Showing results 4 to 23 of 29
< previous
next >
Issue Date | Title | Author(s) | Text |
- | A BST-based robust image hiding method | Ho, Y.A.; 蔡垂雄; Chan, Y.K.; Tsai, C.S.; Chu, Y.P.; 詹永寬 | - |
- | Edge enhancement nucleus and cytoplast contour detector of cervical smear images | Yang-Mao, S.F.; 詹永寬; Chan, Y.K.; Chu, Y.P. | - |
- | AN EFFICIENT SENSOR-TO-SENSOR AUTHENTICATED PATH-KEY ESTABLISHMENT SCHEME FOR SECURE COMMUNICATIONS IN WIRELESS SENSOR NETWORKS | Li, C.T.; 黃明祥; Hwang, M.S.; Chu, Y.P. | - |
- | Enhancement of fairness in a DiffServ network using a novel queuing algorithm | Huang, Y.H.; 林冠成; Lin, K.C.; Kuo, C.Y.; Chen, C.H.; Chu, Y.P. | - |
- | Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments | Li, C.T.; 黃明祥; Hwang, M.S.; Chu, Y.P. | - |
- | A generic application sharing architecture based on message-oriented middleware platform | Lu, H.C.; Chu, Y.P.; Sheu, R.K.; Lo, W.T. | - |
- | A HDWT-based reversible data hiding method | Chan, Y.K.; 蔡垂雄; Chen, W.T.; Yu, S.S.; Ho, Y.A.; Tsai, C.S.; Chu, Y.P.; 喻石生 ; 詹永寬 | - |
- | A high capacity reversible data hiding scheme with edge prediction and difference expansion | Wu, H.C.; 蔡垂雄; Lee, C.C.; Tsai, C.S.; Chu, Y.P.; Chen, H.R. | - |
- | High-capacity reversible data hiding in binary images using pattern substitution | Ho, Y.A.; 詹永寬; Chan, Y.K.; Wu, H.C.; Chu, Y.P. | - |
- | Identification of mouse mslp2 gene from EST databases by repeated searching, comparison, and assembling | Chan, W.L.; 詹永寬; Chang, J.G.; Chen, Y.F.; Chan, Y.K.; Chu, Y.P. | - |
- | Improvement of authenticated encryption schemes with message linkages for message flows | Hwang, M.S.; Lo, J.W.; Hsiao, S.Y.; Chu, Y.P. | - |
- | Improving fairness in DiffServ networks using adaptive aggregate markers | Lin, K.C.; 林冠成; Huang, Y.H.; Tsai, C.S.; Chen, C.H.; Chu, Y.P. | - |
- | Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks | Hwang, M.S.; Li, C.T.; Chu, Y.P. | - |
- | Local allocation of end-to-end delay requirement | Chu, Y.P.; 林冠成; Hwang, E.H.; Lin, K.C.; Chen, C.H. | - |
- | A minute lossy method for 2D-gel images compression | Chan, Y.K.; 詹永寬; Liau, D.L.; Chen, Y.F.; Wu, H.C.; Chu, Y.P. | - |
- | A multiple-level visual secret-sharing scheme without image size expansion | Chen, Y.F.; 蔡孟勳; Chan, Y.K.; Huang, C.C.; Tsai, M.H.; Chu, Y.P.; 詹永寬 | - |
- | New data hiding scheme using pixel swapping for halftone images | Chang, Y.F.; 蔡垂雄; Feng, J.B.; Tsai, C.S.; Chu, Y.P.; Syu, H.C. | - |
- | A new multi-secret images sharing scheme using Largrange's interpolation | Feng, J.B.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chu, Y.P. | - |
- | New steganographic method of pixel value differencing | Lu, H.C.; Chu, Y.P.; Hwang, M.S. | - |
- | Optimal admission control based on per-switch delay allocation for networks with a bounded delay service | Chu, Y.P.; 林冠成; Lin, K.C. | - |