資訊科學研究所. 王大為 (Wang, Da-Wei)

Size: px
Start display at page:

Download "資訊科學研究所. 王大為 (Wang, Da-Wei)"

Transcription

1 資訊科學研究所 王大為 (Wang, Da-Wei) Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P Chen "Value versus damage of information release: A data privacy perspective," in International Journal of Approximate Reasoning, Volum 43, No. 2, October Chia-Fen Hsieh, Bo-Jui Chang, Chyi-Huey Pai, Hsuan-Yi Chen, Jin-Wu Tsai, Yung-Hsiang Yi, Yi-Ting Chiang, Da-Wei Wang, Sien Chi, Long Hsu, and Chi-Hung Lin, "Stepped Changes of Monovalent Ligand-binding Force during Ligand-induced Clustering of Integrin IIB3," Journal of Biological Chemistry, volume 281, pages , September Cho-Chin Lin, Dai-Wei Wang and Tsan-Sheng Hsu, "Bounds on the Client-server Incremental Computing,," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, volume E89-A, number 5, pages , May Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "An epistemic framework for privacy protection in database linking," Data and Knowledge Engineering, 2006, Accepted Chun-Chen Hsu, Pangfeng Liu, Da-wei Wang, and Jan-Jan Wu, "Title: Generalized Edge Coloring for Channel Assignment in Wireless Networks," To Appear in THE 2006 INTERNATIONAL CONFERENCE ON Parallel Processing (ICPP2006), August 14-18, 2006, Columbus, Ohio, USA. Da-Wei Wang, Chrun-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu, "Information Theoretical Analysis of Two-Party Secret Computation," Data and Application Security, Lecture Notes in Computer Science, number 4127, Lecture notes in computer science, Ernesto Damiani and Peng Liu, editors, Springer, pages , July Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "Attribute-oriented Granulation for Privacy Protection," IEEE International Conference on Granular Computing, pages , Atlanta, USA, May 10-12, 75

2 Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "A GrC-based approach to ocial nnetwork data protection," Proc. of the Fifth International Conference on Rough Sets and Current Trends in Computing, LANI 4259, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, "Privacy Protection in Social Network Data Disclosure Based on Granular Computing," IEEE International Conference on Fuzzy Systems, pages , 王建民 (Wang, Chien-Min) D.-R. Chen, C.-C. Hsu and C.-M. Wang, "Scheduling Real-Time Multi-Processor Systems with Distance-Constrained Tasks Using the Early-Release-Fair Model," IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, volume E89-A, number 11, pages , November Y.-F. Lin, C.-M. Wang, and Jan-Jan Wu, "Optimizing I/O Server Placement for Parallel I/O on Switch-Based Irregular Networks," The Journal of Supercomputing, volume 36, number 3, pages , June C.-M. Wang, S.-F. Hong, S.-T. Wang and H.-M Chen, "A Dual-mode Exerciser for a Collaborative Computing Environment," Journal of Internet Technology, volume 7, number 1, pages 13-21, C.-M. Wang, H.-M. Chen, C.-C. Chang, and J.-J. Wu, "A High-Performance Virtual Storage System for Taiwan UniGrid," Proceedings of the Third Workshop on Grid Technologies and Applications, Hsinchu, Taiwan December C.-M. Wang, S.-T. Wang, H.-M. Chen and C.-C. Huang, "An Extensible Mechanism for Long-Term Persistence of JavaBeans Components," Proceedings of the 4th International Symposium on the Principles and Practice of Programming in Java, pages , Mannheim, Germany August C.-M. Wang, C.-C. Hsu, H.-M. Chen and J.-J. Wu, "Efficient Multi-Source Data Transfer in Data Grids," Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid, pages , Singapore May C.-M. Wang, C.-C. Hsu, P. Liu, H.-M. Chen and J.-J. Wu, "Optimizing Server Placement in Hierarchical Grid Environments," Proceedings of the 2006 International Conference on Grid and Pervasive Computing, pages 1-11, Taichung, Taiwan May 76

