|
"yeong sung lin"的相關文件
顯示項目 61-85 / 156 (共7頁) << < 1 2 3 4 5 6 7 > >> 每頁顯示[10|25|50]項目
| 臺大學術典藏 |
2020-02-11T02:35:06Z |
Survivability and performance optimization of mobile wireless communication networks in the event of base station failure
|
Chu, K.-C;Lin, F.Y.-S.; Chu, K.-C; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:06Z |
Energy-efficient sensor network design subject to complete coverage and discrimination constraints
|
Lin, F.Y.S;Chiu, P.L.; Lin, F.Y.S; Chiu, P.L.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:06Z |
Maximum-revenue multicast routing and partial admission control for multirate multimedia distribution
|
Cheng, H.-C;Lin, F.Y.-S.; Cheng, H.-C; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:05Z |
The top load balanced forest routing in mesh networks
|
Wen, Y.-F;Lin, F.Y.-S.; Wen, Y.-F; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:01Z |
An optimization-based design algorithm for CATV networks
|
Peng, K.W;Lin, Y.S;Kwang, J.F.; Peng, K.W; Lin, Y.S; Kwang, J.F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:01Z |
A near-optimal slot assignment algorithm for RFID reader networks
|
Lin, C.-F; Lin, F.Y.-S; Lee, C.-T.; YEONG-SUNG LIN; Lin, C.-F;Lin, F.Y.-S;Lee, C.-T. |
| 臺大學術典藏 |
2020-02-11T02:35:01Z |
An efficient object tracking algorithm in wireless sensor networks
|
Lee, C.-T;Lin, F.Y.-S;Wen, Y.-F.; Lee, C.-T; Lin, F.Y.-S; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:01Z |
MAC aware energy-efficient data-centric routing in wireless sensor networks
|
Lin, F.Y.-S;Yen, H.-H;Lin, S.-P;Wen, Y.-F.; Lin, F.Y.-S; Yen, H.-H; Lin, S.-P; Wen, Y.-F.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:35:01Z |
Evaluation of network robustness for given defense resource allocation strategies
|
Lin, Y.-S;Tsang, P.-H;Chen, C.-H;Tseng, C.-L;Lin, Y.-L.; Lin, Y.-S; Tsang, P.-H; Chen, C.-H; Tseng, C.-L; Lin, Y.-L.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:57Z |
Fair bandwidth allocation and end-to-end delay routing algorithms for wireless mesh networks
|
Wen, Y.-F;Lin, Y.-S.; Wen, Y.-F; Lin, Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:56Z |
A simulated annealing algorithm for RFID reader networks
|
Lin, C.-F;Lin, F.Y.-S.; Lin, C.-F; Lin, F.Y.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:56Z |
A tree-based energy-efficient algorithm for data-centric wireless sensor networks
|
Wen, Y.-F;Lin, F.Y.-S;Kuo, W.-C.; Wen, Y.-F; Lin, F.Y.-S; Kuo, W.-C.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:56Z |
Near optimal protection strategies against targeted attacks on the core node of a network
|
Lin, F.Y.-S;Tsang, P.-H;Lin, Y.-L.; Lin, F.Y.-S; Tsang, P.-H; Lin, Y.-L.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:56Z |
The path-based minimum power broadcast problem in static wireless networks
|
Lin, F.Y.-S;Wen, Y.-F;Fu, L.-C;Lin, S.-P.; Lin, F.Y.-S; Wen, Y.-F; Fu, L.-C; Lin, S.-P.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:55Z |
Optical WDM network planning using heterogeneous multi-granularity OXCs
|
Yen, H.-H;Lin, F.Y.S;Lee, S.S.W;Chang, H.-T;Mukherjee, B.; Yen, H.-H; Lin, F.Y.S; Lee, S.S.W; Chang, H.-T; Mukherjee, B.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:54Z |
Near optimal attack strategies for the maximization of information theft
|
Tseng, C.-I;Lin, F.Y.S;Tsang, P.-H.; Tseng, C.-I; Lin, F.Y.S; Tsang, P.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:54Z |
A TDMA-based scheduling and routing algorithm for data-centric wireless sensor networks
|
Wen, Y.-F;Lin, F.Y.-S;Wang, H.-S.; Wen, Y.-F; Lin, F.Y.-S; Wang, H.-S.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:54Z |
The fault probability estimation and decision reliability improvement in WSNs
|
Hsu, M.-T;Lin, F.Y.-S;Chang, Y.-S;Juang, T.-Y.; Hsu, M.-T; Lin, F.Y.-S; Chang, Y.-S; Juang, T.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:54Z |
The reliability of detection in wireless sensor networks: Modeling and analyzing
|
Hsu, M.-T;Lin, F.Y.-S;Chang, Y.-S;Juang, T.-Y.; Hsu, M.-T; Lin, F.Y.-S; Chang, Y.-S; Juang, T.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:53Z |
Defending against Distributed Denial-of-Service (DDoS) attacks using routing assignments and resource allocation strategies under Quality-of-Service (QoS) constraints
|
Lin, F.Y.-S;Tsang, P.-H;Kuo, C.-B.; Lin, F.Y.-S; Tsang, P.-H; Kuo, C.-B.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:53Z |
Maximization of network survival time in the event of intelligent and malicious attacks
|
Tsang, P.-H;Lin, F.Y.-S;Chen, C.-W.; Tsang, P.-H; Lin, F.Y.-S; Chen, C.-W.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Reliable greedy forwarding in obstacle-aware wireless sensor networks
|
Hsu, M.-T;Lin, F.Y.-S;Chang, Y.-S;Juang, T.-Y.; Hsu, M.-T; Lin, F.Y.-S; Chang, Y.-S; Juang, T.-Y.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Multirate throughput optimization with fairness constraints in wireless local area networks
|
Kuo, Y.-L;Lai, K.-W;Lin, F.Y.-S;Wen, Y.-F;Wu, E.H.-K;Chen, G.-H.; Kuo, Y.-L; Lai, K.-W; Lin, F.Y.-S; Wen, Y.-F; Wu, E.H.-K; Chen, G.-H.; YEONG-SUNG LIN |
| 臺大學術典藏 |
2020-02-11T02:34:52Z |
Fair inter-tap routing and backhaul assignment for wireless mesh networks
|
YEONG-SUNG LIN; Wen, Y.F.; Lin, F.Y.S; Lin, F.Y.S;Wen, Y.F. |
| 臺大學術典藏 |
2020-02-11T02:34:51Z |
Maximization of network robustness considering the effect of escalation and accumulated experience of intelligent attackers
|
Lin, F.Y.-S;Tsang, P.-H;Chen, P.-Y;Chen, H.-T.; Lin, F.Y.-S; Tsang, P.-H; Chen, P.-Y; Chen, H.-T.; YEONG-SUNG LIN |
顯示項目 61-85 / 156 (共7頁) << < 1 2 3 4 5 6 7 > >> 每頁顯示[10|25|50]項目
|