|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Subject |
Date |
Location |
1 |
A Design of an Efficient Hashing Function |
1982.01.07 |
Institute of Computer and Decision Sciences, National Tsing Hua
University |
2 |
Compiler Construction Techniques |
1982.03.11 |
National Chung Hsing University, Department of Applied Math |
3 |
Design of an Optimal Multi-key File System |
1982.06.19 |
Institute for Information Industry |
4 |
Data Recovery Automation |
1982.12.11 |
National Chung Hsing University, Department of Applied Math |
5 |
A Design of a Multi-key File System |
1982.12.18 |
Feng Chia University, Department of Applied Math |
6 |
Recent Developments of of Perfect Hash Functions |
1983.04.29 |
National Taiwan University, Department of Computer Science and
Information Engineering |
7 |
Application of Database Management Systems |
1983.11.26 |
Tax Administratration of Taichung Government |
8 |
Recent Developments of Multi-key Hashing File Systems |
1984.02.29 |
National Taiwan University, Department of Electrical Engineering |
9 |
Constructing an Optimal Information Retrieval Method |
1984.05.11 |
Feng Chia University, Department of Information Engineering |
10 |
Experiences in Designing a Database Management System |
1984.09.22 |
Institude for Information Industry |
11 |
Designing a Minimal Perfect Hash Function |
1984.10.08 |
Institute of Computer and Decision Sciences, National Tsing Hua
University |
12 |
Recent Development of Text Retrieval |
1984.10.19 |
National Taiwan University, Department of Computer Science and
Information Engineering |
13 |
Data Structure and Information Security - from the Perspective of
Sun-Tzu Theorem |
1984.11.28 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
14 |
Experiences in Designing an Interactive Database Management System |
1984.12.21 |
Providence College of Arts and Sciences for Women, Department of
Information Science |
15 |
Recent Developments of Key-Lock Pair Access Control Mechanism |
1985.03.15 |
National Taiwan University, Department of Computer Science and
Information Engineering |
16 |
Methodology of Computer Software Engineering |
1985.03.27 |
Providence College of Arts and Sciences for Women, Department of
Information Science |
17 |
Information Management Techniques |
1985.04.18 |
Taichung First Senior High School |
18 |
Constructing a Symbolic Database and Information Security System |
1985.04.20 |
National Cheng Kung University, Department of Electrical
Engineering |
19 |
On Design of a Symbolic Database - from the Perspective of Theory
of Numbers |
1985.05.02 |
National Chiao Tung University, Department of Computer Science and
Information Engineering, and Department of Computer Information and Science |
20 |
Computer Security Technology |
1985.06.07 |
Feng Chia University, Department of Information Engineering |
21 |
How to Design a Symbolic Database |
1985.08.02 |
CDC Computer Company: Workshop on Maintenance and Application of
the User System |
22 |
How to Manage Enterprise Databases |
1985.09.10 |
YMCA-IMC Workshop on Computer Research and Study |
23 |
On Developments of Theory and Techniques |
1985.10.14 |
Feng Chia University, Department of Civil Engineering |
24 |
Computer and Information Management |
1985.10.20/10.26 |
Tunghai University, International Bussiness Administration |
25 |
Information Protection Systems |
1986.01.23 |
Academia Sinica, Institute of Information Science |
26 |
Information Security Systems |
1986.01.24 |
Aeronautics Developement Center |
27 |
Recent Developments of Data Structures and Information Security |
1986.03.06 |
Chung-Shan Institute of Science and Technology |
28 |
Recent Developments of Searching Techniques |
1986.03.13 |
Providence College of Arts and Sciences for Women, Department of
Information Science |
29 |
A Chinese Form-oriented Visual Programming System |
1986.03.18 |
National Chung Hsing University |
30 |
Recent Developments of Data Structure Techniques |
1986.03.24 |
National Taiwan Institute of Technology, Department of Electronic
Technology |
31 |
How to Construct a Symbolic Database |
1986.03.25 |
Institute of Computer and Decision Sciences, National Tsing Hua
University |
32 |
An Efficient Data Searching Technique |
1986.03.31 |
Chung Yuan Christian University, Department of Information and
Computer Engineering |
33 |
Computer Communications Security System |
1986.04.17 |
National Chiao Tung University, Department of Computer Science and
Information Engineering |
34 |
Computers and Data Processing |
1986.05.04 |
Tunghai University, International Bussiness Administration |
35 |
Public-Key Cryptography |
1986.06.12 |
Taiwan Province Government, Electrical Data Processing Center |
36 |
Advanced GPSS/S |
1986.06.16-06.17 |
Workshop on Software Packages and Application Systems, sponsored
by Ministry of Education |
37 |
Searching Techniques for Static Data |
1986.08.20 |
Aeronautics Developement Center |
38 |
Computers and Data Processing |
1986.09.13 |
Tunghai University, International Bussiness Administration |
39 |
Visual Programming |
1986.09.20 |
Institude for Information Industry |
40 |
Computers and Passwords |
1986.10.05 |
Taiwan Provincial Taichung Libarary |
41 |
Visual Programming |
1986.10.06 |
National Chung Hsing University, Computer and Information Network
Center |
42 |
Office Automation |
1986.10.18 |
Tunghai University, International Bussiness Administration |
43 |
Visual Programming |
1986.10.21 |
Department of Electrical Data Processing, National Taichung
Institude of Technology |
44 |
Information Security |
1986.10.29 |
National Chung Hsing University, Computer and Information Network