3 王柏堯 (Wang, Bow-Yaw) Ming-Hsien Tasi and Bow-Wang Wang. Modular Formalization of Reactive Modules in Coq. 11th Annual Asian Computing Science Conference (ASIAN '06)Tokyo, Japan. December 6-8, Ming-Hsien Tasi and Bow-Wang Wang. Formalization of CTL* in the Calculus of Inductive Constructions. 11th Annual Asian Computing Science Conference (ASIAN '06) Tokyo, Japan. December 6-8, Bow-Wang Wang. Modeling and Analyzing Applications with Domain-Specific Languages by Reflective Rewriting: a Case Study. 21st ACM Symposium on Applied Computing Dijon, France. April 23-27, Bow-Yaw Wang. Automatic Verification of a Model Checker by Reflection. Eighth International Symposium on Practical Aspects of Declarative Languages Charleston, South Carolina, USA. January 9-10, 王新民 (Wang, Hsin-Min) Jen-Wei Kuo, Shih-Hung Liu, Hsin-min Wang, and Berlin Chen, "An Empirical Study on Word Error Minimization Approaches for Mandarin Large Vocabulary Continuous Speech Recognition," International Journal of Computational Linguistics and Chinese Language Processing, volume 11, number 3, pages , September Wei-Ho Tsai and Hsin-min Wang, "Speech Utterance Clustering Based on the Maximization of Within-cluster Homogeneity of Speaker Voice Characteristics," The Journal of the Acoustical Society of America, volume 120, number 3, pages , September Chuang-Hua Chueh, Hsin-min Wang, and Jen-Tzung Chien, "A Maximum Entropy Approach for Semantic Language Modeling," International Journal of Computational Linguistics and Chinese Language Processing, volume 11, number 1, pages 37-56, March Wei-Ho Tsai and Hsin-min Wang, "Automatic singer recognition of popular music recordings via estimation and modeling of solo vocal signals," IEEE Trans. on Audio, Speech, and Language Processing, volume 14, number 1, pages , January 77

4 Yi-Ting Chen, Suhan Yu, Hsin-min Wang and Berlin Chen, "Extractive Chinese Spoken Document Summarization Using Probabilistic Ranking Models," International Symposium on Chinese Spoken Language Processing (ISCSLP2006), Lecture Notes in Artificial Intelligence, 4274, December Yi-Hsiang Chao, Hsin-min Wang and Ruei-Chuan Chang, "A Novel Alternative Hypothesis Characterization Using Kernel Classifiers for LLR-based Speaker Verification," International Symposium on Chinese Spoken Language Processing (ISCSLP2006), Lecture Notes in Artificial Intelligence, 4274, December Tzan-Hwei Chen, Berlin Chen and Hsin-min Wang, "On Using Entropy Information to Improve Posterior Probability based Confidence Measures," International Symposium on Chinese Spoken Language Processing (ISCSLP2006), Lecture Notes in Artificial Intelligence, 4274, December Shih-Sian Cheng, Yeong-Yuh Xu, Hsin-min Wang and Hsin-Chia Fu, "Automatic Construction of Regression Class Tree for MLLR via Model-based Hierarchical Clustering," International Symposium on Chinese Spoken Language Processing (ISCSLP2006), Lecture Notes in Artificial Intelligence, 4274, December Jen-Wei Kuo and Hsin-min Wang, "A Minimum Boundary Error Framework for Automatic Phonetic Segmentation," International Symposium on Chinese Spoken Language Processing (ISCSLP2006), Lecture Notes in Artificial Intelligence, 4274, December Hung-Ming Yu, Wei-Ho Tsai, and Hsin-min Wang, "A Music Retrieval System based on Query-by-singing for Karaoke Jukebox," Asian Information Retrieval Symposium (AIRS2006), Lecture Notes in Computer Science, 4182, October Yi-Hsiang Chao, Wei-Ho Tsai, Hsin-min Wang and Ruei-Chuan Chang, "Improving the Characterization of the Alternative Hypothesis via Kernel Discriminant Analysis for Likelihood Ratio-based Speaker Verification," The Ninth International Conference on Spoken Language Processing (Interspeech ICSLP), September Jen-Wei Kuo and Hsin-min Wang, "Minimum Boundary Error Training for Automatic Phonetic Segmentation," The Ninth International Conference on Spoken Language Processing (Interspeech ICSLP), September 78

