公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2016 | Proactive Healthcare and an Early Warning Mechanism for Coronary Artery Disease Patients using Internet-of-Thing Devices | Shao-Jie Hsu; Shih-Syun Lin ; Tun-Wen Pai; Hamido Fujita | | 0 | |
2002 | The probability of local bond failure of continuous reinforced concrete beams | Lu, W. Y.; In-Jen Lin | Journal of the Chinese Institute of Engineers | | |
2016 | Process modeling and analysis of service-oriented architecture-based wireless sensor network applications using multiple-domain matrix | Lee, W. T.; Shang-Pin Ma | International Journal of Distributed Sensor Networks | | |
2012 | Process-Data-Widget: a REST-Based Software Framework for Building Mashup Applications | Shang-Pin Ma ; Chun-Ying Huang; Yong-Yi Fanjiang; Jong-Yih Kuo; Chien-Chang Chen | | | |
2012 | Processing XML Queries with Structural and Full-Text Constraints | Ya-Hui Chang ; Wu, C. Y.; Lo, C. C. | Journal of Information Science and Engineering | | |
2014 | Producing Flood Forecasting Messages Based on Landmarks | Ya-Hui Chang ; Y.T. Liu; W.C. Hung | | | |
2000 | Producing Interoperable Queries for Relational and Object-Oriented Databases | Ya-Hui Chang ; Louiqa Raschid | Journal of Intelligent Information Systems | 0 | |
2018 | A prototype design of a smart and portable coastal fisheries assistant system | Jing-Chun Luo; Hsin-Yu Tsai; Min-Hsuan Lu; Shin-Yu Wang; Wei-Hsiang Hung; William Wei-Yuan Hsu | | | |
2015 | A Provable Watermark-based Copyright Protection Scheme | Pei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin | | | |
2012 | Provably convertible multi-authenticated encryption scheme for generalized group communications | Lu, C. F.; Hsu, C. L.; Han-Yu Lin | Information Sciences | | |
2014 | Provably Secure Message Recovery Limited Verifier Signature Scheme with Low Cost | Chien-Lung Hsu; Han-Yu Lin | | | |
2014 | Provably secure proxy convertible authenticated encryption scheme based on RSA | Wu, T. S.; Han-Yu Lin | Information Sciences | | |
2014 | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Scientific World Journal | 3 | |
2013 | Provably secure revocable ID-based signature in the standard model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Security and Communication Networks | 26 | |
2013 | Providing Complete Rendezvous Guarantee for Cognitive Radio Networks by Quorum Systems and Latin Squares | Chih-Min Chao ; Hsiang-Yuan Fu | | | |
2018 | Provision and Consumption of Linked Open Data: A Define-Produce-Invoke Approach | Shang-Pin Ma ; Peng-Zhong Chen; Wen-Tin Lee; Zhi-Wei Lu | Service Oriented Computing and Applications | | |
2009 | A Proxy Multi-Signature Scheme with Anonymously Vetoable Delegation | Pei-Yih Ting ; Dream-Ming Huang; Xiao-Wei Huang | | | |
2014 | Psi-Series Method for Equality of Random Trees and Quadratic Convolution Recurrences | Hua-Huai Chern ; Fernandez-Camacho, M. I.; Hwang, H. K.; Martinez, C. | Random Structures & Algorithms | | |
2014 | A PSO-like Algorithm for Constrained Minimum Spanning Tree Problems | Chun-Chao Yeh ; Ying-Che Chien | | | |
2016 | The Public Transit Navigation System Combined with Real-Time Road Conditions and Carpooling Platform | Yeong-Chang Maa ; Mao-Hsu Yen ; Ying-Shin Lai | | | |