Center |
45 |
Data Encryption Techniques |
1986.11.14 |
World Technology Consultant Industry |
46 |
Information Access Control Techniques |
1986.11.14 |
World Technology Consultant Industry |
47 |
Secure Secret Broadcasting |
1986.11.15 |
World Technology Consultant Industry |
48 |
Recent Developments of Data Structures and Searching Techniques |
1986.11.19 |
National Central University, Department of Computer Science and
Information Engineering |
49 |
Information Access Control Techniques |
1986.12.03 |
National Tsing Hua University, Department of Industrial
Engineering |
50 |
Computers and Communications |
1986.12.12 |
National Taiwan Normal University, Department of Industrial
Education |
51 |
Computers and Communications |
1986.12.13 |
Taichung County, Ching-Shui Junior High School |
52 |
The Past, Present, and Future of Information Technology |
1986.12.22 |
National Chin-Yi Institute of Technology |
53 |
Implementation and Application of a Test Items Bank for
Information Courses |
1986.12.23 |
Taichung Home Economical and Commercial Senior Vocational School |
54 |
Information Era |
1987.01.15 |
Victory High School |
55 |
Recent Developments of Data Structures and Searching Techniques |
1987.02.24 |
National/ Panasonic Taiwan |
56 |
Sun-Tzu as a Computer Scientist |
1987.03.15 |
Taiwan Provincial Taichung Libarary |
57 |
Advanced GPSS/S |
1987.03.17-03.18 |
Workshop on Software Packages and Application Systems, sponsored
by Ministry of Education |
58 |
Computers and Information |
1987.03.21 |
Chia-Yi YMCA |
59 |
Computers and Information |
1987.03.22 |
Tunghai University, International Bussiness Administration |
60 |
The Developments of Information Retrieval Techniques |
1987.03.24 |
Tatung Institute of Technology, Department of Computer Science and
Engineering |
61 |
A Design of Secure Computer Passwords |
1987.03.26 |
National Cheng Kung University, Department of Engineering Science |
62 |
Database Design - From the Perspective of Data Analysis |
1987.04.14 |
Computer Society of the Republic of China |
63 |
Data Retrieval and Information Security |
1987.04.20 |
National Chung Hsing University, Computer and Information Network
Center |
64 |
Information Science - from the Perspective of Data Analysis |
1987.04.21 |
National Chung Hsing University, Computer and Information Network
Center |
65 |
Information Science - from the Perspective of Data Analysis |
1987.04.23 |
Aeronautics Developement Center |
66 |
Information Science - from the Perspective of Dicrete Mathematics |
1987.04.28 |
Tunghai University, Department of Computer Science Information
Engineering |
67 |
Key to the Treasury of Life |
1987.05.11 |
Taichung Second Senior High School |
68 |
Advanced GPSS/S |
1987.05.26-05.27 |
Workshop on Software Packages and Application Systems, sponsored
by Ministry of Education |
69 |
Information Era |
1987.06.23/07.07 |
Ming Dao High School |
70 |
Visual Programming - FORMOSA |
1987.07.09 |
World Technology Consultant Industry |
71 |
A Database Management System - System-Bee |
1987.07.10 |
World Technology Consultant Industry |
72 |
Information Security |
1987.07.23 |
Aeronautics Developement Center |
73 |
Workshop on Data Structures and Data Analyses |
1987.08.24-08.26 |
World Technology Consultant Industry |
74 |
Workshop on Information Systems and Information Auditing |
1987.08.27-08.28 |
Harvard Management Services |
75 |
Workshop on Information Engineering Technology |
1987.09.21-09.23 |
Chin-Peng Management Consulting Company |
76 |
Information Access Control Techniques |
1987.10.28 |
National Tsing Hua University, Department of Industrial
Engineering |
77 |
Designing an Information Query System |
1987.11.02 |
Institute of Computer and Decision Sciences, National Tsing Hua
University |
78 |
Design Principles of an Information Query System |
1987.11.04 |
Tunghai University, Department of Computer Science Information
Engineering |
79 |
System Simulation |
1987.11.10 |
Institute of Harbor and Marine Technology |
80 |
Clustering Analysis and Its Applications |
1987.11.26 |
Department of Computer Engineering, National Chiao Tung University |
81 |
Workshop on Compilers |
1987.11.30-12.02 |
World Technology Consultant Industry |
82 |
Clustering Analysis and Its Applications |
1987.12.08 |
Department of Computer Science and Information Engineering,
National Cheng Kung University |
83 |
A Step to Information Society - Using Computers |
1987.12.12 |
Feng-Yuan Junior High School, Feng Yuan |
84 |
A Step to Information Society - Using Computers |
1987.12.15 |
Chang-Ann Junior High School, Chang-Hua |
85 |
Data Compression |
1987.12.16 |
Computer and Information Network Center, National Chung Hsing
University |
86 |
Design of
Distributed Databases |
1988.03.14 |
Department of Computer Science and Engineering, Tatung Institute
of Technology |
87 |
Visual Programming |
1988.03.28 |
Department of Industrial Engineering and Enterprise Information,
Tunghai University |
88 |
On Developments of Theory and Techniques |
1988.04.11 |
Tunghai University, Department of Computer Science Information
Engineering |
89 |
Visual Programming |
1988.04.13 |
Aeronautic Development Center |
90 |
Electronic Data Compression |
1988.04.14 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
91 |
Database Management Systems and Office Automation |
1988.04.18 |
Yung-Jing Industrial Vocational Senior School |
92 |
Database Management System and Office Automation |
1988.04.20 |
Taichung Home Economical and Commercial Senior Vocational School |
93 |
Information Era |
1988.08.15 |
