|
"yeali sun"的相關文件
顯示項目 41-83 / 83 (共2頁) 1 2 > >> 每頁顯示[10|25|50]項目
| 臺大學術典藏 |
2020-02-10T02:43:34Z |
A scalable healthcare information system based on a service-oriented architecture
|
Yang, T.-H.;Sun, Y.S.;Lai, F.; Yang, T.-H.; Sun, Y.S.; Lai, F.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:34Z |
Adaptive on-the-go scheduling for end-to-end delay control in TDMA-based wireless mesh networks
|
Tu, Y.-C.;Chen, M.C.;Sun, Y.S.; Tu, Y.-C.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:34Z |
Collaborative scheme for VoIP traceback
|
Hsu, H.-M.;Sun, Y.S.;Chen, M.C.; Hsu, H.-M.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:33Z |
An interpretable statistical ability estimation in web-based learning environment
|
Huang, Y.-T.;Chen, M.C.;Sun, Y.S.; Huang, Y.-T.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:33Z |
A spectral efficient and fair user-centric spectrum allocation approach for downlink transmissions
|
Tang, S.-H.;Chen, M.C.;Sun, Y.S.;Tsai, Z.; Tang, S.-H.; Chen, M.C.; Sun, Y.S.; Tsai, Z.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:33Z |
A study on an automatic early-alert mechanism for a tag-based learning environment: Development of a teaching support platform based on a tag-based knowledge acquisition approach
|
Chen, J.M.;Chen, Y.Y.;Sun, Y.S.;Chen, M.C.; Chen, J.M.; Chen, Y.Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:33Z |
A novel approach for developing automatic knowledge construction and diagnostic system for Tag-based learning environment
|
Chen, J.M.;Chen, Y.Y.;Sun, Y.S.;Chen, M.C.; Chen, J.M.; Chen, Y.Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A workload analysis of live event broadcast service in cloud
|
Sun, Y.S.;Chen, Y.-F.;Chen, M.C.; Sun, Y.S.; Chen, Y.-F.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A cooperative botnet profiling and detection in virtualized environment
|
Hsiao, S.-W.;Chen, Y.-N.;Sun, Y.S.;Chen, M.C.; Hsiao, S.-W.; Chen, Y.-N.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
Spectrum analysis for detecting slow-paced persistent activities in network security
|
Chen, L.M.;Chen, M.C.;Sun, Y.S.;Liao, W.; Chen, L.M.; Chen, M.C.; Sun, Y.S.; Liao, W.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A hybrid tag-based recommendation mechanism to support prior knowledge construction
|
Chen, J.M.;Sun, Y.S.;Chen, M.C.; Chen, J.M.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:32Z |
A novel protocol design and collaborative forensics mechanism for VoIP services
|
Hsu, H.-M.;Lin, F.-Y.;Sun, Y.S.;Chen, M.C.; Hsu, H.-M.; Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Distributed agent-based IP location system framework design
|
Lin, F.-Y.;Sun, Y.S.;Chen, M.C.; Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
A novel approach to evaluate software vulnerability prioritization
|
Huang, C.-C.;Lin, F.-Y.;Lin, F.Y.-S.;Sun, Y.S.; Huang, C.-C.; Lin, F.-Y.; Lin, F.Y.-S.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Combining dynamic passive analysis and active fingerprinting for effective bot malware detection in virtualized environments
|
Hsiao, S.-W.;Chen, Y.-N.;Sun, Y.S.;Chen, M.C.; Hsiao, S.-W.; Chen, Y.-N.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
A scalable network forensics mechanism for stealthy self-propagating attacks
|
Chen, L.M.;Chen, M.C.;Liao, W.;Sun, Y.S.; Chen, L.M.; Chen, M.C.; Liao, W.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:31Z |
Protocol and architecture supports for network mobility with QoS-handover for high-velocity vehicles
|
Lee, C.-W.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
Forensics tracking for IP user using the markov chain model
|
Lin, F.-Y.; Sun, Y.S.; Chen, M.C.; YEALI SUN; Lin, F.-Y.;Sun, Y.S.;Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
A novel network mobility management scheme supporting seamless handover for high-speed trains
|
Lee, C.-W.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
A tag based learning approach to knowledge acquisition for constructing prior knowledge and enhancing student reading comprehension
|
Chen, J.-M.;Chen, M.-C.;Sun, Y.S.; Chen, J.-M.; Chen, M.-C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:30Z |
TEDQuiz: Automatic quiz generation for TED talks video clips to assess listening comprehension
|
Huang, Y.-T.;Tseng, Y.-M.;Sun, Y.S.;Chen, M.C.; Huang, Y.-T.; Tseng, Y.-M.; Sun, Y.S.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Patching assignment optimization for security vulnerabilities
|
Sun, Y.; YEALI SUN; Tong, S.-M.;Huang, C.-C.;Lin, F.-Y.;Sun, Y.; Tong, S.-M.; Huang, C.-C.; Lin, F.-Y. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