5 Shih-Sian Cheng, Yi-Hsiang Chao, Hsin-min Wang, and Hsin-Chia Fu, "A Prototypes-Embedded Genetic K-means Algorithm," International Conference on Pattern Recognition (ICPR2006), August Yi-Hsiang Chao, Wei-Ho Tsai, Hsin-min Wang, and Ruei-Chuan Chang, "A Kernel-based Discrimination Framework for Solving Hypothesis Testing Problems with Application to Speaker Verification," International Conference on Pattern Recognition (ICPR2006), August Wei-Ho Tsai and Hsin-min Wang, "On maximizing the within-cluster homogeneity of speaker voice characteristics for speech utterance clustering," IEEE Int. Conf. Acoustics, Speech, Signal processing (ICASSP2006), May Sin-Horng Chen, Chiu-yu Tseng, and Hsin-min Wang, "Chapter 4: Tone Modeling for Speech Synthesis," Advances in Chinese Spoken Language Processing, edited by Chin-Hui Lee, Haizhou Li, Lin-shan Lee, Ren-Hua Wang, and Qiang Huo, pp , World Scientific, Berlin Chen, Hsin-min Wang, and Lin-shan Lee, "Chapter 13: Spoken Document Retrieval and Summarization," Advances in Chinese Spoken Language Processing, edited by Chin-Hui Lee, Haizhou Li, Lin-shan Lee, Ren-Hua Wang, and Qiang Huo, pp , World Scientific, 何建明 (Ho, Jan-Ming) Kai-Hsiang Yang, Chi-Jen Wu and Jan-Ming Ho, "AntSearch: An Ant Search Algorithm in Unstructured Peer-to-Peer Networks," IEICE Transactions on Communications Special Section on Networking Technologies for Overlay Networks, September Jeng-Wei Lin, Jan-Ming Ho, Li-Ming Tseng and Feipei Lai, "IDN Server Proxy Architecture for Internationalized Domain Name Resolution and Experiences with Providing Web Services," ACM Transactions on Internet Technology (ACM TOIT), volume 6, number 1, February Wen-Dar Lin, Yun-Ching Chen, Jan-Ming Ho and Chung-Der Hsiao, "GOBU: toward to an integration interface for biological objects," Information Science and Engineering, volume 22, number 1, pages 19-30, Yun-Ching Chen, Chung-Der Hsiao, Wen-Dar Lin, Chung-Ming Hu, Pung-Pung Hwang and Jan-Ming Ho, "ZooDDD: a cross-species database for digital 79

