| 期刊論文1. | Bhattacharyya, D.、Das, P.、Kim, T. H.、Bandyopadhyay, K.S.(2009)。Vascular Pattern Analysis towards Pervasive Palm Vein Authentication。Journal of Universal Computer Science,15(5),1081-1089。 | 2. | Coldrick, S.、Longhurst, P.、Ivey, P.、Harmis, J.(2005)。An RandD options selection model for investment decisions。Technovation,25(3),185-193。 | 3. | Fu, H. P.、Chao, P.、Chang, T. H.、Chang, Y. S.(2008)。The impact of market freedom on the adoption of third-party electronic marketplaces: a fuzzy AHP analysis。Industrial Marketing Management,37,698-712。 | 4. | Gerdsri, N.、Kocaoglu, D. F.(2007)。Applying the Analytic Hierarchy Process (AHP) to build a strategic framework for technology road mapping。Math. Comput. Modelling,46(7),1071-1080。 | 5. | Huang, C. C.、Chu, P. Y.、Chiang, Y. H.(2008)。A fuzzy AHP application in government-sponsored RandD project selection。Omega-International Journal of Management Science,36(6),1038-1052。 | 6. | Lee, Y. G.、Song, Y. I.(2007)。Selecting the key research areas in nano-technology field using technology cluster analysis: A case study based on national RandD programs in South Korea。Technovation,27(1),57-64。 | 7. | Prabhakar, S.、Pankanti, S.、Jain, A. K.(2003)。Biometric Recognition: Security and Privacy Concerns。IEEE Security and Privacy,March/April,33-42。 | 8. | Wei, Chun Chin、Chien, Chen Fu、Wang, Mao Jiun J.(2005)。An AHP-based Approach to ERP System Selection。International Journal of Production Economics,96(1),47-62。 | 9. | Adeoye, S. O.(2010)。A Survey of Emerging Biometric Technologies。International Journal of Computer Applications,9(10),1-5。 | 10. | Bhattacharyya, D.、Ranjan, R.、Alisherov, A. F.、Choi, M. K.(2009)。Biometric Authentication: A Review。International Journal of u- and e- Service Science and Technology,2(3),13-28。 | 11. | Cappelli, R.、Maio, D.、Maltoni, D.、Wayman, J. L.、Jain, A. K.(2006)。Performance evaluation of fingerprint verification systems。IEEE Trans. Pattern Anal. Mach. Intell,28(1),3-18。 | 12. | Fleischer, T.、Decker, M.、Fiedeler, U.(2005)。Assessing emerging technologies - methodological challenges and the case of nanotechnologies。Technological Forecasting and Social Change,72(9),1112-1121。 | 13. | Goudelis, G.、Tefas, A.、Pitas, I.(2008)。Emerging Biometric Modalities: A Survey。Journal on Multimodal User Interfaces,2(3/4),217-235。 | 14. | Grijpink, J. H. A. M.(2008)。Trend report on biometrics : Some new insights, experiences and developments。Computer law and security report,24,261-264。 | 15. | Hong, J. H.、Yun, E. K.、Cho, S. B.(2005)。A Review of Performance Evaluation for Biometrics Systems。International Journal of Image and Graphics,5(3),501-536。 | 16. | Hsu, Y. G.、Tzeng, G. H.、Shyu, J. Z.(2003)。Fuzzy Multiple Criteria Selection of Government: Sponsored Frontier Technology R&D Projects。R&D Management,33(5),539-551。 | 17. | Jain, A. K.、Nandakumar, K.、Nagar, A.(2008)。Biometric Template Security。EURASIP Journal on Advances in Signal Processing 2008。 | 18. | Jain, A. K.、Ross, A.、Pankanti, S.(2006)。Biometric: A Tool for Information Security。IEEE Trans. Information Forensics and Security,1(2),125-144。 | 19. | Jain, A. K.、Ross, A.、Prabhakar, S.(2004)。An Introduction to Biometric Recognition。IEEE Transactions on Circuits and Systems for Video Technology,14(1),4-20。 | 20. | Kim, W. K.、Han, S. K.、Oh, K. J.、Kim, T. Y.、Ahn, H. C.、Song, C. W.(2010)。The dual analytic hierarchy process to prioritize emerging technologies。Technological Forecasting and Social Change,77(4),566-577。 | 21. | Kong, A.、Zhang, D.、Kamel, M.(2009)。A survey of palm print recognition。Pattern Recognition,42(7),1408-1418。 | 22. | Lee, Amy H. I.、Chen, Wen-Chin、Chang, Ching-Jan(2008)。A fuzzy AHP and BSC approach for evaluating performance of IT development in the manufacturing industry in Taiwan。Expert Systems with Applications,34(1),96-107。 | 23. | Riley, R. A.、Kleist, V. F.(2005)。The biometric technologies business case: a systematic approach。Information Management and Computer Security,13(2),89-105。 | 24. | Ross, A.(2010)。Iris recognition: The path forward。IEEE Computer,43(2),30-35。 | 25. | Ross, A.、Dass, S.、Jain, A. K.(2005)。A deformable model for fingerprint matching。Journal of Pattern Recognition,38(1),95-103。 | 26. | Shehabuddeen, N.、Prober, D.、Phaal, R.(2006)。From theory to practice: Challenges in operationalising a technology selection framework。