Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2010 | A network-Based Simulation Architecture for Studying Epidemic Dynamics | Chung-Yuan Huang; Yu-Shiuan Tsai ; Tzai-Hung Wen | | | |
2019 | Networking for Educational Innovations: A Bibliometric Survey of International Publication Patterns | Tang, Kai-Yu; Hsiao, Chun-Hua; Su, Yu-Sheng | SUSTAINABILITY-BASEL | 4 | |
2020 | A Neural Network-based Multisensor Data Fusion Approach for Enabling Situational Awareness of Vehicles | Albert Budi Christian; Chih-Yu Lin ; Cheng-Wei Lee; Lan-Da Van; Yu-Chee Tseng | 2020 International Conference on Pervasive Artificial Intelligence (ICPAI),Taipei, Taiwan | 0 | |
2018 | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure | Han-Yu Lin | Ieee Access | | |
2009 | A new channel hopping MAC protocol for mobile ad hoc networks | Chih-Min Chao ; Hsien-Chen Tsai; Kuan-Ju Huang | | | |
2016 | A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman Problem | Han-Yu Lin | | | |
2015 | A New Direction for Solving the Consensus Problem in Networked Systems. (IEEE INFOCOM WKSHPS’15) | Chien-Fu Cheng | | 0 | |
2013 | New Efficient Identity-Based Key-Insulated Multisignature Scheme | Han-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh | | | |
1996 | A New Framework for Recognition of Mandarin Syllables with Tones Using Sub-Syllabic Units | C.-H. Lin; C.-H. Wu; Pei-Yih Ting ; H.-M. Wang | Speech Communication | 0 | |
2011 | New identity-based key-insulated convertible multi-authenticated encryption scheme | Hsu, C. L.; Han-Yu Lin | Journal of Network and Computer Applications | | |
2001 | A New Multi-Channel MAC Protocol with On-Demand Channel Assignment for Mobile Ad Hoc Networks | S.-L. Wu; Chih-Yu Lin ; Y.-C. Tseng; J.-P. Sheu | | | |
1988 | A New Preprocessor for Isolated Word Recognition System | E.-F. Huang; Pei-Yih Ting ; C.-J. Huang | | | |
1988 | New Speech Recognition Approaches Based Upon Finite State Vector Quantization with Structural Constraints | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | |
2019 | NICP: Node-RED-based and IoT-enabled Chatbot Platform | Shuo-Hung Tai; Shang-Pin Ma ; Jiun-Ting Lin; Wan-Lin You | | | |
2008 | Noisy image enhancement on smooth function spaces | Mong-Shu Lee | International Journal of Computer Mathematics | 1 | |
2013 | Non-Interactive Authenticated Key Agreement over the Mobile Communication Network | Wu, T. S.; Han-Yu Lin | Mobile Networks & Applications | | |
2008 | A Novel (t, n) Threshold Convertible Authenticated Encryption Scheme | Han-Yu Lin ; Yi-Shiung Yeh | | | |
2010 | A novel 3D mesh compression using mesh segmentation with multiple principal plane analysis | Shyi-Chyi Cheng ; Kuo, C. T.; Wu, D. C. | Pattern Recognition | | |
2009 | A Novel Broadcast Paradigm in Supporting Power-Saving Mobile Stations | Haw-Yun Shin ; Mao-Hsu Yen | | | |
2019 | A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions | Han-Yu Lin | Information Technology and Control | | |