Browsing by Author 沈肇基


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 34  next >
Issue DateTitleAuthor(s)Text
-Authenticated Key Exchange and Keyword Search Schemes and Their Applications to Cloud Storage Service李欽文; Chin-Wen Lee
-A breakthrough for robust blind image watermarking techniques based on features classification forest張家菘; Chia-Sung Chang
-Combined association rules for dealing with missing valuesShen, J.J.; 沈肇基; Chang, C.C.; Li, Y.C.-
-A data mining approach to database compressionLee, C.F.; 沈肇基; Changchien, S.W.; Wang, W.T.; Shen, J.J.-
-An Edge-based Light-weight Image Authentication Coding Scheme莊惠菁; Hui-Ching Chuang
-Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking TechniquesChang, Chia-Sung; 沈肇基; Shen, Jau-Ji
-Market Trading Volume Predict System: Case of Pomelo in Taiwan黃仁佑; Jen-Yu Huang
-P2P網路之可追蹤與公平交易的數位權管理機制林奕如; Lin, Yi-Ju-
-A Petri-Net based modeling approach to concurrent software engineering tasksShen, J.J.; 沈肇基; Changchien, S.W.; Lin, T.Y.-
-Recover the tampered image based on VQ indexingYang, C.W.; 沈肇基; Shen, J.J.-
-A robust associative watermarking technique based on similarity diagramsShen, J.J.; 沈肇基; Hsu, P.W.-
-A robust associative watermarking technique based on vector quantizationShen, J.J.; 沈肇基; Ren, J.M.-
-A secure LITESET schemeShen, J.J.; 沈肇基; Lin, I.C.; Hwang, M.S.; 林詠章-
-Security enhancement for the timestamp-based password authentication scheme using smart cardsShen, J.J.; 沈肇基; Lin, C.W.; Hwang, M.S.-
-A Study of Image Authentication Technique by Applying Fixed Point of Regular Stochastic Matrix on DCT劉耕孜; Ken-Tzu Liu
-XML文件概要搜尋機制之研究施美存; Shih, Mei-Tsun-
-一種植基於正規化隨機矩陣固定點的影像認證技術研究黃暐程; Haung, Wei-Cheng-
-區塊鏈技術應用於智能汽車之里程數與車況記錄李奇; Chi Li
-可逆資訊隱藏的提升法賴郁樺; Yu-Hua Lai
-在點對點網路架構中數位產權管理之研究江俊毅; Jiang, Jyun-Yi-