Author of the publication

A New Mechanism of Mining Network Behavior.

, , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 218-223. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Mechanism of Mining Network Behavior., , and . PAKDD, volume 2336 of Lecture Notes in Computer Science, page 218-223. Springer, (2002)Multiple-Translation Spotting for Mandarin-Taiwanese Speech-to-Speech Translation., , , and . IJCLCLP, (2004)國語文句翻台語語音系統之研究 (A Study for Mandarin Text to Taiwanese speech System) In Chinese., , and . ROCLING (1), page 37-53. The Association for Computational Linguistics and Chinese Language Processing (ACLCLP), (1999)A Design of Far-Field Speaker Localization System Using Independent Component Analysis with Subspace Speech Enhancement., , , , , , and . ISM, page 558-561. IEEE Computer Society, (2009)An Efficient TCP/IP Offload Embedded System with Deterministic Buffering Processes., , , , and . ISORC, page 211-215. IEEE Computer Society, (2009)An ARM-Based Embedded System Design for Speech-to-Speech Translation., , , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 499-508. Springer, (2006)Stress Detection Based on Multi-class Probabilistic Support Vector Machines for Accented English Speech., , , and . CSIE (7), page 346-350. IEEE Computer Society, (2009)Translation Divergence Analysis and Processing for Mandarin-English Parallel Text Exploitation., , and . ROCLING, Association for Computational Linguistics and Chinese Language Processing (ACLCLP), Taiwan, (2005)An Embedded System Design for Ubiquitous Speech Interactive Applications Based on a Cost Effective SPCE061A Micro Controller., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 83-92. Springer, (2006)Intrusion Detection Markup Language (IDML) and IDML Based Intrusion Detection Model., , and . ISAS-SCI (1), page 56-61. IIIS, (2001)