6 differential display analysis," Bioinformatics, volume 22, number 17, pages , Jeng-Wei Lin, Ray-I Chang, Jan-Ming Ho and Feipei Lai, "FOS: A Funnel-Based Approach for Optimal Online Traffic Smoothing of Live Video," IEEE Transactions on Multimedia, Kai-Hsiang Yang, and Jan-Ming Ho, "Proof: A DHT-based Peer-to-Peer Search Engine," IEEE/WIC/ACM International Conference on Web Intelligence (WI-06), Hong Kong, December Kai-Hsiang Yang, Kun-Yan Chiou, Hahn-Ming Lee, and Jan-Ming Ho, "Web Appearance Disambiguation of Personal Names Based on Network Motif," IEEE/WIC/ACM International Conference on Web Intelligence (WI-06), Hong Kong December Guo-Hsing Lee, Nai-Yu Chuang, Wen-Dar Lin, Hahn-Ming Lee, Chung-Der Hsiao and Jan-Ming Ho, "E2D: A Novel Tool for Annotating Protein Domains in Expressed Sequence Tags," 2006 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology(CIBCB), September 28-29, Chi-Jen Wu, Kai-Hsiang Yang, Jan-Ming Ho, "AntSearch: An Ant Search Algorithm in Unstructured Peer-to-Peer Networks," IEEE Symposium on Computers and Communications (ISCC'06), June Hsiang-An Wang, Guey-Ching Chen, Chih-Yi Chiu, Jan-Ming Ho, "A Digital Video Archive System of NDAP Taiwan," international conference in Asian Digital Library(ICADL), Nov , Kyoto, Japan, 吳真貞 (Wu, Jan-Jan) Y.-M. Chung, P. Liu, and Jan-Jan Wu, Server Placement in the Presence of Competition, Workshop on Grid Technology and Applications (WoGTA), Taiwan, Dec. H.-K. Wang, P. Liu and Jan-Jan Wu, A QoS-Aware Heuristic Algorithm for Replica Placement, Grid 2006, Australia, Sept. C.-C. Hsu, P. Liu, D.-W. Wang, and Jan-Jan Wu, Generalized Edge Coloring for Channel Assignment in Wireless Networks, International Conference on Parallel Processing (ICPP), Ohio, USA, August, 80

7 P. Liu, Yi-Fang Lin, and Jan-Jan Wu, "Optimal Placement of Replicas in Data Grid Environments with Locality Assurance," International Conference on Parallel and Distributed Systems, (ICPADS), July 12-15, Y.-F. Lin, C.-M. Wang, and Jan-Jan Wu, Optimizing I/O Server Placement for Parallel I/O on Switch-Based Irregular Networks, The Journal of Supercomputing, vol. 36, no. 3, pp , June, Y.-F. Lin, Z.-H. Kang, and Jan-Jan Wu, An optimal scheduling algorithm for an agent-based multicast strategy on irregular networks,, International Conference on Grid and Pervasive Computing (GPC), LNCS 3947, Taiwan, May P. Liu and Jan-Jan Wu, Optimal replica placement strategy for hierarchical data grid systems, International Conference on Cluster Computing and the Grid (CCGrid), Singapore, May 呂及人 (Lu, Chi-Jen) Fu Chang, Chin-Chin Lin, and Chi-Jen Lu, "Adaptive prototype learning algorithms: theoretical and experimental studies," Journal of Machine Learning Research, volume 7(Oct), pages pp , Yan-Cheng Chang, Chun-Yun Hsiao, and Chi-Jen Lu, "The impossibility of basing one-way permutations on central cryptographic primitives," Journal of Cryptology, volume 19, number 1, pages , Chia-Jung Lee, Chi-Jen Lu, and Shi-Chun Tsai, "Deterministic extractors for independent-symbol sources," In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), pages 84-95, S. Servolo, Venice Italy, July 9-16, Chi-Jen Lu, "On the complexity of parallel hardness amplification for one-way functions," Proceedings of the 3rd Theory of Cryptography Conference (TCC), pages , Columbia University, New York, NY USA, March 4-7 呂俊賢 (Lu, Chun-Shien) Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, and Pao-Chi Chang, "Media Hash-dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection," IEEE Trans. on Multimedia, volume 8, number 4, pages , August 81

