研究成果

第 1 到 15 筆結果,共 15 筆。

公開日期標題作者全文
1-A capacity-enhanced reversible data hiding scheme based on SMVQChiou, S.F.; 廖宜恩 ; Liao, I.E.; Hwang, M.S.-
2-Detecting rogue access points using client-side bottleneck bandwidth analysisKao, K.F.; 廖宜恩 ; Liao, I.E. ; Li, Y.C.-
3-An efficient authentication protocol for mobile communicationsLee, C.C.; 廖宜恩 ; Liao, I.E.; Hwang, M.S.-
4-An Efficient Initialization Scheme for SOM Algorithm Based on Reference Point and FiltersShieh, S.L.; 廖宜恩 ; Liao, I.E.; Hwang, K.F.; Chen, H.Y.-
5-Enhancing the accuracy of WLAN-based location determination systems using predicted orientation informationLiao, I.E.; 廖宜恩 ; Kao, K.F.-
6-AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKSLee, C.C.; 黃明祥; Liao, I.E.; Hwang, M.S.; 廖宜恩 -
7-An index selection method without repeated optimizer estimationsKao, K.F.; 廖宜恩 ; Liao, I.E.-
8-A library recommender system based on a personal ontology model and collaborative filtering technique for English collectionsLiao, I.E.; 廖宜恩 ; Hsu, W.C.; Cheng, M.S.; Chen, L.P.-
9-MINING HYBRID SEQUENTIAL PATTERNS BY HIERARCHICAL MINING TECHNIQUEKuen-Fang Jea ; 賈坤芳 ; Lin, K.C.; Liao, I.E. ; 廖宜恩 -
10-A new authentication protocol based on pointer forwarding for mobile communicationsLee, C.C.; 廖宜恩 ; Hwang, M.S.; Liao, I.E.-
11-A New Clustering Validity Index for Cluster Analysis Based on a Two-Level SOMShieh, S.L.; 廖宜恩 ; Liao, I.E.-
12-A password authentication scheme over insecure networksLiao, I.E.; 廖宜恩 ; Lee, C.C.; Hwang, M.S.-
13-PORE: a personal ontology recommender system for digital librariesLiao, S.C.; 廖宜恩 ; Kao, K.F.; Liao, I.E.; Chen, H.L.; Huang, S.O.-
14-A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTSHuang, J.Y.; 廖宜恩 ; Chung, Y.F.; Chen, T.S.; Liao, I.E.-
15-Security enhancement on a new authentication scheme with anonymity for wireless environmentsLee, C.C.; 廖宜恩 ; Hwang, M.S.; Liao, I.E.-