公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2002 | Intelligent Control of Electric Scooters | D. T. Lee; S. J. Shiah; C. M. Lee; C. H. Wu | IASTED Int'l Conference on Intelligent Systems and Control (ISC | | | |
2005 | Interval, segment, range and priority search trees | D. T. Lee | in The Handbook of Data Structures and Applications, Dinesh P. Mehta and Sartaj Sahni, editor | | | |
2006 | An iterative distributed algorithm for multi-constraint multicast routing | Tzu-Lun Huang; D. T. Lee | Computer Communications | | | |
2005 | Labeling Points on a Single Line | Y. S. Chen; D. T. Lee; C. S Liao | International Journal of Computational Geometry & Applications | 4 | 0 | |
2002 | The Min-Max Voronoi Diagram of Polygons and Applications in VLSI Manufacturing | E. Papadopoulou; D. T. Lee | 13th Annual Int'l Symp. on Algorithms and Computation | | | |
2012 | Obstacle-Avoiding Rectilinear Steiner Tree Construction: A Steiner-Point Based Algorithm | CHIH-HUNG LIU ; S. Y. Kuo; D. T. Lee; C. S. Lin; J. H. Weng; S. Y. Yuan; SY-YEN KUO | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | | 20 | |
2007 | Phylo-mLogo: An interactive and hierarchical multiple-logo visualization tool for alignment of numerous sequences | Arthur Chun-Chieh Shih; D. T. Lee; Chin-Lin Peng; Yu-Wei Wu | Bmc Bioinformatics | | | |
2004 | Securing Web Application Code by Static Analysis and Runtime Protection | Y. W. Huang; Y. Fang; C. Hang; C. H. Tsai; D. T. Lee; SY-YEN KUO | Thirteenth International World Wide Web Conference (WWW-2004) | | | |
2007 | State of Charge Estimation for Electric Scooters by Using Learning Mechanisms | D. T. Lee; S. J. Shiah; C. M. Lee; Y. C. Wang | IEEE Transactions on Vehicular Technology | 61 | 49 | |
2004 | Verifying Web applications using bounded model checking | Y. W. Huang; Y. Fang; C. Hang; C. H. Tsai; D. T. Lee; SY-YEN KUO | International Conference on Dependable Systems and Networks (DSN-2004) | | | |
2005 | Web application security-past, present, and future | Y. W. Huang; D. T. Lee; book chapter | in Computer Security in the 21st Century, Lee and Shieh and Tygar, editors, pages 183-227, Springer Science+Business Media, Inc. | | | |