English  |  正體中文  |  简体中文  |  總筆數 :2856708  
造訪人次 :  53589647    線上人數 :  703
教育部委託研究計畫      計畫執行:國立臺灣大學圖書館
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
關於TAIR

瀏覽

消息

著作權

相關連結

"yu fang"的相關文件

回到依作者瀏覽
依題名排序 依日期排序

顯示項目 41-64 / 64 (共3頁)
<< < 1 2 3 > >>
每頁顯示[10|25|50]項目

機構 日期 題名 作者
淡江大學 2015-05-06 Quality of life changes in patients undergoing treatment for hepatocellular carcinoma Chie, Wei-Chu;Yu, Fang;Li, Mengqian;Baccaglini, Lorena;Blazeby, Jane M;Hsiao, Chin-Fu;Chiu, Herng-Chia;Poon, Ronnie T;Mikoshiba, Naoko;Gillian, Al-Kadhimi;Heaton, Nigel;Calara, Jozer;Collins, Peter;Caddick, Katharine;Costantini, Anna;Vilgrain, Valerie;Chiang, Chieh
國立政治大學 2015-05 Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services 郁方; Lin, Chun-Han;Sun, Pei-Yu;Yu, Fang
國立政治大學 2015 Network-traffic anomaly detection with incremental majority learning 郁方; Huang, Shin-Ying; Yu, Fang; Tsaih, Rua-Huan; Huang, Yennun; 蔡瑞煌
國立政治大學 2014.07 Topological pattern discovery and feature extraction for fraudulent financial reporting Huang, Shin-Ying ; Tsaih, Rua-Huan ; Yu, Fang; 黃馨瑩;蔡瑞煌;郁方
國立政治大學 2014-11-15 雲端體感協作平台的服務創新與實踐 林君翰;Lin, Chun-Han; 孫珮瑜;Su, Pei-Yu; 郁方;Yu, Fang
國立政治大學 2014-09 Resistant learning on the envelope bulk for identifying anomalous patterns Huang, S.-Y.;Yu, Fang;Tsaih, Ray;Huang, Y.; 郁方;蔡瑞煌
國立政治大學 2014-02 Securing KVM-based cloud systems via virtualization introspection Lee, Sheng Wei;Yu, Fang; 郁方
國立政治大學 2014-02 Patcher: An online service for detecting, viewing and patching web application vulnerabilities Yu, Fang;Tung, Yi Yang; 郁方;董亦揚
國立政治大學 2013.06 Automata-Based Symbolic String Analysis for Vulnerability Detection 郁方; Yu, Fang ; Alkhalaf, Muath ; Bultan, Tevfik ; Ibarra, Oscar H.
國立政治大學 2013.04 A novel liveness condition for S3PGR2 Chao, Daniel Y. ;Chen, Jiun-Ting ;Yu, Fang; 趙玉
國立政治大學 2013-08 Control policy for a subclass of Petri nets without reachability analysis 趙玉; Liu, GaiYun;Chao, Daniel Yuh;Yu, Fang
國立政治大學 2013 A control policy for γ-nets without reachability analysis and siphon enumeration Wu, W.;Chao, D.Y.;Yu, Fang; 郁方
國立政治大學 2013 Quantitative analysis of cloud-based streaming services Yu, Fang;Wan, Y.-W.;Tsaih, Rua-Huan; 蔡瑞煌;郁方
國立政治大學 2012.05 Symbolic Consistency Checking of OpenMP Parallel Programs 郁方; Yu,Fang ; Yang,Shun-Ching ; Wang,Farn ; Chen,Guan-Cheng ; Chan,Che-Chang
國立政治大學 2012 Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR) Chao, Daniel Yuh ; Yu, Fang; 趙玉;郁方
國立政治大學 2011-05 Patching vulnerabilities with sanitization synthesis Yu, Fang;Alkhalaf, Muath;Bultan, Tevfik; 郁方
國立政治大學 2011 A temporal logic for the interaction of strategies Wang, F.;Huang, C.-H.;Yu, Fang; 郁方
國立政治大學 2011 String abstractions for string verification Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方
臺大學術典藏 2006-11-15 TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering Wang, Farn; Huang, Geng-Dian; Yu, Fang; Wang, Farn; Huang, Geng-Dian; Yu, Fang
國立臺灣大學 2006-07 TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering Wang, Farn; Huang, Geng-Dian; Yu, Fang
國立臺灣大學 2005 Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol Wang, Farn; Huang, Geng-Dian; Yu, Fang
臺大學術典藏 2005 Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol Wang, Farn; Huang, Geng-Dian; Yu, Fang; Wang, Farn; Huang, Geng-Dian; Yu, Fang
國立臺灣大學 2004 BDD-based safety-analysis of concurrent software with pointer data structures using graph automorphism symmetry reduction Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw
臺大學術典藏 2004 BDD-based safety-analysis of concurrent software with pointer data structures using graph automorphism symmetry reduction Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw; Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw

顯示項目 41-64 / 64 (共3頁)
<< < 1 2 3 > >>
每頁顯示[10|25|50]項目