The co-secure domination in proper interval graphs
Zou, Yun-Hao, Liu, Jia-Jie, Chang, Shun-Chieh, Hsu, Chiun-Chieh
Published in Discrete Applied Mathematics (15.04.2022)
Published in Discrete Applied Mathematics (15.04.2022)
Get full text
Journal Article
The 2-Rainbow Domination of Sierpiski Graphs and Extended Sierpiski Graphs
Liu, Jia-jie, Chang, Shun-chieh, Lin, Chiou-jiun
Published in Theory of computing systems (01.10.2017)
Published in Theory of computing systems (01.10.2017)
Get full text
Journal Article
The dynamic LMS for line echo cancellation
Shun-Chieh Chang, Shaw-Hwa Hwang
Published in 2009 IFIP International Conference on Wireless and Optical Communications Networks (01.04.2009)
Published in 2009 IFIP International Conference on Wireless and Optical Communications Networks (01.04.2009)
Get full text
Conference Proceeding
Vector quantization based on a binary search-like algorithm
Long-Jhe Yan, Shaw-Hwa Hwang, Shun-Chieh Chang, Chi-Jung Huang
Published in 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP) (01.03.2010)
Published in 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP) (01.03.2010)
Get full text
Conference Proceeding
Early load: Hiding load latency in deep pipeline processor
Shun-Chieh Chang, Li, W.Y.-H., Yuan-Jung Kuo, Chung-Ping Chung
Published in 2008 13th Asia-Pacific Computer Systems Architecture Conference (01.08.2008)
Published in 2008 13th Asia-Pacific Computer Systems Architecture Conference (01.08.2008)
Get full text
Conference Proceeding
The Dynamic LMS for Line Echo Cancellation
Yeh, Cheng Yu, Chang, Shun Chieh, Ku, Ning Yun, Hwang, Shaw Hwa
Published in Applied Mechanics and Materials (25.01.2013)
Published in Applied Mechanics and Materials (25.01.2013)
Get full text
Journal Article
An Improvement to Tree-Structured Vector Quantization
Yeh, Cheng Yu, Chu, Chao Ping, Chang, Shun Chieh, Hwang, Shaw Hwa
Published in Applied Mechanics and Materials (25.01.2013)
Published in Applied Mechanics and Materials (25.01.2013)
Get full text
Journal Article
A Deep Learning Methodology to Detect Trojaned AI-based DDoS Defend Model
Chen, Yen-Hung, Lai, Yuan-Cheng, Lu, Cho-Hsun, Huang, Yu-Ching, Chang, Shun-Chieh, Jan, Pi-Tzong
Published in 2022 8th International Conference on Automation, Robotics and Applications (ICARA) (18.02.2022)
Published in 2022 8th International Conference on Automation, Robotics and Applications (ICARA) (18.02.2022)
Get full text
Conference Proceeding
METHOD FOR EMERGENCY TREATMENT BY ARTIFICIAL INTELLIGENCE
HWANG, Shaw Hwa, YAO, Bing Chih, CHIANG, Chih Hung, CHANG, Kun Ching, CHIANG, Yu, NG, Lit Min, SHEN, Li Te, KU, Ning Yun, CHUNG, Yao Hsing, SHYU, Ren Shi, YEH, Cheng Yu, CHEN, You Shuo, CHANG, Shun Chieh, HUANG, Chi Jung
Year of Publication 25.03.2021
Get full text
Year of Publication 25.03.2021
Patent