Taichung Home Economical and Commercial Senior Vocational School |
94 |
Information Era |
19888.08.18 |
Taichung Agricultural Vocational Senior High School |
95 |
Database Management Systems |
1988.10.05 |
Aeronautic Development Center |
96 |
Chinese String Searching |
1988.10.12 |
Department of Computer Science and Information
Engineering/Electrical Engineering, National Central University |
97 |
Approximate String Searching |
1988.11.01 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
98 |
A User Identification Scheme on Computer Networks |
1988.11.10 |
Academia Sinica |
99 |
Workshop on Information System Technology |
1988.11.24-11.26 |
World Technology Consultant Industry |
100 |
Recent Developments of Information Security Technology |
1988.12.01 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
101 |
Towards Information Society - Universal Information Education |
1988.12.08 |
Taichung First Senior High School |
102 |
Towards Information Society - Universal Information Education |
1988.12.10 |
Taichung Girls' Senior High School |
103 |
Introduction to Computer Passwords |
1989.03.15 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
104 |
Public-Key Encryption |
1989.04.24 |
Aeronautics Developement Center |
105 |
An Experience in Designing a Database Management System |
1989.04.26 |
Computer Society of the Republic of China |
106 |
Data Analysis Technology and Its Applications |
1989.04.28 |
Department of Computer Science and Information Engineering,
National Taiwan University |
107 |
Data Analysis Technology and Its Applications |
1989.05.10 |
Department of Industrial Education, National Taiwan Normal
University |
108 |
Information and Computers |
1989.06.07 |
National Chung Hsing University |
109 |
On Developments of Theory and Techniques |
1989.06.09 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
110 |
Information Security |
1989.06.14 |
National Chung Hsing University |
111 |
Workshop on Data Engineering Technology |
1989.08.28-08.30 |
Center of Public and Business Administration Education, National
Chengchi University |
112 |
Data Compression |
1989.10.05 |
Department of Engineering Science, National Cheng Kung University |
113 |
Computer Crime and Computer Viruses |
1989.10.15 |
Taiwan Provincial Taichung Library |
114 |
Computer Crime and Countermeasures |
1989.11.01 |
Tunghai University, Department of Computer Science Information
Engineering |
115 |
Clustering Analysis and Its Applications |
1989.12.08 |
Institute of Information Science, Academia Sinica |
116 |
Information Security |
1989.12.11 |
Department of Mathematics and Science Education, National Chiayi
Teachers College |
117 |
Information and Computers |
1990.02.06 |
Taichung Agricultural Vocational Senior High School |
118 |
Introduction to Computer Password Design |
1990.03.01 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
119 |
Computer Cryptology |
1990.03.02 |
Department of Information Engineering, Feng Chia University |
120 |
Data Encryption |
1990.03.08 |
Department of Electrical Engineering, Tatung Institute of
Technology |
121 |
Information Security |
1990.03.09 |
Department of Electronical Data Processing, Ming Chuan College |
122 |
Data Encryption |
1990.03.28 |
Application Mathematics Department, Chinese Culture University |
123 |
Design of a Chinese String Searching Machine |
1990.03.30 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
124 |
Data Encryption |
1990.04.12 |
Taichung Home Economical and Commercial Senior Vocational School |
125 |
Information Security |
1990.04.12 |
Taichung Home Economical and Commercial Senior Vocational School |
126 |
Data Compression |
1990.04.14 |
Taichung Home Economical and Commercial Senior Vocational School |
127 |
Computer Security |
1990.04.18 |
College of Medicine, National Cheng Kung University |
128 |
Computer Crime and Computer Viruses |
1990.05.17 |
Taichung Museum of Art |
129 |
Information Management and Applications |
1990.06.04 |
Chia-Yi City Government |
130 |
Information Management and Applications |
1990.06.22 |
Chia-Yi City Government |
131 |
Management Computerization |
1990.07.11 |
National Yunlin Institute of Industry |
132 |
Information Access and Control |
1990.09.27 |
Department of Applied Mathematics, National Chung Hsing University |
133 |
Strategies for Chinese Compression |
1990.10.18 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
134 |
Computer Crime and Countermeasures |
1990.10.18 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
135 |
Computer Crime and Countermeasures |
1990.10.30 |
National Chung Cheng University |
136 |
Compression-Based Perfect Hashing Strategies |
1990.11.26 |
Department of Computer Science, National Tsing Hua University |
137 |
Countermesures against Computer Crime and Computer Viruses |
1990.11.27 |
Taiwan Cooperative Bank |
138 |
Data Engineering Technology |
1990.11.28 |
National Defense Management College |
139 |
Computer Password Design |
1990.12.12 |
Department of Electrical Engineering, National Yunlin Institute of
Industry |
140 |
Applications of Clustering Technology in Information Science |
1990.12.20 |
Department of Electrical Engineering, National Cheng Kung
University |
141 |
Information Security |
1991.01.22 |
YMCA, Chia-Yi |
142 |
Design of a Minimal Perfect Hashing Function |
1991.02.11 |
Department of Computer Science and Engineering, The Chinese
University of Hong Kong |
143 |
Office Automation |
1991.03.06 |
Computer Center, National Chung Cheng University |
144 |
Computer Crime and Prevention |
1991.04.20 |
Exhibition Center of Computer Science, National Science Council |
