|
???tair.name??? >
???browser.page.title.author???
|
"lei c l"???jsp.browse.items-by-author.description???
Showing items 56-79 of 79 (4 Page(s) Totally) << < 1 2 3 4 > >> View [10|25|50] records per page
國立臺灣大學 |
1995 |
A Scalable Adaptive Load Balancing Algorithm for Distributed Computer Systems
|
Lei, C. L.; Sun, Y. C. |
國立臺灣大學 |
1995 |
Research on Database, Network and Image Processing in Medical Applications
|
Lei, C. L. |
國立臺灣大學 |
1995 |
Synchronization and Consistency in Distributed Shared Memory with Applications
|
Lei, C. L. |
國立臺灣大學 |
1995 |
Password Authentication Using a Unit Circle Encryption
|
Lei, C. L.; Liaw, H. T. |
國立臺灣大學 |
1994-12 |
A Collision Free Secret Ballot Protocol for Computerized General Elections
|
Juang, W. S.; Lei, C. L.; Fan, C. I. |
國立臺灣大學 |
1994-12 |
The Formalization and Hierarchy of Memory Consistency Models
|
Lai, I. C.; Lei, C. L. |
國立臺灣大學 |
1994 |
Cryptanalysis of an Intractable Trapdoor One-Way Function Based on Quadratic Residue
|
Fan, C. I.; Lei, C. L.; Juang, W. S. |
國立臺灣大學 |
1993-12 |
A Dynamic Cryptographic Key Assignment Scheme in a Tree Structure for Access Control
|
Tsai, H. M.; Kuo, S. Y.; Lei, C. L.; Chang, C. C. |
國立臺灣大學 |
1993-12 |
A New Consistency Protocol for Distributed Shared Memory
|
Lai, I. C.; Lei, C. L. |
國立臺灣大學 |
1993-05 |
A Secure Broadcasting Mechanism in Distributed Systems
|
Liaw, H. T.; Lei, C. L. |
國立臺灣大學 |
1993 |
A dynamic cryptographic key assignment scheme in a tree structure
|
Liaw, H. T.; Wang, S. J.; Lei, C. L. |
國立臺灣大學 |
1993 |
A Secure User Hierarchy Scheme Based on Knapsack Problem
|
Liaw, H. T.; Wang, S. J.; Lei, C. L. |
國立臺灣大學 |
1993 |
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control
|
Liaw, H. T.; Lei, C. L. |
國立臺灣大學 |
1993 |
Efficient Parallel Algorithms for Finding the Majority Element
|
Lei, C. L.; Liaw, H. T. |
國立臺灣大學 |
1992 |
Two Efficient Algorithms for Finding the Majority Element
|
Liaw, H. T.; Lei, C. L. |
國立臺灣大學 |
1989 |
An Interval Logic for Reasoning about Timing Properties of Computer Communication Protocols
|
Shen, M.; Lei, C. L.; Chang, C. C. |
國立臺灣大學 |
1987 |
Modalities For Model Checking: Branching Time Strikes Back
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1986 |
Model Checking in the Propositional Mu-Calculus
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1986 |
Efficient Model Checking in Fragments of the Propositional Mu-Calculus
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1986 |
Temporal Reasoning under Generalized Fairness Constraints
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1985 |
Branching Time Logic Strikes Back
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1985 |
Modalities For Model Checking: Branching Time Strikes Back
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1985 |
Temporal Model Checking under Generalized Fairness Constraints
|
Emerson, E. A.; Lei, C. L. |
國立臺灣大學 |
1984 |
Model Checking under Generalized Fairness Constraintx
|
Emerson, E. A.; Lei, C. L. |
Showing items 56-79 of 79 (4 Page(s) Totally) << < 1 2 3 4 > >> View [10|25|50] records per page
|