Basic Search / Search Result

  • Search Result: 16results Search Strategy: "何正信".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Multi-blackboard architectures as the control module of a meta-blackboard shell
    • Department of Electronic and Computer Engineering /80/ Master
    • Author: Fu-Hua Zhou Advisor:
    • none
    • Clicks: 222Downloads: 0
    • Full text public date This full text is not authorized to be published. (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    2

    An inexact frame-based knowledge representation and its application
    • Department of Electronic and Computer Engineering /80/ Master
    • Author: Zhi-Ming Lin Advisor:
    • none
    • Clicks: 92Downloads: 0
    • Full text public date This full text is not authorized to be published. (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Design and implementation of generalized blackboard structuring subsystem
    • Department of Electronic and Computer Engineering /79/ Master
    • Author: none Advisor:
    • none
    • Clicks: 125Downloads: 0
    • Full text public date This full text is not authorized to be published. (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Design and implementation of a prototype of generalized blackboard shell
    • Department of Electronic and Computer Engineering /79/ Master
    • Author: none Advisor:
    • none
    • Clicks: 134Downloads: 0
    • Full text public date This full text is not authorized to be published. (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Automatic Construction of A Trouble-Shooting System for Customer Relationship Management

    6

    An Intelligent Customer Retention Management System

    7

    An Automatic Attack Plan Construction Technique for Attack Correlation and Prediction

    8

    Automatic Construction of Primitive Attack Templates for Primitive Attack-based Heterogeneous Intrusion Detection
    • Department of Computer Science and Information Engineering /93/ Master
    • Author: Yu-Ren Lin Advisor:
    • The security of networked computers strongly affects network applications. Although we already have…
    • Clicks: 292Downloads: 0
    • Full text public date This full text is not authorized to be published. (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    9

    Making Expert Systems Self-Adaptive

    10

    An Agent for Options Trading and Management