|
"yang c n"的相關文件
顯示項目 96-120 / 166 (共7頁) << < 1 2 3 4 5 6 7 > >> 每頁顯示[10|25|50]項目
| 國立東華大學 |
2007-07 |
Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection
|
Yang,C.N.; Chen,G.J.; Lukac,R.; Chen,T.S. |
| 國立東華大學 |
2007-07 |
Authorized Tracking and Tracing for RFID Tags
|
Yang,C.N.; Laih,C.S.; Chen,M.Y. |
| 國立東華大學 |
2007-07 |
Improvements of image sharing with steganography and authentication
|
Yang,C.N.; Chen,T.S.; Wang,C.C.; Yu,K.H. |
| 國立東華大學 |
2007-07 |
An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-06 |
User-Friendly Image Sharing Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007-06 |
Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels
|
Yang,C.N.; Peng, A.G.; Chen,T.S. |
| 國立東華大學 |
2007-03 |
Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials
|
Yang,C.N.; Zhou,F.R.; Lu,J.R.; Zheng, T.; Chen,T.S. |
| 國立東華大學 |
2007-01 |
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007 |
Applying RFID Technology in Warranty Service Information System
|
Yang,C.N.; Chen,M.Y.; Laih,C.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting process from deformed growth strata
|
Lin, M. L.; Wang, C.P.; Yang, C.N.; Chen, W.S.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, M.L.; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 臺大學術典藏 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Chen, W.S.; Yang, C.N.; Jeng, F.S.; Lin, Ming-Lang; Wang, C.P.; Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立東華大學 |
2006-11 |
Certificate Services for Cellular Phone Emulator Based on JAVA Card
|
Yang,C.N.; Chen,T.S.; Peng, A.G. |
| 國立東華大學 |
2006-11 |
Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique
|
Yang,C.N.; Chen,T.S.; Lin,Y.C.; Yu,Y.F.; Chen,Y.F.; Chiu,C.Y.; Lee,U.F. |
| 國立東華大學 |
2006-09 |
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image via Different Pixel Expansions
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006-08 |
Authorized Tracking and Tracing for RFID Tags
|
Yang,C.N.; Chen,M.Y.; Laih,C.S. |
| 國立東華大學 |
2006-07 |
Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables
|
Yang,C.N.; Lee,D.J. |
| 國立東華大學 |
2006-07 |
Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006-06 |
Real Perfect Contrast Visual Secret Schemes with Reversing
|
Yang,C.N.; Wang,C.C.; Chen,T.S. |
| 國立東華大學 |
2006-06 |
Cheating-Immune Secret Image Sharing Scheme with Steganography
|
Yang,C.N.; Chen,T.S.; Yu,K.H.; Wang,C.C. |
| 國立東華大學 |
2006-05 |
Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes
|
Yang,C.N.; Lu,B.L |
| 國立東華大學 |
2006-02 |
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size,” IEICE Transactions on Fundamentals of Electronics
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006 |
Embed Additional Private Information into Two-Dimensional Bar Codes by the Visual Secret Sharing Scheme
|
Yang,C.N.; Chen,T.S.; Ching,M.H. |
| 國立東華大學 |
2005-12 |
A Reliable Tree-Based Revocation Scheme in Grid Computing System
|
Yang,C.N.; Chen,K. N.; Peng,A.G. |
顯示項目 96-120 / 166 (共7頁) << < 1 2 3 4 5 6 7 > >> 每頁顯示[10|25|50]項目
|