公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2019 | Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud Environments | Lin, Han-Yu | IEEE SYSTEMS JOURNAL | 4 | |
2020 | Traffic Congestion Level Prediction Based on Recurrent Neural Networks | Fei-Rong Huang; Cong-Xaiang Wang; Chih-Min Chao | | | |
2017 | Trail-based Routing Algorithms for WSNs with Uncontrolled Sink Mobility | Chien-Fu Cheng ; Sheng-Ling Lin; Chen-Chuan Wang; Heng Li | Computer Communications | 4 | |
2011 | Transactional Web Services Composition: A Genetic Algorithm Approach | Yong-Yi FanJiang; Yang Syu; Shang-Pin Ma ; Jong-Yih Kuo | International Conference on Software Engineering and Computer Systems | | |
1994 | Transforming queries from a relational schema to an equivalent object schema: a prototype based on F-logic | Ya-Hui Chang ; Louiqa Raschid; Louiqa Raschid | | | |
2001 | Transitional behaviors of the average cost of quicksort with median-of-(2t + 1) | Hua-Huai Chern ; H. -K. Hwang | Algorithmica | | |
2005 | Translating XQuery to SQL based on Query Forests | Ya-Hui Chang ; Greg Liu; Sue-Shain Wu | | | |
2003 | Transmission Gates design for Low Power adders | S.C. Yi; C. F. Hsieh; Mao-Hsu Yen | | | |
2022 | Transmission range determination and antenna deployment to recognise fitness actions using Wi-Fi signals | Wei-Che Liang; Chih-Min Chao ; Chih-Yu Lin ; Chun-Chao Yeh | International Journal of Ad Hoc and Ubiquitous Computing | 0 | |
2019 | Transportation Type Identification by using Machine Learning Algorithms with Cellular Information | Y.-H. Lin; J.-C. Chen; Chih-Yu Lin ; B.-Y. Su; P.-Y. Lee | | | |
2017 | A Tree-Based Approach to Support Query Translation for Schema Mappings with Weights | Chang, Ya-Hui ; Lee, Chia-Zhen; Zhuang, Si-Yen | Journal of Information Science and Engineering | 0 | |
2019 | Trends in regional cancer mortality in Taiwan 1992-2014 | Ho, Yu Rong; Ma, Shang-Pin ; Chang, Kuan Y. | CANCER EPIDEMIOL | 4 | |
2015 | Tuning of the hyperparameters for L2-loss SVMs with the RBF kernel by the maximum-margin principle and the jackknife technique | Chin-Chun Chang ; Shen-Huan Chou | Pattern Recognition | 13 | |
1996 | Two Probabilistic Methods for Candidate Selection in On-Line Chinese Character Recognition System | C.-C Tseng; S.-L Lay; B.-S Jeng; Pei-Yih Ting ; C.-H. Lee; K.-S. Chou | | | |
2022 | A Two-Mode Underwater Smart Sensor Object for Precision Aquaculture Based on AIoT Technology | Chang, Chin-Chun ; Ubina, Naomi A.; Cheng, Shyi-Chyi ; Lan, Hsun-Yu; Chen, Kuan-Chu; Huang, Chin-Chao | SENSORS | 3 | |
2014 | Ultrasound Image Enhancement Using Structure-Based Filtering | Shyh-Kuang Ueng ; Yen, C. L.; Chen, G. Z. | Computational and Mathematical Methods in Medicine | | |
2013 | UML-Based Service Component Discovery | Shang-Pin Ma ; Yao-Yu Tsai; Shin-Jie Lee | | | |
2019 | An Underwater Vehicle Simulator | Shyh-Kuang Ueng ; C. S. Chou; C. W. Chang | | | |
2008 | A Unified Block Interleaving/Deinterleaving Architecture for Wireless Communication Applications | Chu Yu; Mao-Hsu Yen ; Pao-Ann Hsiung; Sao-Jie Chen | | | |
2014 | Universal Forgery Attack on a Strong Designated Verifier Signature Scheme | Hsu, C. L.; Han-Yu Lin | International Arab Journal of Information Technology | | |