Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Tzung-Lin Tsai"'
Autor:
Tzung-Lin Tsai, 蔡宗霖
104
Web applications is popular in recent years, so web security becomes a severe issue. String manipulation mistakes can cause serious vulnerabilities and lead to malicious attacks from the Internet. To detect these vulnerabilities, string anal
Web applications is popular in recent years, so web security becomes a severe issue. String manipulation mistakes can cause serious vulnerabilities and lead to malicious attacks from the Internet. To detect these vulnerabilities, string anal
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/27132408269841223121
Autor:
Tzung-Lin Tsai, 蔡宗霖
103
35 U.S.C. § 285 provides that “the court in exceptional cases may award reasonable attorney fees to the prevailing party”. 35 U.S.C. § 285 is a fee-shifting rule, which is itself an exception to “American Rule”— the rule in Ameri
35 U.S.C. § 285 provides that “the court in exceptional cases may award reasonable attorney fees to the prevailing party”. 35 U.S.C. § 285 is a fee-shifting rule, which is itself an exception to “American Rule”— the rule in Ameri
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/5kwjgj
Autor:
Tzung-Lin Tsai, 蔡宗霖
99
In 1948, the concept of hologram was first proposed by D. Gabor. He demonstrated the probability of the wavefront reconstruction. D. J. DeBitetto proposed the multiplex hologram concept in 1969. It is the use of human eye parallax to receive
In 1948, the concept of hologram was first proposed by D. Gabor. He demonstrated the probability of the wavefront reconstruction. D. J. DeBitetto proposed the multiplex hologram concept in 1969. It is the use of human eye parallax to receive
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/70160764935585116920
Autor:
Yi-Chun Tsai, Kang-Hsing Fan, Tzung-Lin Tsai, Chung-Chi Lee, Tsukasa Aso, Shu-Wei Wu, Chien-Yu Lin, Chien-Kai Tseng, Chia-Ray Chen, Selvaraj Balaji, Tsi-Chian Chao
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Computer Aided Verification ISBN: 9783319415277
CAV (1)
CAV (1)
Many severe security vulnerabilities in web applications can be attributed to string manipulation mistakes, which can often be avoided through formal string analysis. String analysis tools are indispensable and under active development. Prior string
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c60115ae16537dca94108d8701f0b4e
https://doi.org/10.1007/978-3-319-41528-4_13
https://doi.org/10.1007/978-3-319-41528-4_13
Autor:
Tzung-Lin Tsai, Rong-Huay Juang, Ching-Yu Lin, Szu-Yu Wu, Han-Min Chen, Pei-Sing Chen, Ai-Ling Hour, Jen-Chieh Lee, Vinchi Wang, Hao-Ai Shui, Hui-Ming Huang
Publikováno v:
PROTEOMICS. 9:696-709
In this paper, we comprehensively evaluated the capability of imidazole-zinc reverse stain (ZN) in comparative proteomics. Three commonly used protein gel staining methods, including silver (SN), SYPRO Ruby (SR), and CB stain were investigated alongs
Autor:
Tzung-Lin, Tsai, 蔡宗霖
95
In these years, as the rapid development of experimental techniques, scientists usually utilize proteomic methodologies, such as two-dimensional electrophoresis or mass spectrometry, to dissect the identity of differentially expressed protein
In these years, as the rapid development of experimental techniques, scientists usually utilize proteomic methodologies, such as two-dimensional electrophoresis or mass spectrometry, to dissect the identity of differentially expressed protein
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/03065900688620252060