8 Chao-Yong Hsu, Chun-Shien Lu, and Soo-Chang Pei, "Joint Screening Halftoning and Visual Cryptography for Image Protection," Int. Workshop on Digital Watermarking, Lecture Notes in Computer Science, Korea, Nov. 8-10, (invited paper) L. W. Kang and C. S. Lu, "Low-complexity Wyner-Ziv video coding based on robust media hashing," Proc. of 2006 IEEE Int. Workshop on Multimedia Signal Processing, pages , Victoria, BC, Canada, October Li-Wei Kang and Chun-Shien Lu, "Wyner-Ziv Video Coding with Coding Mode Hiding-based Motion Compensation," Proc. IEEE Int. Conf. on Image Processing, USA, Oct. 8-11, Chao-Yong Hsu and Chun-Shien Lu, "Informed Authentication Watermarking via Stego Data Reconstruction," IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, France, May 14-19, Yu-Chen Huang, Chun-Shien Lu, and Hsiao-Kuang Wu, "Available Bandwidth Estimation via One-Way Delay Jitter and Queuing Delay Propagation Model," Proc. IEEE Wireless Communication and Networking Conference, USA, Jan. 8-10, Shih-Wei Sun, Jan-Ru Chen, Chun-Shien Lu, Pao-Chi Chang, and Kuo-Chin Fan, "Motion-Embedded Residual Error for Packet Loss Recovery of Video Transmission and Encryption," IS&T/SPIE: Visual Communications and Image Processing, volume EI127, IS&T/SPIE, January 宋定懿 (Sung, Ting-Yi) Tzong-Han Tsai, Shih-Hung Wu, Wen-Chi Chou, Yu-Chun Lin, Ding He, Ting-Yi Sung, Wen-Lian Hsu, Various Criteria in the Evaluation of Biomedical Named Entity Recognition, BMC Bioinformatics. 7:92, (2006) Ching-Tai Chen, Hsin-Nan Lin, Ting-Yi Sung and Wen-Lian Hsu, "A Knowledge-based Approach to Protein Local Structure Prediction," to appear in Journal of Bioinformatics and Computational Biology, also in Proceedings of Asia Pacific Bioinformatics Conference (APBC), (2006). Kuen-Pin Wu, Jia-Ming Chang, Jun-Bo Chen, Chi-Fon Chang, Wen-Jin Wu, Tai-Huang Huang, Ting-Yi Sung and Wen-Lian Hsu, RIBRA-an Error-Tolerant Algorithm for the NMR Backbone Assignment Problem, to Journal of 82

9 Computational Biology 13(2), , 2006; also appeared in Proceedings of the International conference on Research in Computational Molecular Biology (RECOMB 05), (2005), Acceptance rate, 18% (39/217) Wen-Ting Lin, Wei-Neng Hung, Yi-Hwa Yian, Kun-Pin Wu, Chia-Li Han, Yet-Ran Chen, Yu-Ju Chen, Ting-Yi Sung and Wen-Lian Hsu, "Multi-Q: A Fully Automated Tool for Multiplexed Protein Quantitation," Journal of Proteome Research 5, , Tzong-han Tsai, Wen-Chi Chou, Shih-Hung Wu, Ting-Yi Sung, Jieh Hsiang, Wen-Lian Hsu, "Integrating Linguistic Knowledge into a Conditional Random Field Framework to Identify Biomedical Named Entities," Expert Systems with Applications 30 (1), , (2006). Wen-Chi Chou, Richard Tzong-Han Tsai, Ying-Shan Su,Wei Ku, Ting-Yi Sung and Wen-Lian Hsu, "A Semi-Automatic Method for Annotating a Biomedical Proposition Bank," Proceedings of ACL Workshop on Frontiers in Linguistically Annotated Corpora, Sydney, Australia, July 22, Chia-Yu Su, Allan Lo, Hua-Sheng Chiu, Ting-Yi Sung, Wen-Lian Hsu, "Protein Subcellular Localization Prediction Based on Compartment-Specific Biological Features," Proceedings of IEEE Computational Systems Bioinformatics Conference (CSB), Stanford, CA, Allan Lo, Hua-Sheng Chiu, Ting-Yi Sung, Wen-Lian Hsu, "Transmembrane Helix and Topology Prediction Using Hierarchical SVM Classifiers and an Alternating Geometric Scoring Function," Proceedings of IEEE Computational Systems Bioinformatics Conference (CSB), Stanford, CA, Hua-Sheng Chiu, Hsin-Nan Lin, Allan Lo, Ting-Yi Sung, Wen-Lian Hsu, "A two-stage classifier for protein beta-turn prediction using support vector machines," Proceedings of IEEE International Conference on Granular Computing (IEEE GrC), USA, May 10-12, 李丕榮 (Lee, Pei-Zong) "Compiler and Run-time Parallelization Techniques for Scientific Computations on Distributed Memory Parallel Computers," pp , with Chien-Min Wang and Jan-Jan Wu, as chapter 8, included in the book High Performance 83