A workload, performance and resource usage
|
YEALI SUN; Sun, Y.S.;Du, C.-E.;Chen, M.C.; Sun, Y.S.; Du, C.-E.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Profiling temporal event behavior for demand prediction in cloud application performance management
|
Sun, Y.S.;Chen, Y.-F.;Chen, M.C.; Sun, Y.S.; Chen, Y.-F.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Resource management issues in 5G ultra dense smallcell networks
|
YEALI SUN; Chuang, M.-C.;Chen, M.C.;Yeali, S.; Chuang, M.-C.; Yeali, S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:29Z |
Seamless handover for high-speed trains using femtocell-based multiple egress network interfaces
|
YEALI SUN; Lee, C.-W.;Chuang, M.-C.;Chen, M.C.;Sun, Y.S.; Lee, C.-W.; Chuang, M.-C.; Chen, M.C.; Sun, Y.S. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
The influence of self-regulated learning support and prior knowledge on learning mathematics
|
Chen, M.-C.;Sun, Y.S.;Yang, T.-C.; Chen, M.-C.; Sun, Y.S.; Yang, T.-C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
ANTSdroid: Automatic malware family behaviour generation and analysis for Android apps
|
YEALI SUN; Sun, Y.S.;Chen, C.-C.;Hsiao, S.-W.;Chen, M.C.; Hsiao, S.-W.; Chen, C.-C.; Sun, Y.S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract)
|
Dolev, S.;Ghanayim, M.;Binun, A.;Frenkel, S.;Sun, Y.S.; Dolev, S.; Ghanayim, M.; Binun, A.; Frenkel, S.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
An Investigation of the Influence of Drug Addiction on Learning Behaviors in a Game-Based Learning Environment
|
YEALI SUN; Sun, Y.S.; Chen, M.-C.; Yang, T.-C.;Chen, M.-C.;Sun, Y.S.; Yang, T.-C. |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Design of an online multimedia learning system for improving students' perceptions of english language learning
|
Huang, Y.-T.;Yang, T.-C.;Chen, M.C.;Chen, C.-M.;Sun, Y.S.; Huang, Y.-T.; Yang, T.-C.; Chen, M.C.; Chen, C.-M.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:28Z |
Behavior grouping of Android malware family
|
YEALI SUN; Hsiao, S.-W.;Sun, Y.S.;Chen, M.C.; Hsiao, S.-W.; Sun, Y.S.; Chen, M.C. |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
ANTSdroid: Using RasMMA algorithm to generate malware behavior characteristics of android malware family
|
Sun, B.; Takahashi, T.; YEALI SUN; Chen, M.-C.; Chuang, W.-L.; Chang, S.-C.; Sun, Y.S.; Chang, S.-C.;Sun, Y.S.;Chuang, W.-L.;Chen, M.-C.;Sun, B.;Takahashi, T. |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network
|
Huang, Y.-T.;Chen, Y.-Y.;Yang, C.-C.;Sun, Y.;Hsiao, S.-W.;Chen, M.C.; Huang, Y.-T.; Chen, Y.-Y.; Yang, C.-C.; Sun, Y.; Hsiao, S.-W.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2020-02-10T02:43:27Z |
A scalable and accurate feature representation method for identifying malicious mobile applications
|
Sun, B.;Sun, Y.S.;Ban, T.;Takahashi, T.;Chang, S.-C.;Inoue, D.; Sun, B.; Sun, Y.S.; Ban, T.; Takahashi, T.; Chang, S.-C.; Inoue, D.; YEALI SUN |
| 臺大學術典藏 |
2015 |
A Study of a Life Logging Smartphone App and Its Power Consumption Observation in Location-Based Service Scenario
|
Huang, F.-M.;Huang, Y.H.;Szu, C.;Su, A.Y.S.;Chen, M.C.;Sun, Y.S.; Huang, F.-M.; Huang, Y.H.; Szu, C.; Su, A.Y.S.; Chen, M.C.; Sun, Y.S.; YEALI SUN |
| 臺大學術典藏 |
2014 |
A two-stage link scheduling scheme for variable-bit-rate traffic flows in wireless mesh networks
|
YEALI SUN; Sun, Y.S.; Chen, M.C.; Tu, Y.-C.; Tu, Y.-C.;Chen, M.C.;Sun, Y.S. |
| 臺大學術典藏 |
2013-06 |
Spectrum Analysis for Detecting Slow-Paced Persistent Activities in Network Security
|
WANJIUN LIAO; Meng Cheng Chen; Yeali Sun; Wanjiun Liao; Li-Ming Chen;Meng Cheng Chen;Yeali Sun;Wanjiun Liao; Li-Ming Chen |
| 臺大學術典藏 |
2013-06 |
Spectrum Analysis for Detecting Slow-Paced Persistent Activities in Network Security
|
WANJIUN LIAO; Meng Cheng Chen; Yeali Sun; Wanjiun Liao; Li-Ming Chen;Meng Cheng Chen;Yeali Sun;Wanjiun Liao; Li-Ming Chen |
| 臺大學術典藏 |
2011 |
Optimal incentive-compatible pricing for dynamic bandwidth trading and allocation in efficient spectrum management
|
YEALI SUN; Chen, M.C.; Pan, Y.-C.; Lu, M.-L.; Sun, Y.S.; Sun, Y.S.;Lu, M.-L.;Pan, Y.-C.;Chen, M.C. |
| 臺大學術典藏 |
2011 |
A secure proxy-based cross-domain communication for web mashups
|
Hsiao, S.-W.;Sun, Y.S.;Ao, F.-C.;Chen, M.C.; Hsiao, S.-W.; Sun, Y.S.; Ao, F.-C.; Chen, M.C.; YEALI SUN |
| 臺大學術典藏 |
2005 |
Fast and secure universal roaming service for mobile internet
|
Chen, M.C.; YEALI SUN; Pan, Y.-C.; Sun, Y.S.; Sun, Y.S.;Pan, Y.-C.;Chen, M.C. |
| 臺大學術典藏 |
1989 |
SFPS: A synchronous fast packet switching architecture for very high speeds
|
Sun, Y.;Gerla, M.; Sun, Y.; Gerla, M.; YEALI SUN |
顯示項目 41-83 / 83 (共2頁) 1 2 > >> 每頁顯示[10|25|50]項目
|