Technovation,26(3),324-407。 | 27. | Shen, Y. C.、Chang, S. H.、Lin, G. T. R.、Yu, H. C.(2010)。A hybrid selection model for emerging technology。Technological Forecasting and Social Change,77,151-166。 | 28. | Tran, T. A.、Daim, T.(2008)。A taxonomic review of methods and tools applied in technology assessment。Technological Forecasting and Social Change,75(9),1396-1405。 | 29. | Uludag, U.、Pankanti, S.、Prabhakar, S.、Jain, A.K.(2004)。Biometric Cryptosystems: Issues and Challenges。Proceedings of the IEEE,92(6),948-960。 | 30. | Vielhauer, C.(2006)。Biometric Modalities. Different Traits for Authenticating Subjects: Chapter 3 in Biometric User Authenticating for IT Security。Advances in Information Security,18(1),33-75。 | 31. | Jain, A. K.、Ross, A.(2004)。Multibiometric Systems, Appeared in Communication of the ACM。Special Issue on Multimodal Interfaces,47(1),34-40。 | 32. | Opricovic, S.、Tzeng, G. H.(2003)。Defuzzification within a multi criteria decision model。International Journal of Uncertainty, Fuzziness and Knowledge-based Systems,11(5),635-652。 | 33. | Tsaur, S. H.、Tzeng, G. H.、Wang, G. C.(1997)。Evaluating tourist risks from fuzzy perspectives。Annals of Tourism Research,24(4),796-812。 | 34. | Chan, F. T. S.、Kumar, N.(2007)。Global supplier development considering risk factors using fuzzy extended AHP-based approach。Omega,35(4),417-431。 | 35. | Hu, A. H.、Hsu, C. W.、Kuo, T. C.、Wu, W. C.(2009)。Risk evaluation of green components to hazardous substance using FMEA and FAHP。Expert Systems with Applications,36(3),7142-7147。 | 36. | Buckley, James J.(1985)。Fuzzy hierarchical analysis。Fuzzy Sets and Systems,17(3),233-247。 | 37. | Van Laarhoven, P. J. M.、Pedrycz, W.(1983)。A Fuzzy Extension of Saaty's Priority Theory。Fuzzy Sets and Systems,11(1-3),229-241。 | 38. | Zadeh, Lotfi Asker(1965)。Fuzzy sets。Information and Control,8(3),338-353。 | 39. | Vaidya, Omkarprasad S.、Kumar, Sushil(2006)。Analytic Hierarchy Process: An Overview of Applications。European Journal of Operational Research,169(1),1-29。 | 40. | Deng, H.(1999)。Multicriteria Analysis with Fuzzy Pairwise Comparison。International Journal of Approximate Reasoning,21(3),215-231。 | 會議論文1. | Balestra, G.、Knaflitz, M.、Massa, R.、Sicuro, M.(2007)。AHP for the acquisition of biomedical instrumentation.Conf3581-3584。 | 2. | Delac, K.、Grgic, M.(2004)。A Survey of Biometric Recognition Methods。46th International Symposium Electronics in Marine, ELMAR-2004。Zadar, Croatia。 | 3. | Matsumoto, T.、Hoshino, H.、Yamada, K.、Hasino, S.(2006)。Impact of artificial gummy fingers on fingerprint systems。Proc. of SPIE,4677。 | 4. | Dabbah, M. A.、Woo, W. L.、Dlay, S. S.(200704)。Secure Authentication for Face Recognition。IEEE Symposium on Computational Intelligence in Image and Signal Processing,(會議日期: 2007/04),121-126。 | 5. | Ganorkar, R. S.、Ghatol, A. A.(2007)。Iris Recognition: An Emerging Biometric Technology。The 6th WSEAS International Conference on Signal Processing, Robotics and Automation。Greece。91-96。 | 6. | Kar, B.、Kartik, B.、Dutta, P. K.(2006)。Speech and Face Biometric for Person Authentication。IEEE International Conference on Industrial Technology,391-396。 | 研究報告1. | National Biometric Security Project(2008)。Biometric Technology Application Manual Volume One。 | 圖書1. | Bolle, R. M.、Connell, J. H.、Pankanti, S.、Ratha, N. K.、Senior, A. W.(2004)。Guide to Biometrics。New York:Springer。 | 2. | Yu, O. S.、Hsu, G. J. Y.、Chen, T. Y.(1998)。Introduction to Technological Management: Technological Forecast and Planning。Taipei:Wu Nan Publishing Company。 | 3. | Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。 | 4. | Heyer, R.(2008)。Biometrics Technology Review 2008。Edinburgh, South Australia:DSTO。 | 5. | International Biometric Group(2009)。Biometrics Market and Industry Report 2009-2014。New York:International Biometric Group。 | 6. | Kent, S.、Millett, L.(2003)。Who Goes There?: Authentication Technologies Through the Lens of Privacy。National Academies Press。 | 其他1. | Biometrics Identity Management Agency(2010)。Biometrics Glossary version 4.0, Software Engineering Center CECOM Life Cycle Management Command (2010),http://www.biometrics.dod.mil/Files/Documents/Standards/BioGlossary.pdf。 | 2. | National Science and Technology Council(2006)。Biometrics Foundation Documents,http://www.biometrics.gov/documents/biofoundationdocs.pdf。 | |
| |