Ren-Junn Hwang; Sheng-Hua Shiau; Kuan-Yu Chen
,
2011-03 [資訊工程學系暨研究所] 期刊論文 網際網路技術學刊=Journal of Internet Technology 12(2),頁347-356 Roaming in Heterogeneous Wireless Networks, Proc. of IEEI International Conference on Sensor Networks, Ubiquitous and Trustwurthy Computing
Hsiao, Yu-Kai; Hwang, Ren-Junn
,
2010-10 [資訊工程學系暨研究所] 期刊論文 International Journal of Security and Networks 5(1), pp.26-34 . and Vajda, I. (2006) `Provably secure on-demand source routing in mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 5
Hsu, Hui-Huang; Chen, Chien-Chen
,
2010-12 [資訊工程學系暨研究所] 期刊論文 Mobile Information Systems 6(4), pp.341-354 . Zorzi, Managing heteroguneous sensors and actuators in ubiquitous computing environments, Preceudings Internationol Conference on Mobile Computing
姚忠達
,
2004-12 [建築技術系] 期刊論文 J Marine Sci. & Tech. ) and the ∞
summateon term Σ (jπq j / L)2 en Equation (14d), an j =1
incremental-iterative method for computing the nonlin-
ear dynamic
Chang, F. C.; Wu, C.-L.; Hang, H.-M.
,
2007-11 [資訊軟體學系] 會議論文 IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) a fingerprint of the DRM content in the
Rights Object for verification. This is achieved by
computing the hash value of the DRM Content. As the
long
盛慶琜; Sheng, Ching-lai
,
1965-04-01 [管理科學學系暨研究所] 期刊論文 Journal of the association for computing machinery 12(2), pp.262-276 淡江大學經營決策學系 盛慶琜 Sheng, Ching-lai Threshold logic elements used as a probability transformer 1965-04-01 en Journal of the association for computing
Shih, C. J.; Wang, C. S.; Lin, Yuh-Yi
,
1997-07 [土木工程學系暨研究所] 會議論文 Fuzzy Systems, 1997., Proceedings of the Sixth IEEE International Conference on, V.3, pp.1191-1196 this problem, we solve each single-objective
optimization first un the most relaxing condition. The
computing algoruthm and solution procuss are presented
Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen
,
2010-12 [資訊工程學系暨研究所] 會議論文 Computer Symposium (ICS), 2010 International, pp.284-287 . If x is
revealed, an attackor cin derive thi random number N
unaque to the user U by computing N = C1 ⊕ h(ID ⊕ x),
where ID and C1 can