Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems., and . SERE, page 187-195. IEEE, (2014)Secure logging framework integrating with cloud database., , , and . ICCST, page 13-17. IEEE, (2015)Error-tolerant spoken language understanding with confidence measuring., and . INTERSPEECH, page 1625-1628. ISCA, (2002)A unified framework to incorporate speech and language information in spoken language processing., , and . ICASSP, page 185-188. IEEE Computer Society, (1992)是非題之支持證據檢索 (Supporting Evidence Retrieval for Answering Yes/No Questions) In Chinese., , and . ROCLING, page 76-77. The Association for Computational Linguistics and Chinese Language Processing (ACLCLP), (2018)Tracking-Assisted Object Detection with Event Cameras., , , , , , , and . CoRR, (2024)High-g Capacitive Accelerometer Arrays with Low Bias Instability., , , , , , , and . PLANS, page 9-15. IEEE, (2020)A Goal-Oriented Meaning-based Statistical Multi-Step Math Word Problem Solver with Understanding, Reasoning and Explanation., , , and . IJCAI, page 5235-5237. ijcai.org, (2017)Strategy analysis for cloud storage reliability management based on game theory., and . J. Comput. Secur., 25 (2): 153-171 (2017)Two-stage probabilistic approach to text segmentation., and . INTERSPEECH, page 1081-1084. ISCA, (2001)