Lin, Hwei-Jen; Liang, Feng-Ming; Wang, Chun-Wei; Yang, Fu-Wen
,
2008-11 [資訊工程學系暨研究所] 會議論文 第十三屆人工智慧與應用研討會論文集=The 13th conference on artificial intelligence and applications, pp.809-813 to have high accuracy rate ofdetection/tracking and satisfactory time efficiency. 2008-11 en 第十三屆人工智慧與應用研討會論文集=The 13th conference on artificial
Shih, Timothy K.; Hung, Lun-Ping
,
2002-12 [資訊工程學系暨研究所] 會議論文 第三屆環太平洋國際多媒體會議論文集=Proceedings of 2002 Pacific-Rim Conference on Multimedia,頁1017-1024 sides. With the help of our proposed courseware diagram, a maximum student learning performance can be achieved and just-in-time feedback from
Lin, Yu-Li; Ye, Fun
,
2003-12 [電機工程學系暨研究所] 會議論文 Proceedings of 2003 International Conference on Informations, Cybernetics, and Systems,頁965-968 with respect to time. The method can be readily extended to solve a system of nonlinear differential equations. Examples are given to illustrate
Chuang, Po-Jen; Liau, Yue-Ter; Hsiao, Young-Tzong; Chiu, Yu-Shian
,
2003-12 [電機工程學系暨研究所] 會議論文 2003年全國計算機會議論文集 (Ⅲ):二十一世紀資訊時代的挑戰=Proceedings of 2003 National Computer Symposium (Ⅲ),頁1768-1775 -referring traces in the pattern history table (PHT); it achieves desirable prediction accuracy with low time complexity and at no extra hardware cost
Chuang, Po-Jen; Chiu, Yu-Shian
,
2008-11 [電機工程學系暨研究所] 會議論文 Proceedings of the 2008 International Computer Symposium (ICS 2008),6頁 and lower query uplink ratios, which together yield much shorter average access time, than other related schemes. 2008-11 en Proceedings of the 2008
Sheu, Shiann-Tsong; Liao, Chia-Shiung
,
1997-05 [電機工程學系暨研究所] 會議論文 1997分散式系統技術及應用研討會論文集=Proceedings of 1997 Workshop on Distributed System Technologies & Applications,頁173-176 service, real-time video service and delayable video service are offered, each type of services has different blocking probability requirement. Given
Chien, Ching-Yang; Hsiao, Ying-Tung; Chen, Chia-Hong; Huang, Tsong-Liang
,
2000-12 [電機工程學系暨研究所] 會議論文 中華民國第八屆模糊理論及其應用會議論文集=Proceedings of the 8th National Conference on Fuzzy Theory and Its Application,頁144-149 the optimal solution. On the basis of the proposedmethod, a time-sharing computer program is implemented. And anapplication to a multi-objective operation
Chen, Shao-Hon; Lin, Chih-Wei; Li, Ching-Lieh
,
2005-12 [電機工程學系暨研究所] 會議論文 亞太電磁相容研討會論文集=Proceedings of Asia Pacific Symposium on EMC Taipei,頁184-189 of a transparent source for the finite-difference time-domain (FDTD) method are reported. The full wave characteristics are investigated via the convolution
Chiang, Jen-Shiun; Chou, Hsin-Guo; Tzou, Je-Yu
,
2005-05 [電機工程學系暨研究所] 會議論文 第九屆IEEE細胞神經網路及其應用國際研討會論文集=Proceedings of the 9th IEEE International Workshop on Cellular Neural Networks and Their Applications,頁253-256 .). However the highly computational complexity leads the codec to become too complex and hard to be implemented in real time applications
Yen, Sung-Ming; Ho, Liang-Tai; Huang, Chiung-Ying
,
1999-05 [電機工程學系暨研究所] 會議論文 第九屆全國資訊安全會議論文集=Proceedings of the Ninth National Conference on Infornation Security,頁66-73 the Internet. Most of the schemes employ a construction called one- way hash chain which was originally developed for the implementation of one-time password