![]() |
| 2008 | ||
|---|---|---|
| 4 | EE | Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen: Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks. ICC 2008: 1722-1726 |
| 3 | EE | Chun-Wei Chen, Chieh-Chih Wang: 3D active appearance model for aligning faces in 2D images. IROS 2008: 3133-3139 |
| 2007 | ||
| 2 | EE | Eric Hsiao-Kuang Wu, Wei-Li Chang, Chun-Wei Chen, Kevin Chihcheng Hsu: Gateway Zone Multi-path Routing in Wireless Mesh Networks. UIC 2007: 350-359 |
| 2006 | ||
| 1 | EE | Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, Cheng-Yu Lin: Identification and Analysis of P2P Traffic- An Example of BitTorrent. ICICIC (2) 2006: 266-269 |
| 1 | Wei-Li Chang | [2] |
| 2 | Chin-Shun Chuang | [1] |
| 3 | Mong-Fong Horng | [1] |
| 4 | Kevin Chihcheng Hsu | [2] |
| 5 | Cheng-Yu Lin | [1] |
| 6 | Frank Yeong-Sung Lin | [4] |
| 7 | Po-Hao Tsang | [4] |
| 8 | Chieh-Chih Wang | [3] |
| 9 | Eric Hsiao-Kuang Wu (Hsiao-Kuang Wu) | [2] |