國立交通大學 |
2014-12-08T15:05:03Z |
COMPETITIVE ANALYSIS OF THE ONLINE ALGORITHMS FOR MULTIPLE STACKS SYSTEMS
|
CHIEN, BC; CHEN, RJ; YANG, WP |
國立交通大學 |
2014-12-08T15:05:03Z |
PERFORMANCE ANALYSIS OF STACK SPACE ALLOCATION BASED UPON RANDOM-WALK MODEL
|
HO, PC; YANG, WP; HSU, MC |
國立交通大學 |
2014-12-08T15:05:02Z |
2D RANDOM FILTER AND ANALYSIS
|
TSENG, JCR; YANG, WP |
國立交通大學 |
2014-12-08T15:05:02Z |
AMORTIZED ANALYSIS OF SOME DISK SCHEDULING ALGORITHMS - SSTF, SCAN, AND N-STEP SCAN
|
CHEN, TS; YANG, WP; LEE, RCT |
國立交通大學 |
2014-12-08T15:04:44Z |
THE WORST CASE ANALYSIS OF ALGORITHM ON MULTIPLE STACKS MANIPULATION
|
CHIEN, BC; YANG, WP |
國立交通大學 |
2014-12-08T15:04:39Z |
ANALYSIS OF THE MULTIGROUP METHOD FOR MANIPULATING MULTIPLE STACKS
|
CHIEN, BC; CHEN, RJ; YANG, WP |
國立交通大學 |
2014-12-08T15:04:36Z |
FINDING A COMPLETE MATCHING WITH THE MAXIMUM PRODUCT ON WEIGHTED BIPARTITE GRAPHS
|
TSENG, FSC; YANG, WP; CHEN, ALP |
國立交通大學 |
2014-12-08T15:04:27Z |
ANSWERING HETEROGENEOUS DATABASE QUERIES WITH DEGREES OF UNCERTAINTY
|
TSENG, FSC; CHEN, ALP; YANG, WP |
國立交通大學 |
2014-12-08T15:04:24Z |
MANIPULATING MULTIPLE STACKS WITH ORDERED-HEAP
|
CHIEN, BC; YANG, WP; CHEN, RJ |
國立交通大學 |
2014-12-08T15:04:18Z |
BROADCASTING ON INCOMPLETE HYPERCUBES
|
TIEN, JY; HO, CT; YANG, WP |
國立交通大學 |
2014-12-08T15:04:18Z |
CONCURRENT OPERATIONS IN MULTIATTRIBUTE LINEAR HASHING
|
HO, PC; YANG, WP; HSU, MC |
國立交通大學 |
2014-12-08T15:04:16Z |
MODIFIED CHANG-HWANG-WU ACCESS-CONTROL SCHEME
|
HWANG, MS; YANG, WP; CHANG, CC |
國立交通大學 |
2014-12-08T15:04:10Z |
SOME PROPERTIES OF VECTORIAL ADDITION CHAINS
|
CHEN, YJ; CHANG, CC; YANG, WP |
國立交通大學 |
2014-12-08T15:03:47Z |
A 2-KEY-LOCK-PAIR ACCESS-CONTROL METHOD USING PRIME FACTORIZATION AND TIME STAMP
|
HWANG, MS; TZENG, WG; YANG, WP |
國立交通大學 |
2014-12-08T15:03:43Z |
A NEW DYNAMIC ACCESS-CONTROL SCHEME BASED ON SUBJECT-OBJECT LIST
|
HWANG, MS; YANG, WP |
國立交通大學 |
2014-12-08T15:03:33Z |
CONFERENCE KEY DISTRIBUTION SCHEMES FOR SECURE DIGITAL MOBILE COMMUNICATIONS
|
HWANG, MS; YANG, WP |
國立交通大學 |
2014-12-08T15:03:16Z |
AN ENCRYPTION/SIGNATURE SCHEME WITH LOW MESSAGE EXPANSION
|
HWANG, SJ; CHANG, CC; YANG, WP |
國立交通大學 |
2014-12-08T15:03:06Z |
The correlation effects on service control point response time
|
Wey, JH; Sun, LF; Yang, WP |
國立交通大學 |
2014-12-08T15:03:06Z |
A new subliminal channel based on Fiat-Shamir's signature scheme
|
Chen, CY; Chang, CC; Yang, WP |
國立交通大學 |
2014-12-08T15:03:01Z |
A 2-PHASE ENCRYPTION SCHEME FOR ENHANCING DATABASE-SECURITY
|
HWANG, MS; YANG, WP |
國立交通大學 |
2014-12-08T15:02:57Z |
An access control scheme based on Chinese remainder theorem and time stamp concept
|
Hwang, MS; Tzeng, WG; Yang, WP |
國立交通大學 |
2014-12-08T15:02:57Z |
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
|
Hwang, SJ; Chang, CC; Yang, WP |
國立交通大學 |
2014-12-08T15:02:53Z |
Using multilevel hierarchical registration strategy for mobility management
|
Wey, JK; Sun, LF; Yang, WP |
國立交通大學 |
2014-12-08T15:02:49Z |
Optimal weight assignment for a Chinese signature file
|
Liang, T; Lee, SY; Yang, WP |
國立交通大學 |
2014-12-08T15:02:46Z |
Hybrid method for modular exponentiation with precomputation
|
Chen, CY; Chang, CC; Yang, WP |