公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2020 | Twin Fat-Tree 資料中心網路效能分析 | 連偉盛; 林彥亭; 葉春超 | | | |
1996 | Two Probabilistic Methods for Candidate Selection in On-Line Chinese Character Recognition System | C.-C Tseng; S.-L Lay; B.-S Jeng; Pei-Yih Ting ; C.-H. Lee; K.-S. Chou | | | |
2022 | A Two-Mode Underwater Smart Sensor Object for Precision Aquaculture Based on AIoT Technology | Chang, Chin-Chun ; Ubina, Naomi A.; Cheng, Shyi-Chyi ; Lan, Hsun-Yu; Chen, Kuan-Chu; Huang, Chin-Chao | SENSORS | 3 | |
2016 | Two-Stage Iterated Local Search for Solving Capacitated Vehicle Routing Problems | Chun-Chao Yeh ; Da-Yuan Liu; Yan-Kai Liao | | | |
2014 | Ultrasound Image Enhancement Using Structure-Based Filtering | Shyh-Kuang Ueng ; Yen, C. L.; Chen, G. Z. | Computational and Mathematical Methods in Medicine | | |
2013 | UML-Based Service Component Discovery | Shang-Pin Ma ; Yao-Yu Tsai; Shin-Jie Lee | | | |
2019 | An Underwater Vehicle Simulator | Shyh-Kuang Ueng ; C. S. Chou; C. W. Chang | | | |
2008 | A Unified Block Interleaving/Deinterleaving Architecture for Wireless Communication Applications | Chu Yu; Mao-Hsu Yen ; Pao-Ann Hsiung; Sao-Jie Chen | | | |
2014 | Universal Forgery Attack on a Strong Designated Verifier Signature Scheme | Hsu, C. L.; Han-Yu Lin | International Arab Journal of Information Technology | | |
2005 | University timetabling through conceptual modeling | Lee, J.; Shang-Pin Ma ; Lai, L. F.; Hsueh, N. L.; Fanjiang, Y. Y. | International Journal of Intelligent Systems | | |
2015 | Unsupervised Object Modeling and Segmentation with Symmetry Detection for Human Activity Recognition | Su, J. Y.; Shyi-Chyi Cheng ; Huang, D. K. | Symmetry-Basel | | |
2019 | Using BERT to Process Chinese Ellipsis and Coreference in Clinic Dialogues | Chuan-Jie Lin ; Chao-Hsiang Huang; Chia-Hao Wu | | | |
2017 | Using Information Retrieval to Construct an Intelligent e-book with Keyword Concept Map | Lai, Chin-Feng; Chen, Shih-Yeh ; Tsai, Chun-Wei; Chang, Yao-Chung; Su, Yu-Sheng | Eurasia Journal of Mathematics, Science & Technology Education (SSCI) | 1 | |
2011 | Using one-time passwords to prevent password phishing attacks | Huang, C. Y.; Shang-Pin Ma ; Chen, K. T. | Journal of Network and Computer Applications | | |
2018 | Using Service Dependency Graph to Analyze and Test Microservices | Shang-Pin Ma ; Chen-Yuan Fan; Yen Chuang; Wen-Tin Lee; Shin-Jie Lee; Nien-Lin Hsueh | 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) | | |
2014 | Using Wi-Fi Direct to Assist Real-Time Traffic Conditions Delivery | Yeong-Chang Maa ; Mao-Hsu Yen ; Yi-Chin Li; Ying-Shin La | | | |
2016 | Using Wikipedia and Semantic Resources to Find Answer Types and Appropriate Answer Candidate Sets in Question Answering | Po-Chun Chen; Meng-Jie Zhuang; Chuan-Jie Lin | | | |
2008 | Utilization of principle axis analysis for fast nearest neighbor searches in high-dimensional image databases | Wu, T. L.; Shyi-Chyi Cheng | Journal of Information Science and Engineering | | |
2008 | Vague Location Tracking in Wireless Sensor Networks | 林致宇 | | | |
2014 | Valuating Interest Sensitive Annuities and Life Insurances under the FinancialCloud Architecture | William Wei-Yuan Hsu ; Yi-Wen Wu; Jan-Ming Ho | | | |