145 |
Computers and Passwords |
1991.06.14 |
Department of Electronic Engineering, National Taipei Institute of
Technology |
146 |
On File Systems |
1991.09.21 |
Department of Computer Science and Information Engineering,
National Cheng Kung University |
147 |
Applications of Cryptography in Computer Security |
1991.11.09 |
Department of Computer Science and Information Engineering,
National Cheng Kung University |
148 |
Road to Success |
1991.11.27 |
Tunghai University, Department of Computer Science Information
Engineering |
149 |
Design of Image Databases |
1991.12.04 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
150 |
Dynamic Secret Sharing |
1992.01.10 |
Department of Applied Mathematics, National Sun Yat-sen University |
151 |
Introduction to Computer Passwords |
1992.02.21 |
Sieh-Chih Industrial and Commercial Senior Vocational School |
152 |
Key to Emerging |
1992.03.11 |
Taiwan Provincial Wen-Hua Senior High School |
153 |
Information Security |
1992.04.14 |
Provincial Chang-Hua Senior School of Commerence |
154 |
The Past, Present, and Future of Science and Technology Education |
1992.04.16 |
National Chung Cheng University |
155 |
Methodology |
1992.05.14 |
Tunghai University, Department of Computer Science Information
Engineering |
156 |
Information Security |
1992.05.18 |
Ta Tung Technological College of Commerce |
157 |
Group Secret Strategies |
1992.06.15 |
Computer Science and Engineering Research Center, National Sun
Yat-sen University |
158 |
Group Secret Techniques |
1992.10.02 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
159 |
Secret Sharing |
1992.10.06 |
Department of Information and Computer Education, National Taiwan
Normal University |
160 |
Generalized Group Secret Cryptography |
1992.10.07 |
National Security Bureau |
161 |
Methodology |
1992.10.22 |
Department of Information Management, Ming Chuan College |
162 |
Methodology |
1992.10.28 |
Department of Computer and Information Science, National Chiao
Tung University |
163 |
Computer Password Design |
1992.11.18 |
Department of Computer Science and Engineering, National Sun
Yat-sen University |
164 |
Evolution and Applications of Mathematics |
1992.11.23 |
Department of Mathematics, National Tsing Hua University |
165 |
Data Compression |
1992.11.24 |
Provincial Chang-Hua Senior School of Commerence |
166 |
Developments of Contemporary Cryptology |
1992.12.01 |
Taichung Home Economical and Commercial Senior Vocational School |
167 |
Career Planning of Computer People |
1992.12.07 |
Department of Computer Science and Information Engineering,
National Chung Cheng University |
168 |
A Secured Computer Center Management |
1993.01.07 |
Taichung Home Economical and Commercial Senior Vocational School |
169 |
A Secured Computer Center Management |
1993.01.14 |
Taichung Home Economical and Commercial Senior Vocational School |
170 |
A Secured Computer Center Management |
1993.02.04 |
Taichung Home Economical and Commercial Senior Vocational School |
171 |
A Secured Computer Center Management |
1993.02.11 |
Taichung Home Economical and Commercial Senior Vocational School |
172 |
Key to Emerging |
1993.03.04 |
Department of Information Management, National Taiwan Institute of
Technology |
173 |
Chinese Retrieval and Searching |
1993.03.24 |
Provincial Chang-Hua Senior School of Commerence |
174 |
An Image Similar Retrieval Method Based on Modulo Arithmetics |
1993.04.23 |
Workshop on Computer Applications Sponsored by National Chung
Hsing University |
175 |
Information Security |
1993.05.04 |
Department of Information Science and Management, Providence
University |
176 |
Key to Emerging |
1993.05.24 |
Chia-Yi Home Vocational School |
177 |
Information Security |
1993.06.02 |
Department of Budget, Accounting and Statistics, Taiwan Provincial
Government, R.O.C. |
178 |
A Master Key for an M3 Cryptoscheme |
1993.06.08 |
Department of Electrical Engineering, National Defense University,
Chung Cheng Institute of Technology |
179 |
Introduction to Computer Passwords |
1993.06.10 |
Taichung Home Economical and Commercial Senior Vocational School |
180 |
Military Information Security |
1993.09.07 |
National Defense Management College |
181 |
Information Searching Techniques |
1993.10.29 |
National Chung Cheng University |
182 |
Evolution of Computer Cryptography |
1993.11.18 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
183 |
Project Planning Information System Design |
1993.11.23 |
Research, Development, and Evaluation Commission, Taiwan
Provincial Government |
184 |
Career Planning |
1993.11.25 |
College of Engineering, National Chung Cheng University (for the
students of Department of Business Education, National Changhua University of
Education) |
185 |
Information Security |
1993.12.01 |
Provincial Training Center of Taiwan Provincial Government |
186 |
Developments of Computer Cryptography |
1993.12.08 |
National Defense University, Chung Cheng Institute of Technology |
187 |
Information Security |
1993.12.27 |
Provincial Training Center of Taiwan Provincial Government |
188 |
Applications of Instruction Network and Information Security |
1994.01.07 |
Szu-Yu Junior High School |
189 |
Evaluation of Computer-Aided Instruction (CAI) |
1994.01.17 |
Fooyin College of Nursing |
190 |
Evolution of Contemporary Cryptography |
1994.02.22 |
Chung-Shan Institute of Science and Technology |
191 |
Project Planning Information System Design |
1994.03.10 |
Research, Development, and Evaluation Commission, Taiwan Province |
192 |
Group Secret Technology |
1994.03.18 |
Department of Computer Science. and Information Engineering,
