公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2014 | Object-Coherence Warping for Stereoscopic Image Retargeting | Shih-Syun Lin ; Chao-Hung Lin; Shu-Huai Chang; Tong-Yee Lee | Ieee Transactions on Circuits and Systems for Video Technology | 31 | |
1997 | An Object-Oriented Approach to Modeling and Querying in Multimedia Information Systems | Ya-Hui Chang ; Jia-Ling Koh; Arbee Chen | | | |
1996 | Object-oriented programming of adaptive finite element and finite volume methods | Liu, J. L.; In-Jen Lin ; Shih, M. Z.; Chen, R. C.; Hsieh, M. C. | Applied Numerical Mathematics | | |
2010 | Observe Internet Peer-to-Peer Activities at Home | Chun-Ying Huang; Shang-Pin Ma ; Ching-Hong Wu; Chi-Ming Chen; Chih-Hung Lin | | | |
2013 | Obtaining Consistent Good/Bad Plan Set in the Presence of Faults. (IEEE WCNC’13) | Chien-Fu Cheng | | 0 | |
2018 | On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme | Han-Yu Lin ; Chia-Hung Wu; Yan-Ru Jiang | | | |
1999 | On k-ary spanning trees of tournaments | Lu, X. Y.; Wang, D. W.; Chang, G. J.; In-Jen Lin ; Wong, C. K. | Journal of Graph Theory | | |
2014 | On Local Cache Management Strategies for Mobile Augmented Reality | C.-C. Wu; L.-P. Tung; Chih-Yu Lin ; B.-S. Lin; Y.-C. Tseng | | | |
1995 | On Speeding Radical-Based On-Line Chinese Character Recognition Through Radical Extraction | S.R. Lay; M.L. Day; N.J. Cheng; S.Y. Hung; B.S. Jeng; Pei-Yih Ting ; C.C. Tseng; C.H. Shih | | | |
2013 | On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message Linkages | Tzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting | | | |
1994 | On the Distortion Measurement of On-Line Signature Verification | Q.-Z. Wu; I.-C. Jou; B.-S. Jeng; N.-J. Cheng; S.-S. Huang; Pei-Yih Ting ; D.-M. Shieh; C.-J. Wen | | | |
1994 | On the Maximum and Minimum of Some Functionals for the Eigenvalue Problem of Sturm-Liouville Type | Hua-Huai Chern ; Shen C.L. | Journal of Differential Equations | 0 | |
1997 | On the n-dimensional Ambarzumyan's theorem | Hua-Huai Chern ; Shen, Chao-Liang | Inverse Problems | 36 | |
1993 | On the Prediction of Prosodics for Mandarin Chinese Text-to-Speech System | W.-H. Lai; Pei-Yih Ting | | | |
2003 | On the Public Verifiability of an M+1-st Price Auction Using Homomorphic Encryption | Pei-Yih Ting ; Yu-Tsung Lee; Ching-Yi Chen | | | |
2013 | On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems | Han-Yu Lin | Journal of Medical Systems | | |
2017 | On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings | Han-Yu Lin ; Pei-Yih Ting ; Leo-Fan Yang | ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering | | |
2012 | On the Variants of Tagged Geometric History Length Branch Predictors | Yeong-Chang Maa ; Mao-Hsu Yen | | | |
1994 | The On-Line Automatic Signature Verification System | Chi-Jain Wen; Pei-Yih Ting ; Su-Shun Huang; Bor-Yuan Tseng; Bor-Shenn Jeng | Images & Recognition | | |
1996 | On-line Chinese character recognition with effective candidate radical and candidate character selections | Lay, S. R.; Lee, C. H.; Cheng, N. J.; Tseng, C. C.; Jeng, B. S.; Pei-Yih Ting ; Wu, Q. Z.; Day, M. L. | Pattern Recognition | | |