| Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
| 2010 | Cost-Effective Branch Prediction by Combining Hedging and Filtering | Yeong-Chang Maa ; Mao-Hsu Yen ; Shu-Ming Kuo; Guan-Luen Lee | | | | |
| 2017 | Cost-effectiveness of granulocyte colony-stimulating factor prophylaxis in chemotherapy-induced febrile neutropenia among breast cancer and Non-Hodgkin's lymphoma patients under Taiwan's national health insurance system | Wen, Tsun-Jen; Wen, Yu-Wen; Chien, Chun-Ru; Chiang, Shao-Chin; Hsu, William Wei-Yuan ; Shen, Li-Jiuan; Hsiao, Fei-Yuan | J EVAL CLIN PRACT | | 1 | |
| 2024/6/1 | Coupling Mobile Brain Imaging and Virtual Reality Omnidirectional Treadmill to Explore Attenuated Situational Awareness During Distracted Walking | Chuang, Chun-Hsiang; Chiu, Tsai-Feng; Hsu, Hao-Che; Lin, Shih-Syun | IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS | | | |
| 2024/1/21 | Critical analysis of the technological affordances, challenges and future directions of Generative AI in education: a systematic review | Wang, Nan; Wang, Xiao; Su, Yu-Sheng | ASIA PACIFIC JOURNAL OF EDUCATION | | | |
| 2018 | Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature Scheme | Han-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu | | | | |
| 2016 | Cryptanalysis and improvement of provable a data possession scheme in public cloud storage | Tung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang | | | | |
| 2003 | Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access Control | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao | | | | |
| 2024/4/9 | Cyber-physical metaverse learning in cultural sustainable education | Lai, Ying-Hsun; Lin, Yu-Shan; Chang, Yao-Chung; Chen, Shih-Yeh | LIBRARY HI TECH | | | |
| 2018 | DanceVibe: Assistive Dancing for the Hearing Impaired. | Chi-Ju Chao; Chun-Wei Huang; Chuan-Jie Lin ; Hao-Hua Chu; Polly Huang | | | 0 | |
| 1991 | Data Association in Multi-Target Tracking: A Solution using a Layered Boltzmann Machine | R.A. Iltis; Pei-Yih Ting | | | | |
| 1992 | Data Association Techniques for Bearings-Only Multi-Target Tracking using Simulated Annealing Implemented with Boltzmann Machines | Pei-Yih Ting | | | | |
| 2022 | Data Augmentation Based on Generative Adversarial Networks to Improve Stage Classification of Chronic Kidney Disease | Liao, Yun-Te; Lee, Chien-Hung; Chen, Kuo-Su; Chen, Chie-Pein; Pai, Tun-Wen | APPL SCI-BASEL | | 4 | |
| 2002 | Data Compression Method for Tetrahedral Meshes | Shyh-Kuang Ueng | | | | |
| 2016 | Data Gathering in Wireless Sensor Networks with Uncontrolled Sink Mobility. (IEEE VTC’16-Spring) | Chien-Fu Cheng ; Heng Lee | | | 0 | |
| 2016 | Data Gathering in Wireless Sensor Networks: A Combine–TSP–Reduce Approach | Chien-Fu Cheng ; Chao-Fu Yu | IEEE Transactions on Vehicular Technology | | 54 | |
| 2017 | Data gathering problem with the data importance consideration in Underwater Wireless Sensor Networks | Chien-Fu Cheng ; Lung-Hao Li | Journal of Network and Computer Applications | | 50 | |
| 2017 | Data Gathering With Minimum Number of Relay Packets in Wireless Sensor Networks | Chien-Fu Cheng ; Lung-Hao Li; Chen-Chuan Wang | IEEE Sensors Journal | | 10 | |
| 1999 | Data Insertion and Maintenance of Trademark Pictorial Query Management System | Yung-Lai Wu; Shyi-Chyi Cheng ; Ching-Long Lee; Chih-Shoung Huang | 電信雙月刊 | | | |
| 2015 | Data Protection for Computer Forensics Using Cryptographic Mechanisms | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 2014 | A Data Visualization Tool for Assisting in Finding Suspicious Network Flow Events | Chun-Chao Yeh ; Chin-Hong Chen | | | | |