National Taiwan University |
193 |
Artificial Intelligence |
1994.03.25 |
Tsau Ton Commercial and Technical Vocational School |
194 |
Artificial Intelligence |
1994.04.02 |
Center of Automated Engineering, Da-Yeh University |
195 |
Computer Password Design |
1994.04.13 |
Wu Feng Institute of Technology |
196 |
Key to Emerging |
1994.04.14 |
Rotary Club of Taichung East District |
197 |
Computer Password Design |
1994.04.30 |
National Central University |
198 |
Introduction to Cryptanalysis |
1994.05.06 |
Department of Applied Mathematics, Feng Chia University |
199 |
Introduction to Cryptanalysis |
1994.05.20 |
Department of Industrial Education, National Taiwan Normal
University |
200 |
Chinese Database Management Systems |
1994.05.25 |
Training Center for High School Teachers |
201 |
Efficient Information Retrieval |
1994.08.03 |
Graduate Institute of Computer Science, National Chung Hsing
University |
202 |
Introduction to Cryptanalysis |
1994.11.03 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
203 |
Information Security |
1994.12.14 |
Department of Information Management, Chaoyang Institute of
Technology |
204 |
Information Security |
1994.12.17 |
Computer and Information Network Center, National Chung Hsing
University |
205 |
Developments of Contemporary Cryptography |
1995.03.03 |
Department of Computer Science and Engineering, National Sun
Yat-Sen University |
206 |
A Step to Information Society - Using Computers |
1995.04.24 |
National Chung Cheng University |
207 |
Image Compression Technology |
1995.04.27 |
Department of Information Science and Management, Providence
University |
208 |
Technology and Our Life |
1995.07.27 |
National Chiayi Senior Hight School |
209 |
Information Security and Management |
1995.08.06 |
Taiwan Regional Development Institute |
210 |
Information Security |
1995.11.03 |
Provincial Training Center of Taiwan Provincial Government |
211 |
The Present and Prospect of Information Security |
1995.11.09 |
Department of Applied Mathematics, National Chung Hsing University |
212 |
Developments of Computer Cryptography |
1995.12.20 |
Department of Computer Science and Information Engineering,
National Dong Hwa University |
213 |
Developments of Computer Cryptography |
1995.12.28 |
Department of Computer and Information Science, National Chiao
Tung University |
214 |
Information Security |
1996.04.19 |
Refining & Manufacturing Research Center of Chinese Petroleum
Corp |
215 |
Contemporary Cryptography |
1996.05.03 |
Department of Computer Science and Information Engineering,
National Cheng Kung University |
216 |
Information Security |
1996.06.06 |
National Changhua University of Education |
217 |
Information Security |
1996.08.14 |
Department of Computer Science and Engineering, National Sun
Yat-Sen University |
218 |
How to Share a Common Secret Document |
1996.12.03 |
Department of Information Engineering, Feng Chia University |
219 |
Efficient Join Operation of Time-domain Databases |
1996.12.19 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
220 |
Road to Success |
1997.03.26 |
Department of Information Management, Chaoyang University of
Technology |
221 |
Efficient Join Operation of Time-domain Databases |
1997.04.16 |
Department of Computer Science, National Tsing Hua University |
222 |
Evolution of Information Security Technology |
1997.05.07 |
National Defense University, Chung Cheng Institute of Technology |
223 |
Information Security |
1997.06.05 |
Department of Mathematics, Chung Yuan Christian University |
224 |
Evolution of Information Security Technology |
1997.07.11 |
National Defense Management College |
225 |
The Present and Prospect of Information Education of Universities
in Taiwan |
1997.11.04 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
226 |
Hot Issues of International Information Security Research -
Theory, Techniques, and Market Trend |
1997.11.04 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
227 |
Secret Sharing |
1997.11.05 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
228 |
Fast Computation of Modulo Exponents |
1997.11.05 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
229 |
Digital Signatures |
1997.11.06 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
230 |
Image Hiding Technology |
1997.11.06 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
231 |
Applications of Chinese Remainder Theorem |
1997.11.07 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
232 |
Essential Qualities of a Successful Scientist |
1997.11.07 |
Beijing University of Posts and Telecommunications, People¡¦s
Republic of China |
233 |
Image Hiding Technology |
1997.12.28 |
Tunghai University |
234 |
Progressive Image Transmission Using Edge Matching |
1998.02.24 |
Department of Computer and Information Science, National Chiao
Tung University |
235 |
Image Hiding Technology |
1998.02.26 |
Department of Information Science and Management, Providence
University |
236 |
Progressive Image Compression |
1998.02.26 |
Department of Information Science and Management, Providence
University |
237 |
Progressive Image Transmission |
1998.03.13 |
Department of Business Education, National Changhua University of
Education |
238 |
Computer Crime and Prevention |
1998.03.17 |
National Taiwan Normal University |
239 |
A Binary Access Control Method Using Prime Factorization |
1998.03.27 |
University of Tokyo, Japan |
240 |
An Image Hiding Scheme Based on Vector Quantization |
1998.03.27 |
University of Tokyo, Japan |
241 |
Progressive Image Transmission |
1998.04.23 |
Department of Information Management, National Taiwan University
