10-16T04:00:22Z |
An Integer Linear Programming Algorithm for Crosstalk-Constrained River Routing | - | 2006-10-16T03:21:52Z |
An Effective Approach to Compiler Construction Based on Attribute Grammars and Reusable Components | Yau, S.; Wu, Pei-Chi; Yang, Ji-Tzay; Wang, Feng-Jian | 2006-10-16T03:30:35Z |