2008 | ||
---|---|---|
4 | EE | Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen: Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks. ICC 2008: 1722-1726 |
3 | EE | Chun-Wei Chen, Chieh-Chih Wang: 3D active appearance model for aligning faces in 2D images. IROS 2008: 3133-3139 |
2007 | ||
2 | EE | Eric Hsiao-Kuang Wu, Wei-Li Chang, Chun-Wei Chen, Kevin Chihcheng Hsu: Gateway Zone Multi-path Routing in Wireless Mesh Networks. UIC 2007: 350-359 |
2006 | ||
1 | EE | Mong-Fong Horng, Chun-Wei Chen, Chin-Shun Chuang, Cheng-Yu Lin: Identification and Analysis of P2P Traffic- An Example of BitTorrent. ICICIC (2) 2006: 266-269 |
1 | Wei-Li Chang | [2] |
2 | Chin-Shun Chuang | [1] |
3 | Mong-Fong Horng | [1] |
4 | Kevin Chihcheng Hsu | [2] |
5 | Cheng-Yu Lin | [1] |
6 | Frank Yeong-Sung Lin | [4] |
7 | Po-Hao Tsang | [4] |
8 | Chieh-Chih Wang | [3] |
9 | Eric Hsiao-Kuang Wu (Hsiao-Kuang Wu) | [2] |