| 國立彰化師範大學 |
2008-11 |
Exploitative Grooms and Victimized Brides? Mapping Faces of Matchmaking Meetings of Commodified Transnational Marriages
|
Wang, Yi-Han |
| 國家衛生研究院 |
2019-06-04 |
Exploiting a low tax system: Non-tax-induced cigarette price increases in Taiwan 2011-2016
|
Gao, W;Sanna, M;Branston, JR;Chiou, HY;Chen, YH;Wu, A;Wen, CP |
| 國立交通大學 |
2020-07-15 |
Exploiting a monolithic passively Q-switched Nd:YAG laser to mimic a single neuron cell under periodic stimulation
|
Chen, Y. F.; Lee, C. C.; Hsiao, J. Q.; Huang, H. Y.; Tsou, C. H.; Liang, H. C.; Huang, K. F. |
| 臺大學術典藏 |
2018-09-10T04:32:50Z |
Exploiting a search engine to develop more flexible Web agents
|
SHOU-DE LIN; Lin, S.-D.; Knoblock, C.A. |
| 臺大學術典藏 |
2020-05-04T08:05:12Z |
Exploiting a Search Engine to Develop More Flexible Web Agents.
|
Lin, Shou-De; Knoblock, Craig A.; SHOU-DE LIN |
| 國立成功大學 |
2018 |
Exploiting a Self-learning Predictor for Session-based Remote Management Systems in a Large-scale Environment
|
Lee;Kuen-Min;Teng;Wei-Guang;Huang;Mu-Kai;Freg;Chih-Pin;Hou;Ting-Wei |
| 淡江大學 |
2016-10 |
Exploiting AdaRank Model and Trajectory of Hand Motion for Hand Gesture Recognition
|
Fahn, C. S.;Kao, C. Y.;Yao, C. B.;Wu, M. L. |
| 國立臺灣科技大學 |
2016 |
Exploiting adarank model and trajectory of hand motion for hand gesture recognition
|
Fahn, C.-S;Kao, C.-Y;Yao, C.-B;Wu, M.-L. |
| 國立交通大學 |
2020-10-05T01:59:47Z |
Exploiting analogue OxRAM conductance modulation for contrast enhancement application
|
Kumar, A.; Bezugam, S. S.; Hudec, B.; Hou, T. -H.; Suri, M. |
| 臺大學術典藏 |
2018-09-10T09:22:11Z |
Exploiting and evaluating mapreduce for large-scale graph mining
|
Lai, H.-C.; Li, C.-T.; Lo, Y.-C.; Lin, S.-D.; SHOU-DE LIN |
| 臺大學術典藏 |
2020-05-04T08:05:04Z |
Exploiting and Evaluating MapReduce for Large-Scale Graph Mining.
|
Lai, Hung-Che; Li, Cheng-Te; Lo, Yi-Chen; Lin, Shou-De; SHOU-DE LIN |
| 國立成功大學 |
2009-01 |
Exploiting and transferring presentational knowledge assets in R&D organizations
|
Li, Sheng-Tun; Chang, Won-Chen |
| 國立臺灣科技大學 |
1989 |
Exploiting And-Parallelism in the Distributed Prolog Environment
|
C.J. Hsiao;Hsu, Ching-Chi ;Lee, Hahn-Ming |
| 臺大學術典藏 |
2020-05-04T08:08:18Z |
Exploiting Asymmetric SIMD Register Configurations in ARM-to-x86 Dynamic Binary Translation
|
Liu, Y.-P.;Hong, D.-Y.;Wu, J.-J.;Fu, S.-Y.;Hsu, W.-C.; Liu, Y.-P.; Hong, D.-Y.; Wu, J.-J.; Fu, S.-Y.; Hsu, W.-C.; WEI-CHUNG HSU |
| 臺大學術典藏 |
2020-05-04T08:08:35Z |
Exploiting Asymmetric SIMD Register Configurations in ARM-to-x86 Dynamic Binary Translation.
|
WEI-CHUNG HSU; Liu, Yu-Ping; Hong, Ding-Yong; Wu, Jan-Jan; Fu, Sheng-Yu; Hsu, Wei-Chung |
| 國立臺灣科技大學 |
2011 |
EXPLOITING ATTRIBUTE POPULARITY DISTRIBUTION SKEW TO ENHANCE THE PERFORMANCE OF PEER TO PEER PUBLISH/SUBSCRIBE SYSTEMS
|
Chen, C.;Tsai, C.L.;Horng, S.J. |
| 真理大學 |
2002 |
Exploiting Bandwidth Utilization by Piconet Restructuring
|
游國忠 |
| 國立交通大學 |
2019-04-03T06:41:06Z |
Exploiting birefringent thermal lensing effect to manipulate polarization states of an Nd:YVO4 self-mode-locked laser
|
Tuan, P. H.; Tsai, M. C.; Chen, Y. F. |
| 國立交通大學 |
2019-04-03T06:44:47Z |
Exploiting broad-area surface emitting lasers to manifest the path-length distributions of finite-potential quantum billiards
|
Yu, Y. T.; Tuan, P. H.; Chang, K. C.; Hsieh, Y. H.; Huang, K. F.; Chen, Y. F. |
| 大葉大學 |
2010-01-26 |
Exploiting Cache Design Space Variation under the Influence of Compiler Optimization Options:A Case Study of H.264
|
張峻銘, 王欣平 |
| 國立臺灣科技大學 |
2018 |
Exploiting category-specific information for image popularity prediction in social media
|
Massip, E.;Hidayati, S.C.;Cheng, W.-H.;Hua, K.-L. |
| 真理大學 |
1999-11 |
Exploiting Cell-coverage for Voice Communication Using Combining Slowfrequency- hopping and Automatic-repeat-request Strategy
|
Chen,Yuhshyan; Juang,Jong-ying; Cheng,Yun-yun |
| 國立交通大學 |
2019-09-02T07:45:37Z |
Exploiting Centrality Information with Graph Convolutions for Network Representation Learning
|
Chen, Hongxu; Yin, Hongzhi; Chen, Tong; Quoc Viet Hung Nguyen; Peng, Wen-Chih; Li, Xue |
| 國立臺灣大學 |
2012 |
Exploiting Channel State Information in Slotted ALOHA with SINR Capture
|
Hsu, Fu-Te; Liu, Chi-Tang; Su, Hsuan-Jung |
| 臺大學術典藏 |
2018-09-10T09:25:26Z |
Exploiting Channel State Information in Slotted ALOHA with SINR Capture
|
Liu, C. -H.; Chen, P. -J.; Chen, D. -S.; Kao, J. -H.; 陳定信; 劉振驊; 高嘉宏; 楊宏志; 蘇東弘; 劉俊人; 陳培哲; 陳祈玲; Kuo, S. F. -T.; F.-T. Hsu, C.-T. Liu and H.-J. Su; Hsu, Fu-Te;Liu, Chi-Tang;Su, Hsuan-Jung; Hsu, Fu-Te; HSUAN-JUNG SU; Tseng, T. -C.; Liu, C. -J.; Liu, Chi-Tang; Su, Hsuan-Jung; Chen, C. -L.; Yang, W. -T.; Yang, H. -C.; Su, T. -H.; Wang, C. -C. |
| 國立交通大學 |
2014-12-08T15:02:20Z |
Exploiting communication complexity for Boolean matching
|
Wang, KH; Hwang, TT; Chen, C |
| 國立交通大學 |
2019-04-02T05:58:29Z |
Exploiting communication complexity for Boolean matching
|
Wang, KH; Hwang, TT; Chen, C |
| 國立臺灣海洋大學 |
2016 |
Exploiting concave-convex linear resonators to design end-pumped solid-state lasers with flexible cavity lengths: Application for exploring the self-mode-locked operation
|
P. H. Tuan;C. C. Chang;C. Y. Lee;C. Y. Cho;H. C. Liang;Y. F. Chen |
| 國立交通大學 |
2019-04-03T06:37:33Z |
Exploiting concave-convex linear resonators to design end-pumped solid-state lasers with flexible cavity lengths: application for exploring the self-mode-locked operation
|
Tuan, P. H.; Chang, C. C.; Lee, C. Y.; Cho, C. Y.; Liang, H. C.; Chen, Y. F. |
| 國立政治大學 |
2016-04 |
Exploiting Concept Drift to Predict Popularity of Social Multimedia in Microblogs
|
沈錳坤; Li, Cheng-Te;Shan, Man-Kwan;Jheng, Shih-Hong;Chou, Kuan-Ching |
| 國立政治大學 |
2001-05 |
Exploiting Contextual Knowledge for Information Retrieval in A Multiagent Based Digital Library Service System
|
Von-Wun Soo;劉吉軒;Chia-Ning Chiang |
| 國立政治大學 |
2006-10 |
Exploiting corporate governance and common size analysis for financial distress detecting models
|
劉昭麟 |
| 臺大學術典藏 |
2021-04-21T23:30:04Z |
Exploiting Data Entropy for Neural Network Compression
|
Chen, Tse Wen; PANGFENG LIU; Wu, Jan Jan |
| 臺大學術典藏 |
2021-09-02T00:08:45Z |
Exploiting Data Entropy for Neural Network Compression
|
Chen T.-W;Liu P;Wu J.-J.; Chen T.-W; Liu P; Wu J.-J.; PANGFENG LIU |
| 國立成功大學 |
2021 |
Exploiting deep neural network and long short-term memory method-ologies in bioacoustic classification of LPC-based features
|
Gong, C.-S.A.;Su, C.-H.S.;Chao, K.-W.;Chao, Y.-C.;Su, C.-K.;Chiu, W.-H. |
| 中華大學 |
2011 |
Exploiting Dynamic Distributed Load Balance by Neighbor-Matching on P2P Grids
|
許慶賢; Hsu, Ching-Hsien |
| 臺大學術典藏 |
2020-02-06T08:32:10Z |
Exploiting E. coli auxotrophs for leucine, valine, and threonine specific methyl labeling of large proteins for NMR applications
|
Monneau Y.R.; Ishida Y.; Rossi P.; Saio T.; SHIOU-RU TZENG; Inouye M.; Kalodimos C.G. |
| 國立政治大學 |
2011-07 |
Exploiting endorsement information and social influence for item recommendation
|
Li, Cheng-Te;Lin, Shou-De;Shan, Man-Kwan; 沈錳坤 |
| 臺大學術典藏 |
2018-09-10T08:42:17Z |
Exploiting endorsement information and social influence for item recommendation
|
Li, C.-T.;Lin, S.-D.;Shan, M.-K.; Li, C.-T.; Lin, S.-D.; Shan, M.-K.; SHOU-DE LIN |
| 臺大學術典藏 |
2020-05-04T08:05:09Z |
Exploiting endorsement information and social influence for item recommendation.
|
Li, Cheng-Te;Lin, Shou-De;Shan, Man-Kwan; Li, Cheng-Te; Lin, Shou-De; Shan, Man-Kwan; SHOU-DE LIN |
| 國立交通大學 |
2014-12-08T15:21:50Z |
Exploiting Event-Level Parallelism for Parallel Network Simulation on Multicore Systems
|
Wang, Shie-Yuan; Lin, Chih-Che; Tzeng, Yan-Shiun; Huang, Wen-Gao; Ho, Tin-Wei |
| 國立交通大學 |
2014-12-08T15:36:17Z |
Exploiting fine-grain parallelism in the H.264 deblocking filter by operation reordering
|
Weng, Tsung-Hsi; Chung, Chung-Ping |
| 臺大學術典藏 |
2018-09-10T07:37:36Z |
Exploiting genre for music emotion classification
|
Lin, Y.-C.;Yang, Y.-H.;Chen, H.H.;Liao, I.-B.;Ho, Y.-C.; Lin, Y.-C.; Yang, Y.-H.; Chen, H.H.; Liao, I.-B.; Ho, Y.-C.; HOMER H. CHEN |
| 國立東華大學 |
2005-07 |
Exploiting hardware accelerated occlusion queries for visibility culling, IEICE Trans. on Fundamentals of Electronics
|
Chiang,C.C.; Yang,M.T.; Hsu,C.K.; Tai,W.K. |
| 臺大學術典藏 |
2018-09-10T06:26:10Z |
Exploiting hardware and software low power techniques for energy efficient co-scheduling in dynamically reconfigurable systems
|
Hsiung, P.-A.; Liu, C.-W.; CHIH-WEN LIU |
| 國立東華大學 |
2005-07 |
Exploiting Hardware-accelerated Occlusion Queries for Visibility Culling
|
Tai,Wen-Kai; Yang,Mau-Tsuen; Chiang,Cheng-Chin; Hsu,Chih-Kang |
| 國立東華大學 |
2005-07 |
Exploiting Hardware-accelerated Occlusion Queries for Visibility Culling
|
Yang,M.T.; Hsu,C.; Chiang,C.; Tai,W. |
| 國立臺灣科技大學 |
2012 |
Exploiting hash functions to intensify the remote user authentication scheme
|
Hsieh, W.-B.;Leu, J.-S. |
| 臺大學術典藏 |
2021-12-06T09:02:57Z |
Exploiting Hi-Lo Inter-Digital DGS for High-Order Microstrip Bandpass Filters
|
Yihdar Chen; Chien-Hao Liu; CHIEN-HAO LIU |
| 國立臺灣大學 |
2006 |
Exploiting Homogeneity in Protein Sequence Clusters for Construction of Protein Family Hierarchies
|
Chen, Chien-Yu; Chung, Wen-Chin; Su, Chung-Tsai |