of Science and Technology |
242 |
The Present and Prospect of Information Security Developments |
1998.05.08 |
Tung Fang Institute of Industry |
243 |
Techniques of Designing Digital Watermarks |
1998.05.13 |
Workshop on Network Security Technology Sponsored by Industrial
Technology Research Institute |
244 |
Key to Success in Academic Research |
1998.05.21 |
Department of Applied Mathematics, National Chung Hsing University |
245 |
Digital Watermarking |
1998.07.03 |
Kyoto University, Japan |
246 |
Applications of Mathematics in Information Science |
1998.10.09 |
Ming-Dao High school |
247 |
Digital Watermarking |
1998.10.18 |
Chang Gung University |
248 |
Road to Success |
1998.11.07 |
Department of Electrical Data Processing, National Taichung
Institude of Commerce |
249 |
A Sheme for Obtaining a Message from the Digital Multi-Signature |
1998.11.17 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
250 |
Chinese Calligraphy Compression Using New S-tree Sructure |
1998.11.18 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
251 |
Key to Success in Academic Research |
1998.12.15 |
Department of Computer Science and Technology, Chung Cheng
Institute of Technology, National Defense University |
252 |
Image Hiding Technology |
1999.02.25 |
National Security Bureau, Republic of China |
253 |
Image Hiding |
1999.03.02 |
Department of Computer Science and Information Management,
Providence University |
254 |
Key to Success in Academic Research |
1999.03.10 |
Department of Industrial Education, National Taiwan Normal
University |
255 |
Image Hiding |
1999.03.12 |
Department of Information Management, Chaoyang University of
Technology |
256 |
On Development of Our Information Education |
1999.03.17 |
Department of Business Education, National Changhua University of
Education |
257 |
Key to Emerging |
1999.04.01 |
Chin-Yi Institute of Technology and Commerce |
258 |
Image Hiding |
1999.04.14 |
Tunghai University, Department of Computer Science Information
Engineering |
259 |
Key to Emerging |
1999.04.14 |
College of Electrical and Information Engineering, I-Shou
University |
260 |
Secret Sharing of Image Data and Its Applications |
1999.04.29 |
Department of Computer Science and Information Engineering,
Tamkang University |
261 |
Road to Success |
1999.05.03 |
Ming-Chuan University |
262 |
Image Hiding |
1999.05.13 |
Department of Computer Science and Information Engineering,
National Chiao Tung University |
263 |
Watermarking Using Visual Cryptography |
1999.05.15 |
Chaoyang University of Technology (National Information Security
Conference-Keynote Speech) |
264 |
Image Hiding |
1999.05.19 |
Hua-Fan University |
265 |
Security Issues and Strategies for Electronic Commerce (EC) |
1999.05.29 |
Chungtai Institute of Health Science and Technology |
266 |
Essential Qualities of a Successful Technologist |
1999.06.02 |
College of Science and Engineering, I-Shou University |
267 |
A Progressive Codebook Training Algorithm for Image Vector
Quantization |
1999.06.04 |
Central Police University |
268 |
Information and Electronic Commerce |
1999.06.24 |
Extension Education Center of Chinese Culture University |
269 |
Progressive Image Transmission Technology |
1999.07.14 |
Department of Computer Science and Information Engineering,
National Central University |
270 |
Progressive Image Transmission Technology |
1999.07.19 |
Department of Chemistry, National Taiwan Normal University |
271 |
A Technique for Image Hiding |
1999.09.21 |
Graduate School of Information System, Department of Computer
Software, The University of Aizu, Japan |
272 |
A New Scheme of Progressive Image Transimssion Based on Bit-Plane
Method |
1999.10.21 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
273 |
A Block Based Digital Watermarks for Copy Protection of Images |
1999.10.21 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
274 |
Progressive Image Transmission Technology |
1999.10.29 |
Department of Computer Science and Information Engineering,
National Cheng Kung University |
275 |
Progressive Image Transimssion Based on Bit-Plane Method |
1999.11.02 |
Department of Computer Science & Information Management,
Providence University |
276 |
Wonders in a Red Envelope |
1999.11.15 |
BCC- The Words of Wisdom |
277 |
Digital Watermark Technology |
1999.12.15 |
Department of Business Education, National Changhua University of
Education |
278 |
Technical Writing Essentials |
2000.01.15 |
Department of Information Management, National Taichung Institute
of Technology |
279 |
Intellectual Property Protection Techniques for Images |
2000.03.21 |
Van-Nung Institute of Technology |
280 |
The Present and Prospect of Our Information Education |
2000.03.30 |
Pei-Men Senior Vocational School of Agriculture and Industrial |
281 |
Key to Success in Academic Research |
2000.04.01 |
Department of Information Management, National Taichung Institute
of Technology |
282 |
Key to Success in Academic Research |
2000.04.18 |
Department of Computer Science and Information Engineering,
Tamkang University |
283 |
Digital Watermark Technology |
2000.05.01 |
Department of Information and Computer, National Taiwan Normal
University |
284 |
Security Issues and Strategies for Electronic Commerce (EC) |
2000.05.12 |
United World Chinese Commercial Bank (at Hotel National Taichung) |
285 |
Security Issues and Strategies for Electronic Commerce (EC) |
2000.05.15 |
Ta-Te Industrial and Home Ecnomical Senior Vocational School |
286 |
Security Issues and Strategies for Electronic Commerce (EC) |
2000.05.19 |