10 Computing: Paradigm and Infrastructure, edited by Dr. Laurence T. Yang and Dr. Minyi Guo, John Wiley & Sons, Inc., 李德財 (Lee, Der-Tsai) Tzu-Lun Huang and D. T. Lee, "An iterative distributed algorithm for multi-constraint multicast routing," Computer Communications, Vol. 29, No. 17, November 2006, pp Tzu-Lun Huang and D. T. Lee, "An iterative distributed algorithm for multi-constraint multicast routing," Computer Communications, Vol. 29, No. 17, November 2006, pp A.C.-C. Shih, D.T. Lee, L. Lin, C.-L. Peng, S.-H. Chen, C.-Y. Wong, M.-Y. Chou, T.-C. Shiao, M.-F. Hsieh and Y.-W. Wu, "SinicView: A visualization environment for comparisons of multiple nucleotide sequence alignment tools," BMC Bioinformatics, volume 7, number 103, pages , March Jinn Ho, Wen-Liang Hwang, Henry Horn-Shing Lu, D. T. Lee, "Gridding spot centers of smoothly distorted microarray images," IEEE Transactions on Image Processing, volume 15, number 2, pages , Tien Ching Lin and D. T. Lee, Efficient Algorithms for the Sum Selection Problem and k Maximum Sums Problem, Proc. 17th International Symposium on Algorithms and Computation (ISAAC 2006), Kolkata, India, Dec , 2006, pp Jyh-da Wei and D. T. Lee, "Priority-Based Genetic Local Search and its Application to the Traveling Salesman Problem," Proc. Sixth International Conference on Simulated Evolution and Learning, Hefei, China, October 15-18, 2006, pp Arthur Chun-Chieh Shih, D. T. Lee, Yu-Wei Wu and Chin-Lin Peng, "Phylo-MLogo: An Interactive Multiple-Logo Visualization Tool for Large-number Sequence Alignments," Proc. IEEE Computational Systems Bioinformatics Conference, Stanford University, California, August 14-18, M. H. Tsai, J. D. Wei, J. H. Huang and D. T. Lee, A Portable Geometric Algorithm Visualization System with Dynamic Camera Positioning for Tracking 3D Objects, Proc. 22nd Annual ACM Symposium on Computational Geometry, Sedona, Arizona, June, 2006, pp

11 M. Y. Chen, J. D. Wei, J. H. Huang and D. T. Lee, Design and Applications of an Algorithm Benchmark System in a Computational Problem Solving Environment, Proc.11th Annual Conference on Innovation and Technology in Computer Science Education, Bologna, Italy, June, 2006, pp 林仲彥 (Lin, Chung-Yen) Jiang S. S., Chang I. S., Huang L. W., Chen P. C., Wen C. C., Liu S. C., Chien L. C., Lin C. Y., Hsiung C. A., Juang J. L., "Temporal Transcription Program of Recombinant Autographa californica Multiple Nucleopolyhedrosis Virus.," J. Virol., volume 80, pages , July 2006, (SCI/ 5.178) Wen, C. C., Wu, Y. J., Huang, Y. H., Chen, W. C., Liu, S. C., Jiang, S. S., Juang, J. L., Lin, C. Y., Fang, W. T., Hsiung, C. A., Chang, I. S., "A Bayes Regression Approach to Array-CGH Data," Statistical Applications in Genetics and Molecular Biology, volume 5, number 1, May 2006, ( (Medline Index) Chang, C. C., Lin, H. C., Lin, I. P., Chang, T. Y., Chen, H. H., Chen, W. H. Cheng, C. H., Lin, C. Y. Liu, S. M. Chang, C. C. Chaw, S. M., "The Chloroplast Genome of Phalaenopsis aphrodite ( Orchidaceae ) : Comparative Analysis of Evolutionary Rate with That of Grasses and Its Phylogenetic Implications.," Mol. Bio. Evol, volume 23, pages , April 2006, (SCI/ 6.355) Pan W. H., Lynn K. S., Chen C. H., Wu Y. L., Lin C. Y., Chang H.Y., "Using endophenotypes for pathway clusters to map complex disease genes.," Gen. Epi., volume 30, number 2, pages , March 2006, (SCI/5.42) 施純傑 (Shih, Chun-Chieh) Arthur Chun-Chieh Shih, D.T. Lee, Laurent Lin, Chin-Lin Peng, Shiang-Heng Chen, Yu-Wei Wu, Chun-Yi Wong, Meng-Yuan Chou, Tze-Chang Shiao, and Mu-Fen Hsieh, "SinicView: A visualization environment for comparisons of multiple nucleotide sequence alignment tools," BMC Bioinformatics, volume 7, number 103, Arthur Chun-Chieh Shih, D.T. Lee, Chin-Lin Peng, and Yu-Wei Wu, "Phylo-mLogo: An interactive multiple-logo visualization tool for large-number sequence 85

