| 臺大學術典藏 |
2018-09-10T09:24:54Z |
一種定位資訊之情境影像系統
|
趙涵捷;郭斯彥;顏嗣均;紀廷運; 趙涵捷; 郭斯彥; 顏嗣均; 紀廷運; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:54Z |
影像的傳輸中的高品質且省時間的錯誤隱藏技術
|
郭斯彥;黃士嘉; 郭斯彥; 黃士嘉; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:54Z |
Seamless wireless video transmission for multimedia applications
|
Shih-Chia Huang;Sy-Yen Kuo; Shih-Chia Huang; Sy-Yen Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:54Z |
Low Power Video Compression Chipset for Portable Application
|
Shih-Chia Huang;Sy-Yen Kuo; Shih-Chia Huang; Sy-Yen Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:54Z |
A Self-Configurable Power Control Algorithm for Cognitive Radio-based Industrial Wireless Sensor Networks with Interference Constraints
|
T. Zheng;Y. Qin.;H. Zhang;S. Y. Kuo; T. Zheng; Y. Qin.; H. Zhang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Holography: A Behavior-based Profiler for Malware Analysis
|
Y. Dai;Y. Fyodor;M. W. Wu;Y. Huang;S. Y. Kuo; Y. Dai; Y. Fyodor; M. W. Wu; Y. Huang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Obstacle-Avoiding Rectilinear Steiner Tree Construction: A Steiner-Point Based Algorithm
|
C. H. Liu; S. Y. Kuo; D. T. Lee; C. S. Lin; J. H. Weng; S. Y. Yuan; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Bi-Space Shift Keying Modulation for MIMO Systems
|
H. W. Liang;R. Y. Chang;W. H. Chung;H. Zhang,;S. Y. Kuo; H. W. Liang; R. Y. Chang; W. H. Chung; H. Zhang,; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems
|
C. M. Yu; S. H. Hsieh; H. W. Liang; C. H. Lu; W. H. Chung; S. Y. Kuo; S. C. Pei; SY-YEN KUO; C. M. Yu;S. H. Hsieh;H. W. Liang;C. H. Lu;W. H. Chung;S. Y. Kuo;S. C. Pei |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
|
C. M. Yu;C. S. Lu;S. Y. Kuo; C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Quantum Blind Computation with Teleportation-based Computation
|
N. H. Chia; C. H. Chien.; W. H. Chung; S. Y. Kuo; SY-YEN KUO; N. H. Chia;C. H. Chien.;W. H. Chung;S. Y. Kuo |
| 臺大學術典藏 |
2018-09-10T09:24:53Z |
Throughput Improvement of Multi-hop Wireless Mesh Networks with Cooperative Opportunistic Routing
|
Y. S. Liang;W. H. Chung.;H. Zhang;S. Y. Kuo; Y. S. Liang; W. H. Chung.; H. Zhang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:47:27Z |
Constraint Generation for Software-Based Post-Silicon Bug Repair with Scalable Resynthesis Technique for Constraint Optimization
|
Chia-Wei Chang; Hong-Zu Chou; Kai-Hui Chang; Jie-Hong R. Jiang; Chien-Nan Liu; Sy-Yen Kuo; JIE-HONG JIANG |
| 臺大學術典藏 |
2018-09-10T08:46:25Z |
Monitor device, monitoring method and computer product thereof for hardware for monitoring a process to detect malware
|
Sy-Yen Kuo; SY-YEN KUO; Chia-Hsiang Chang; Yennun Huang; Chih-Hung Lin; Shih-Yao Dai |
| 臺大學術典藏 |
2018-09-10T08:46:24Z |
Reversible Quantum Circuits and Quantum Transmission Integrity
|
T. S. Lin; C. H. Chien; T. H. Chang; S. Y. Yuan; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:24Z |
Interference Mitigation through Self-Organization in OFDMA Femtocells
|
Y. S. Liang;W. H. Chung;H. Zhang;S. Y. Kuo; Y. S. Liang; W. H. Chung; H. Zhang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:24Z |
Applying Verification Intention for Design Customization via Property Mining under Constrained Testbenches
|
C. N. Chung; C. W. Chang; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:24Z |
Quantum Signature Scheme for Vehicular Networks Using Entangled States
|
T. S. Lin; C. H. Chien; T. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:24Z |
Quantum Circuits and Quantum Message Integrity
|
T. S. Lin; C. H. Chien; T. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:23Z |
Formal Reset Recovery Slack Calculation at the Register Transfer Level
|
C. N. Chung; C. W. Chang; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:23Z |
Order-Based Localization Scheme for Ad Hoc Sensor Networks
|
Y. H. Chen; W. H. Chung; S. Y. Yuan; H. Zhang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:23Z |
Building Biologically Inspired Defenses Against Malicious Software
|
F. V. Yarochkin; S. Y. Dai; Y. Huang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:23Z |
An Efficient Notification Service Algorithm for Early Earthquake Alert
|
T. Y. Chi; T. W. Liu; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:23Z |
Quantum Authentication Protocol Using Entanglement Swapping
|
C. H. Chien; T. S. Lin; T. H. Chang; S. Y. Yuan; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
An Application-Driven Attack Probability-Based Deterministic Pairwise Key Pre-distribution Scheme for Non-Uniformly Deployed Sensor Networks
