國立交通大學 |
2014-12-08T15:12:24Z |
A two-level relevance feedback mechanism for image retrieval
|
Cheng, Pei-Cheng; Chien, Been-Chian; Ke, Hao-Ren; Yang, Wei-Pang |
國立交通大學 |
2014-12-08T15:12:11Z |
Structure clustering for Chinese patent documents
|
Huang, Su-Hsien; Ke, Hao-Ren; Yang, Wei-Pang |
國立交通大學 |
2014-12-08T15:12:11Z |
An approach to mining the multi-relational imbalanced database
|
Lee, Chien-I; Tsai, Cheng-Jung; Wu, Tong-Qin; Yang, Wei-Pang |
國立交通大學 |
2014-12-08T15:10:53Z |
iSpreadRank: Ranking sentences for extraction-based summarization using feature weight propagation in the sentence similarity network
|
Yeh, Jen-Yuan; Ke, Hao-Ren; Yang, Wei-Pang |
國立交通大學 |
2014-12-08T15:09:50Z |
Mining decision rules on data streams in the presence of concept drifts
|
Tsai, Cheng-Jung; Lee, Chien-I.; Yang, Wei-Pang |
亞洲大學 |
2014-07 |
A Conference Key Distribution Scheme in Tree Hierarchies
|
L.C.Huang;Huang, Li-Chin;黃明祥, W.P.Yang;Yang, Wei-Pang |
亞洲大學 |
2014-04 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang |
國立政治大學 |
2008.10 |
Using Data Mining for Analyzing Experiential Marketing in Blogs
|
許志堅; Chen, Fu-Mei ; Li, Yan-Ze ; Sheu, Jyh-Jian ; Yang, Wei-Pang |
國立彰化師範大學 |
2007-01 |
A Multivariate Decision Tree Algorithm to Mine Imbalanced Data
|
Tsai, Cheng-Jung; Lee, Chien-I Lee; Chen, Chiu-Ting;Yang, Wei-Pang |
國立成功大學 |
2004-03 |
Integrated business agents for processing free text information
|
Meng, I-Heng; Tseng, Vincent Shin-Mu; Yang, Wei-Pang |
國立高雄第一科技大學 |
1998.09 |
Integration of relations with conflicting schema structures in heterogeneous database systems
|
Frank, S.C.Tseng;Chiang, Jeng-Jye;Yang, Wei-Pang; 曾守正 |
淡江大學 |
1996-12 |
The key distribution protocol for mobile communication systems with untrusted centers
|
黃心嘉; Hwang, Shin-jia; Chang, Chin-chen; Yang, Wei-pang |
淡江大學 |
1996-09 |
Two efficient server-aided RSA secret computation protocols against active attacks
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
淡江大學 |
1996-07 |
An Efficient Dynamic Threshold Scheme
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
淡江大學 |
1996-05 |
Authentication encryption schemes with message linkage
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
淡江大學 |
1994-12 |
A new verification mechanism on the server-aided secret computation protocols for the modular exponentiation
|
黃心嘉; Hwang, shin-jia; Chang, chin-chen; Yang, wei-pang |
國立高雄第一科技大學 |
1993.12 |
Refining imprecise data by integrity constraints
|
Frank, S.C.Tseng;Arbee, L.P.Chen;Yang, Wei-Pang; 曾守正 |
國立高雄第一科技大學 |
1993.10 |
Searching a minimal semantically-equivalent subset of a set of partial values
|
Frank, S.C.Tseng;Arbee, L.P.Chen;Yang, Wei-Pang; 曾守正 |
國立高雄第一科技大學 |
1993.07 |
Answering heterogeneous database queries with degrees of uncertainty
|
Frank, S.C.Tseng;Arbee, L.P.Chen;Yang, Wei-Pang; 曾守正 |
國立高雄第一科技大學 |
1993.03 |
Finding a complete matching with the maximum product on weighted bipartite graphs
|
Frank, S.C.Tseng;Yang, Wei-Pang; 曾守正 |
國立政治大學 |
1993-12 |
Refining imprecise data by integrity constraints
|
陳良弼; Tseng,Frank S.C.;Chen,Arbee L.P.;Yang,Wei-Pang |
國立政治大學 |
1993-03 |
Finding a complete matching with the maximum product on weighted bipartite graphs
|
陳良弼; Tseng,Frank S.C.;Yang,Wei-Pang;Chen,Arbee L.P. |
國立高雄第一科技大學 |
1992.10 |
On mapping natural language constructs into relational algebra through E-R representation
|
Frank, S.C.Tseng;Arbee, L.P.Chen;Yang, Wei-Pang; 曾守正 |
國立政治大學 |
1992-10 |
On mapping natural language constructs into relational algebra through E-R representation
|
陳良弼; Tseng,Frank S.C.;Chen,Arbee L.P.;Yang,Wei-Pang |
國立高雄第一科技大學 |
1992-08 |
Generalizing the Division Operation on Indefinite Databases
|
Tseng, Frank Shou-Cheng;Chen, Arbee L. P.;Yang, Wei-Pang; 曾守正 |