公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2006 | A Joint Code/Time Assignment Strategy with Minimal Fragmentations for CDMA Systems | Chih-Min Chao ; Shih-Han Wang | | | |
2015 | The k-Set Consensus Problem with Weight Consideration | Chien-Fu Cheng ; Hsien-Chun Liao | The Journal of Supercomputing | 2 | |
2014 | Keyword Search in Graph Databases Based on the ELCA Technique | Ya-Hui Chang ; Wei-Hsi Lee | | | |
2008 | Knowledge Verification | Eric Y. T. Juan ; Jeffrey J. P. Tsai; Du Zhang; Avinash Sahay | Wiley Encyclopedia of Computer Science and Engineering | | |
1999 | Knowledge Verification | E. Juan ; J. Tsai; D. Zhang; A. Sahay | Wiley Encyclopedia of Electrical and Electronics Engineering | | |
1999 | Knowledge-Based Software Architecture: Acquisition, Specification, and Verification | E. Juan ; A. Liu; J. Tsai; A. Sahay | IEEE Transactions on Knowledge and Data Engineering | | |
2019 | Kubernetes 服務在 SEAL2資料中心網路系統上的效能分析 | 李旻蒼; 潘德佳; 葉春超 | | | |
2017 | Landmark-based summarized messages for flood warning | Chang, Ya-Hui ; Liu, Yu-Te; Tan, Yi-Yuan | T GIS | 3 | |
2017 | Large-Scale Analysis of Antimicrobial Activities in Relation to Amphipathicity and Charge Reveals Novel Characterization of Antimicrobial Peptides | Wang, C. K.; Shih, L. Y.; Kuan Y. Chang | Molecules | 23 | |
2015 | A Large-Scale Structural Classification of Antimicrobial Peptides | Lee, H. T.; Lee, C. C.; Yang, J. R.; Lai, J. Z. C.; Kuan Y. Chang | Biomed Research International | | |
2016 | Latent semantic learning with time-series cross correlation analysis for video scene detection and classification | Shyi-Chyi Cheng ; Su, J. Y.; Hsiao, K. F.; Rashvand, H. F. | Multimedia Tools and Applications | | |
2019 | Layered manufacturing for medical imaging data | Shyh-Kuang Ueng ; Huang, H. C.; Chou, C. S.; Huang, H. K. | Advances in Mechanical Engineering | | |
1998 | The Leafage of a Chordal Graph | 林英仁 | | | |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | 0 | |
2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | |
2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | |
2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
2021 | A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism | Tsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-Hao | IEEE ACCESS | 3 | |
2020 | Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server | Yuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai | | | |