English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 11377525      線上人數 : 13891
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 2871-2880 / 16528.

    上一頁279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 下一頁    每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    2871Moving Object Detection and Tracking

    Lin, Hwei-Jen; Liang, Feng-Ming; 2008-11
    [資訊工程學系暨研究所] 會議論文
    第十三屆人工智慧與應用研討會論文集=The 13th conference on artificial intelligence and applications, pp.809-813
    to have high accuracy rate ofdetection/tracking and satisfactory time efficiency. 2008-11 en 第十三屆人工智慧與應用研討會論文集=The 13th conference on artificial

    2872A Quantitative Assessment Metod with Course Design Model for Distance Learning

    Shih, Timothy K.; Hung, Lun-Ping2002-12
    [資訊工程學系暨研究所] 會議論文
    第三屆環太平洋國際多媒體會議論文集=Proceedings of 2002 Pacific-Rim Conference on Multimedia,頁1017-1024
    sides. With the help of our proposed courseware diagram, a maximum student learning performance can be achieved and just-in-time feedback from

    2873On Solving Nonlinear Differential Equations by Windows PSpice

    Lin, Yu-Li; Ye, Fun2003-12
    [電機工程學系暨研究所] 會議論文
    Proceedings of 2003 International Conference on Informations, Cybernetics, and Systems,頁965-968
    with respect to time. The method can be readily extended to solve a system of nonlinear differential equations. Examples are given to illustrate

    2874Improving Dynamic Branch Prediction Accuracy by Variable Cross-Reference Prediction and Iterative Dispatch

    Chuang, Po-Jen; Liau, Yue-Ter; 2003-12
    [電機工程學系暨研究所] 會議論文
    2003年全國計算機會議論文集 (Ⅲ):二十一世紀資訊時代的挑戰=Proceedings of 2003 National Computer Symposium (Ⅲ),頁1768-1775
    -referring traces in the pattern history table (PHT); it achieves desirable prediction accuracy with low time complexity and at no extra hardware cost

    2875Efficient Cache Invalidation Schemes for XML Data Accesses in Mobile Environments

    Chuang, Po-Jen; Chiu, Yu-Shian2008-11
    [電機工程學系暨研究所] 會議論文
    Proceedings of the 2008 International Computer Symposium (ICS 2008),6頁
    and lower query uplink ratios, which together yield much shorter average access time, than other related schemes. 2008-11 en Proceedings of the 2008

    2876Dynamic Channel Sharing Scheme for Cable Networks Using Fuzzy Set Theory

    Sheu, Shiann-Tsong; Liao, Chia-Shiung1997-05
    [電機工程學系暨研究所] 會議論文
    1997分散式系統技術及應用研討會論文集=Proceedings of 1997 Workshop on Distributed System Technologies & Applications,頁173-176
    service, real-time video service and delayable video service are offered, each type of services has different blocking probability requirement. Given

    2877Combined Fuzzy-Evolution Method for Multi-Objective Optimization

    Chien, Ching-Yang; Hsiao, Ying-Tung; 2000-12
    [電機工程學系暨研究所] 會議論文
    中華民國第八屆模糊理論及其應用會議論文集=Proceedings of the 8th National Conference on Fuzzy Theory and Its Application,頁144-149
    the optimal solution. On the basis of the proposedmethod, a time-sharing computer program is implemented. And anapplication to a multi-objective operation

    2878Animations of the Radiated EM Field in the Near Zone for the FDTD Method

    Chen, Shao-Hon; Lin, Chih-Wei; 2005-12
    [電機工程學系暨研究所] 會議論文
    亞太電磁相容研討會論文集=Proceedings of Asia Pacific Symposium on EMC Taipei,頁184-189
    of a transparent source for the finite-difference time-domain (FDTD) method are reported. The full wave characteristics are investigated via the convolution

    2879An Efficient and Reguler Motion Estimation Algorithm for Mpeg4-Avc/H.264 Coding

    Chiang, Jen-Shiun; Chou, Hsin-Guo; 2005-05
    [電機工程學系暨研究所] 會議論文
    第九屆IEEE細胞神經網路及其應用國際研討會論文集=Proceedings of the 9th IEEE International Workshop on Cellular Neural Networks and Their Applications,頁253-256
    .). However the highly computational complexity leads the codec to become too complex and hard to be implemented in real time applications

    2880Internet Micropayment Based on Unbalanced One-way Binary Tree

    Yen, Sung-Ming; Ho, Liang-Tai; 1999-05
    [電機工程學系暨研究所] 會議論文
    第九屆全國資訊安全會議論文集=Proceedings of the Ninth National Conference on Infornation Security,頁66-73
    the Internet. Most of the schemes employ a construction called one- way hash chain which was originally developed for the implementation of one-time password


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