|
C. M. Yu; C. C. Li; C. S. Lu; D. T. Lee; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
On the convergence condition and convergence time of BGP
|
H. Gou; W. Su; H. Zhang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
Constrained Function Based Message Authentication for Sensor Networks
|
SY-YEN KUO; S. Y. Kuo; Y. D. Tsou; C. S. Lu; C. M. Yu |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks
|
C. M. Yu;Y. T. Tsou;C. S. Lu;S. Y. Kuo; C. M. Yu; Y. T. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
An Extended XQDD Representation for Multiple-Valued Quantum Logic
|
C. Y. Lu; S. A. Wang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:46:22Z |
Facilitating Unreachable Code Diagnosis and Debugging
|
H. Z. Chou; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:13Z |
Quantum Switching and Quantum String Matching
|
T. S. Lin;S. Y. Kuo; T. S. Lin; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:13Z |
Quantum Transmission Mechanism for Detection
|
T. S. Lin;C. H. Chien;S. Y. Kuo; T. S. Lin; C. H. Chien; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:13Z |
Quantum Indirect Shared Key Protocol
|
T. S. Lin;C. H. Chien;S. Y. Kuo; T. S. Lin; C. H. Chien; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:13Z |
Probabilistic Evaluations of Event-Tree and Fault-Tree in Safety-Critical Systems
|
C. S. Cho;S. C. Dai;W. H. Chung;S. Y. Kuo; C. S. Cho; S. C. Dai; W. H. Chung; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:13Z |
System and Method for Securing Web Application Code and Verifying Correctness of Software
|
Yao-Wen Huang;Fan Yi;Chung-Hung Tsai;Christian Hang;Der-Tsai Lee;Sy-Yen Kuo; Yao-Wen Huang; Fan Yi; Chung-Hung Tsai; Christian Hang; Der-Tsai Lee; Sy-Yen Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:12Z |
Finding Reset Nondeterminism in RTL Designs–Scalable X-Analysis Methodology and Case Study
|
H. Z. Chou;H. Yu;K. H. Chang;D. Dobbyn;S. Y. Kuo; H. Z. Chou; H. Yu; K. H. Chang; D. Dobbyn; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:12Z |
Automatic Constraint Generation for Software-Based Post-Silicon Bug Repair
|
H. Z. Chou;K. H. Chang;S. Y. Kuo; H. Z. Chou; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:12Z |
Automating Unreachable Code Diagnosis and Debugging
|
H. Z. Chou;K. H. Chang;S. Y. Kuo; H. Z. Chou; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:12Z |
Quantum Encrypted Computation Using Quantum Private Queries
|
N. H. Chia;C. H. Chien;S. Y. Kuo; N. H. Chia; C. H. Chien; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Accurately Handle Don’t-Care Conditions in High-Level Designs and Application for Reducing Initialized Registers
|
H. Z. Chou;K. H. Chang;S. Y. Kuo; H. Z. Chou; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Acquiring Authentic Data in Unattended Wireless Sensor Networks
|
C. M. Yu;C. Y. Chen 3;C. S. Lu;S. Y. Kuo;H. C. Chao; C. M. Yu; C. Y. Chen 3; C. S. Lu; S. Y. Kuo; H. C. Chao; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Non-Interactive Pairwise Key Establishment for Sensor Networks
|
C. M. Yu;C. S. Lu;S. Y. Kuo; C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Quantum Secure Direct Communication With Constant Number of EPR Pairs
|
C. Y. Lu;S. A. Wang;Y. J. Cheng;S. Y. Kuo; C. Y. Lu; S. A. Wang; Y. J. Cheng; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Optimizing Blocks in an SoC Using Symbolic Code-Statement Reachability Analysis
|
H. Z. Chou;K. H. Chang;S. Y. Kuo; H. Z. Chou; K. H. Chang; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:11Z |
Android/OSGi-based Vehicular Network Management System
|
T. W Chang;J. L Chen;M. C Chen;S. Y. Kuo; T. W Chang; J. L Chen; M. C Chen; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:18:10Z |
Effective Design-for-Testability Techniques for H.264 All-Binary Integer Motion Estimation
|
P. Y. Yeh;B. Y. Ye;S. Y. Kuo; P. Y. Yeh; B. Y. Ye; S. Y. Kuo; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T08:12:12Z |
iCon: Utilizing everyday objects as additional, auxiliary and instant tabletop controllers
|
Cheng, K.-Y.;Liang, R.-H.;Chen, B.-Y.;Laing, R.-H.;Kuo, S.-Y.; Cheng, K.-Y.; Liang, R.-H.; Chen, B.-Y.; Laing, R.-H.; Kuo, S.-Y.; SY-YEN KUO; BING-YU CHEN |
| 臺大學術典藏 |
2018-09-10T07:41:52Z |
延遲線及其應用之類比數位轉換裝置與負載感測電路
|
陳科宏;黃立仁;黃宏瑋;郭斯彥; 陳科宏; 黃立仁; 黃宏瑋; 郭斯彥; SY-YEN KUO |
| 臺大學術典藏 |
2018-09-10T07:41:52Z |
直流轉直流穩壓器以及誤差放大器
|
陳科宏; 黃立仁; 黃宏瑋; 郭斯彥; SY-YEN KUO; 陳科宏; 黃立仁; 黃宏瑋; 郭斯彥 |
| 臺大學術典藏 |
2018-09-10T07:41:51Z |
Quantum signature mechanism with GHZ states
|
T. S. Lin;C. C. Lee;S. Y. Kuo; T. S. Lin; C. C. Lee; S. Y. Kuo; SY-YEN KUO |