Predictors for self-discontinuation of anti-osteoporosis medication: A hospital-based real-world study
Deng, Ya-Lian, Hsu, Chun-Sheng, Hsu, Chiann-Yi, Chen, Chih-Hui, Ou, Shiang-Ferng, Liu, Chin-Feng, Yang, Shu-Hui, Shih, Chun-Hsi, Chen, Yi-Ming, Lee, Hsu-Tung
Published in PloS one (21.09.2022)
Published in PloS one (21.09.2022)
Get full text
Journal Article
Accessing data from many servers simultaneously and adaptively in data grids
Chang, Ruay-Shiung, Lin, Chun-Fu, Hsi, Shih-Chun
Published in Future generation computer systems (2010)
Published in Future generation computer systems (2010)
Get full text
Journal Article
An efficient and bandwidth sensitive parallel download scheme in data grids
Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, Shih-Chun Hsi
Published in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08) (01.01.2008)
Published in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08) (01.01.2008)
Get full text
Conference Proceeding
Predictors for self-discontinuation of anti-osteoporosis medication: A hospital-based real-world study
Ya-Lian Deng, Chun-Sheng Hsu, Chiann-Yi Hsu, Chih-Hui Chen, Shiang-Ferng Ou, Chin-Feng Liu, Shu-Hui Yang, Chun-Hsi Shih, Yi-Ming Chen, Hsu-Tung Lee
Published in PloS one (01.01.2022)
Get full text
Published in PloS one (01.01.2022)
Journal Article
A fast shrinking suspicious criminal system from the voice
Chun-Hsi Shih, Chi-Shi Liu, Chun-Hsiao Lee, So-Lin Yen, Jung-Hsiang Liao, Bor-Shenn Jeng
Published in Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology (Cat. No.98CH36209) (1998)
Published in Proceedings IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology (Cat. No.98CH36209) (1998)
Get full text
Conference Proceeding
Some study results of speaker verification from Chung-Hwa TL and MJIB of ROC
Chi-Shi Liu, Liu, D.H., So-Lin Yen, Jung-Hsiang Liao, Chun-Hsi Shih, Bor-Shenn Jeng
Published in Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology (1997)
Published in Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology (1997)
Get full text
Conference Proceeding
Verification system and verification method for malicious file of container
CHOU, KUO-SEN, SHIH, CHUN-HSI, HUA, CHIENIH, LIAO, CHEING, CHO, CHENG-YI
Year of Publication 01.03.2024
Get full text
Year of Publication 01.03.2024
Patent
Verification system and verification method for malicious file of container
CHOU, KUO-SEN, SHIH, CHUN-HSI, HUA, CHIENIH, LIAO, CHEING, CHO, CHENG-YI
Year of Publication 21.12.2023
Get full text
Year of Publication 21.12.2023
Patent
Malicious program detection method and system
TSAI, YU-LUNG, CHANG, JIA-MING, HUANG, TINGIEN, SHIH, CHUN-HSI, HUA, CHIENIH
Year of Publication 11.04.2023
Get full text
Year of Publication 11.04.2023
Patent
Malicious program detection method and system
TSAI, YU-LUNG, CHANG, JIA-MING, HUANG, TINGIEN, SHIH, CHUN-HSI, HUA, CHIENIH
Year of Publication 16.06.2022
Get full text
Year of Publication 16.06.2022
Patent
Method and device for finding amalicious encrypted connection fingerprint
CHEN, CHIENIH, LO, WEN-YANG, HUANG, CHUANIANG, SHIH, CHUN-HSI, JENG, TZUNG-HAN, CHANG, KUANG-HUNG
Year of Publication 16.01.2021
Get full text
Year of Publication 16.01.2021
Patent