Rotary Club of Taichung Pei-Tuen District (at Hotel National
Taichung) |
287 |
Image Hiding and Visual Cryptography |
2000.05.22 |
Graduate Institute of Electrical Engineering, National Taiwan
University |
288 |
Image Hiding |
2000.06.02 |
Department of Computer Science and Information Engineering,
National Chi Nan University |
289 |
Security Issues and Strategies for Electronic Commerce (EC) |
2000.06.23 |
National Taichung Institute of Technology |
290 |
A New Scheme for Sharing Secret Color Images in Computer Network |
2000.07.06 |
ICPAD 2000 Keynote Speech Sponsered by Iwate Prefectureal
University, Japan |
291 |
Some Techniques of Digital Watermarking on Internet |
2000.09.28 |
The Institution of Electrical Engineers, Hong Kong |
292 |
An Image Protection Scheme Based on Discrete Cosine Transformation |
2000.09.28 |
Department of Electronic Engineering, City University of Hong Kong |
293 |
Design of the Fast Chinese Indexing System in Boshiamy Input
Method |
2000.10.13 |
Department of Computer Science and Information Management,
Providence University |
294 |
The Development of Internet and Its Applications in Taiwan |
2000.10.17 |
Ewha Womans University, South Korea |
295 |
Design of the Fast Chinese Indexing System in Boshiamy Input
Method |
2000.10.31 |
Department of Information Engineering and Computer Science, Feng
Chia University |
296 |
Key to Success in Academic Research |
2000.11.06 |
Department of Computer Science and Information Engineering,
National Chiayi University |
297 |
A Method for Protection Digital Images from Being Copied Illegally |
2000.11.11 |
Chung-Chou Institute of Technology |
298 |
Some Watermarking Techniques on Internet |
2000.11.22 |
Department of Computer Science and Engineering, National Sun
Yat-Sen University |
299 |
Digital Watermark Technology |
2000.12.22 |
Graduate School of Applied Mathematics, National Chung Hsing
University |
300 |
Some Watermarking Techniques on Internet |
2000.12.26 |
National Kaohsiung University of Applied Sciences |
301 |
Digital Watermark Technology |
2001.01.02 |
Department of Computer Science & Information Management,
Providence University |
302 |
Digital Watermark Technology |
2001.01.05 |
National Taichung Institute of Technology |
303 |
Key to Success in Academic Research |
2001.03.07 |
Graduate School of Mechanical Engineering, National Chung Hsing
University |
304 |
Hiding Images Using Dynamic Bit-Replacement and Human Visual
System |
2001.03.20 |
National Chi Nan University (China-France Multimedia Conference
Keynote Speech) |
305 |
Hiding Images Using Dynamic Bit-Replacement and Human Visual
System |
2001.04.03 |
Department of Computer Science and Information Systems, the
University of Hong Kong |
306 |
Visual Cryptography |
2001.04.26 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
307 |
Color Image Hiding |
2001.04.26 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
308 |
Image Hiding Based on Color Difference |
2001.04.26 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
309 |
Hiding Images Using Dynamic Bit-Replacement and Human Visual
System |
2001.04.26 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
310 |
Hiding Binary Images Using BFT Linear Quadtrees |
2001.04.26 |
Beijing University of Posts and Telecommunications, People's
Republic of China |
311 |
Security Issues and Strategies for Electronic Commerce (EC) |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
312 |
Authentication Mechanisms |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
313 |
Popular Encryption Schemes |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
314 |
Digital Signature Technology |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
315 |
Image Hiding Technology |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
316 |
Visual Cryptography |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
317 |
Digital Watermark Technology |
2001.06.24 |
Extension Education Center of Pacific Western University (at
National Taiwan Normal University) |
318 |
Road to University |
2001.09.26 |
Taichung Second Senior High School |
319 |
Key to Success in Academic Research |
2001.10.08 |
Department of Computer Science and Information Engineering,
National Taiwan University of Science and Technology |
320 |
Key to Success in Academic Research |
2001.10.30 |
College of Computer Engineering, Wuhan University |
321 |
Experiences in Designing a Simple Database Management System |
2001.10.31 |
The State's Key Laboratory of Software Engineering, Wuhan
University, People's Republic of China |
322 |
Key to Emerging |
2001.11.06 |
Taichung Healthcare and Management University |
323 |
Data Structure and Chinese Remainder Theorem |
2001.11.09 |
Department of Computer Science & Information Management,
Providence University |
324 |
Introduction to Cryptanalysis |
2001.11.30 |
Department of Computer Science and Technology, Chung Cheng
Institute of Technology, National Defense University |
325 |
Road to Success |
2001.12.26 |
Mingdao Management College |
326 |
Efficient Indexing of Chinese Words by Pinyin |
2002.01.08 |
Department of Computer Science & Information Management,
Providence University |
327 |
Issues on Network Security and Crime7 |
2002.01.23 |
Jean-Nan Primary School |
328 |
Data Structure and Chinese Remainder Theorem |
2002.03.07 |
Department of Computer Science and Information Engineering, Da-Yeh
University |
329 |
Road to Success |
2002.03.20 |
National Chung Cheng University |
330 |
Information Hiding
Techniques |
2002.04.23 |
Department of Computer Science and Information Engineering,
Tamkang University |
331 |
