國立臺灣大學 |
2000-10 |
Cryptanalysis of modified authenticated key agreement protocol
|
Ku, Wei-Chi; Wang, Sheng-De |
臺大學術典藏 |
2000-10 |
Cryptanalysis of modified authenticated key agreement protocol
|
Ku, Wei-Chi; Wang, Sheng-De; Ku, Wei-Chi; Wang, Sheng-De |
國立臺灣大學 |
2000-05 |
Fuzzy Auto-Associative Neural Networks for Principal Component Extraction of Noisy Data
|
Yang, Tai-Ning; Wang, Sheng-De |
國立臺灣大學 |
2000 |
A fault-tolerant routing algorithm for wormhole routed meshes
|
Sui, Pao-Hwa; Wang, Sheng-De |
國立臺灣大學 |
2000 |
Adaptive tuning of the fuzzy controller for robots
|
Wang, Sheng-De; Lin, Chuan-Kai |
國立臺灣大學 |
2000 |
Adaptive and Deadlock-Free Routing for Irregular Faulty Patterns in Mesh Multicomputers
|
Tsai, Ming-Jer; Wang, Sheng-De |
國立臺灣大學 |
1999-11 |
Fingerprint recognition using directional micropattern histograms and LVQ networks
|
Wang, Sheng-De; Lee, Chih-Jen |
國立臺灣大學 |
1999-10 |
A Gabor filter-based approach to fingerprint recognition
|
Lee, Chih-Jen; Wang, Sheng-De |
國立臺灣大學 |
1999-02 |
Fingerprint feature extraction using Gabor filters
|
Lee, Chih-Jen; Wang, Sheng-De |
國立臺灣大學 |
1999 |
Fuzzy system identification using an adaptive learning rule with terminal attractors
|
Lin, Chuan-Kai; Wang, Sheng-De |
國立臺灣大學 |
1999 |
A secure and practical electronic voting scheme
|
Ku, Wei-Chi; Wang, Sheng-De |
國立臺灣大學 |
1999 |
Robust algorithms for principal component analysis
|
Yang, Tai-Ning; Wang, Sheng-De |
國立臺灣大學 |
1999 |
Fuzzy system modeling using linear distance rules
|
Wang, Sheng-De; Lee, Chien-Hui |
國立臺灣大學 |
1999 |
Fault-tolerant wormhole routing in two-dimensional mesh networks with convex faults
|
Sui, Pao-Hwa; Wang, Sheng-De |
國立臺灣大學 |
1998-12 |
Adaptive and fault-tolerant routing with 100% node utilization for mesh multicomputer
|
Wang, Sheng-De; Tsai, Ming-Jer |
臺大學術典藏 |
1998-12 |
Adaptive and fault-tolerant routing with 100% node utilization for mesh multicomputer
|
Wang, Sheng-De; Tsai, Ming-Jer; Wang, Sheng-De; Tsai, Ming-Jer |
國立臺灣大學 |
1998-01 |
A pseudonymous joint signature scheme
|
Ku, Wei-Chi; Wang, Sheng-De |
國立臺灣大學 |
1998-01 |
Hierarchical key establishment protocols based on secure keyed one-way hash functions
|
Ku, Wei-Chi; Wang, Sheng-De |
臺大學術典藏 |
1998-01 |
A pseudonymous joint signature scheme
|
Ku, Wei-Chi; Wang, Sheng-De; Ku, Wei-Chi; Wang, Sheng-De |
臺大學術典藏 |
1998-01 |
Hierarchical key establishment protocols based on secure keyed one-way hash functions
|
Ku, Wei-Chi; Wang, Sheng-De; Ku, Wei-Chi; Wang, Sheng-De |
國立臺灣大學 |
1998 |
Perceptron–perceptron net
|
Wang, Sheng-De; Hsu, Tsong-Chih |
國立臺灣大學 |
1998 |
A self-organizing fuzzy control approach for bank-to-turn missiles
|
Lin, Chuan-Kai; Wang, Sheng-De |
臺大學術典藏 |
1998 |
Perceptron–perceptron net
|
Wang, Sheng-De; Hsu, Tsong-Chih; Wang, Sheng-De; Hsu, Tsong-Chih |
臺大學術典藏 |
1998 |
A self-organizing fuzzy control approach for bank-to-turn missiles
|
Lin, Chuan-Kai; Wang, Sheng-De; Lin, Chuan-Kai; Wang, Sheng-De |
國立臺灣大學 |
1996-12 |
Constructing a fuzzy model from wavelet transforms
|
Lin, Chuan-Kai; Wang, Sheng-De |