Digital Watermarking Techniques |
2002.04.24 |
Department of Computer Science and Information Engineering,
Tamkang University |
332 |
Digital Image Authentication |
2002.04.25 |
Department of Computer Science and Information Engineering,
Tamkang University |
333 |
Application of Mathematics in Computer Science |
2002.04.26 |
St. John's & St. Mary's Institute of Technology |
334 |
Color Visual Cryptography |
2002.05.10 |
Department of Computer Science & Information Management,
Providence University |
335 |
Road to Success |
2002.10.31 |
Department of Computer Science and Information Engineering,
Tamkang University |
336 |
Image Hiding Techniques |
2002.11.07 |
Tokyo Denki University |
337 |
Road to Success |
2002.11.26 |
Department of Computer Science & Information Management,
Providence University |
338 |
Mathematics
and Informational Engineering |
2002.12.03 |
Department of Computer Science & Information Engineering,
National Chung Cheng University |
339 |
Visual
Cryptography |
2002.12.10 |
Tsinghua University, Beijing, People's Republic of China |
340 |
Digital
Image Hiding |
2002.12.10 |
Tsinghua University, Beijing, People's Republic of China |
341 |
Non-embedded
Watermarking |
2002.12.11 |
Tsinghua University, Beijing, People's Republic of China |
342 |
Embedded
Watermarking |
2002.12.12 |
Tsinghua University, Beijing, People's Republic of China |
343 |
Digital
Image Authentication |
2002.12.12 |
Tsinghua University, Beijing, People's Republic of China |
344 |
An
Image Database Retrieval Scheme Based upon Multivariate Analysis and Data
Mining |
2002.12.20 |
Keynote Speech, ICS 2002, National Dong Hwa University |
345 |
Road to Success |
2002.12.24 |
College of Management, Chaoyang University of Technology |
346 |
Image Hiding Technology |
2002.12.26 |
Department of Information Engineering, National Chiao Tung
University |
347 |
Road to Success |
2003.03.06 |
National Huwei Institute of Technology |
348 |
Image Compression |
2003.03.18 |
Department of Computer Science & Information Management,
Providence University |
349 |
From
Image Compression to Digital Watermarking |
2003.03.21 |
Department of Information Management, National Taichung Institute
of Technology |
350 |
The
Recent Development of Information Security |
2003.04.11 |
Keynote of General Education , National Chung Hsing
University |
351 |
From Information Hiding to Research Methodology |
2003.04.25 |
Department of Computer Science and Information Engineering,
National Dong Hwa University |
352 |
Information
Hiding Methodology |
2003.04.30 |
National Huwei
Institute of Technology |
353 |
From
Information Hiding to Research Methodology |
2003.05.23 |
Department of
Computer Science & Information Management, Providence University |
354 |
Digital
Watermark Technology |
2003.08.21 |
Industrial
Technology Research Institute of Taiwan, ROC |
355 |
Cultivating a
Correct View of Learning |
2003.09.04 |
Department of
Computer Science and Information Engineering, National Chung Cheng University |
356 |
Cultivating a Correct View of
Learning |
2003.11.07 |
Department of
Information Science and Management, Providence University |
357 |
Future - from the Perspective of
University |
2003.11.12 |
Department of Information
Management, National Huwei Institute of Technology |
358 |
Road to Success |
2003.11.26 |
Chungtai Institute of Health
Sciences and Technology |
359 |
A Secret
Information Hiding Scheme Based on Switching Tree Coding |
2003.12.05 |
Institute of
Information Science, Academia Sinica |
360 |
Information Hiding -
Steganography |
2003.12.15 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
361 |
A technique gives consideration
to Image Compression and Information Hiding |
2003.12.15 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
362 |
Key to Success in Academic
Research |
2003.12.16 |
School
of Computer Science and Telecommunications Engineering, JiangSu
University |
363 |
Information Hiding Techniques-
Steganography |
2003.12.18 |
Tsinghua University, Beijing,
People's Republic of China |
364 |
A technique gives consideration
to Image Compression and Information Hiding |
2003.12.18 |
Tsinghua University, Beijing,
People's Republic of China |
365 |
How to Fast Computation of
Exponents |
2003.12.19 |
Tsinghua University, Beijing,
People's Republic of China |
366 |
Key to Success in Academic
Research |
2003.12.23 |
Chaoyang University of
Technology |
367 |
Road to Success |
2004.03.26 |
National Changhua University of
Education |
368 |
Information Hiding Techniques-
Steganography |
2004.04.02 |
Graduate Institute of Computer
Science, National Chung Hsing University |
369 |
Cultivating a Correct View of
Learning |
2004.04.02 |
Graduate Institute of Computer
Science, National Chung Hsing University |
370 |
Security Techniques and
Applications for Electronic Commerce |
2004.05.06 |
Department of Information
Management, Tatung Institute of Commerce and Technology |
371 |
Information Hiding Techniques-
Steganography |
2004.05.19 |
Department of Computer Science,
National Tsing Hua University |
372 |
Information Hiding Techniques-
Steganography |
2004.05.28 |
Department of Computer Science
& Information Management, Providence University |
373 |
Information Security Techniques-
Steganography |
2004.05.29 |
Chang Gung University |
374 |
Cultivating a Correct View of
Learning |
2004.06.04 |
College of Science &
Technology, National Chi Nan University |
375 |
Information Hiding Techniques |
2004.07.15 |
National Security Bureau |
376 |
Hiding a Secret Image in a Cover Image |
2004.07.22 |
Ewha Womans University, South
Korea |
|
|
|
|