12 alignments," To Appear in 2006 IEEE Computational Systems Bioinformatics Conference. Chi-Fang Chin, Arthur Chun-Chieh Shih, and Kuo-Chin Fan, "Clustering and extraction of co-transcription profiles from time-course gene expression data," in the 11th Conference on Artificial Intelligent and Applications, Dec , Yu-Ming Liang, Sheng-Wen Shih, Arthur Chun-Chieh Shih, and Hong-Yuan Mark Liao, "Understanding Human Behavior Using a Language Modeling Approach", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp , December 徐讚昇 (Hsu, Tsan-Sheng) Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, and Jeremy K.-P. Chen, "Value and Damage of Information: A Data Security Perspective," International Journal of Approximate Reasoning, pages , Da-Wei Wang, Churn-Jung Liau, and Tsan-sheng Hsu, "Privacy Protection in Social Network Data Disclosure Based On Granular Computing," Proc IEEE International Conference on Fuzzy Systems, pages , Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, and Tsan-sheng Hsu, "Information Theoretical Analysis of Two-Party Secret Computation," Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer-Verlag LNCS# 4127, Lecture Notes in Computer Science, pages , Da-Wei Wang, Churn-Jung Liau, and Tsan-sheng Hsu, "A GrC-based Approach to Social Network Data Protection," Proc. 5th International Conference on Rough Sets and Current Trends in Computing Springer-Verlag LNCS/AI# 4259, Lecture Notes in Artificial Intelligence, pages , Cho-chin Lin, Da-Wei Wang and Tsan-sheng Hsu, "Bounds on the Client-Server Incremental Computing," IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, volume E89-A, number 5, pages , Sun-yuan Hsieh, Chin-Wen Ho, Tsan-sheng Hsu, and Ming-Tat Ko, "The Hamiltonian Problem on Distance-Hereditary Graphs," Discrete Applied Mathematics, volume 154, number 3, pages , 86

13 Da-Wei Wang, Churn-Jung Liau, and Tsan-sheng Hsu, "Attribute-Oriented Granulation for Privacy Protection," Proc IEEE International Conference on Granular Computing, pages , 高明達 (Ko, Ming-Tat) Jeng Farn Lee, Meng Chang Chen, Ming-Tat Ko and Wanjiun Liao, "Bandwidth Allocation Algorithms for Weighted Maximum Rate Constrained Link Sharing Policy," Information Processing Letters, volume 97, number 6, pages , March (Full) Sun-yuan Hsieh, Chin-Wen Ho, Tsan-sheng Hsu, and Ming-Tat Ko, "The Hamiltonian Problem on Distance-Hereditary Graphs," Discrete Applied Mathematics, volume 154, number 3, pages , (Full) Maw-Shang Chang and Ming-Tat Ko and Hsueh-I Lu, "Linear Time Algorithms for Tree Root Problems," Proceedings of 10th Scandinavian Workshop on Algorithm Theory (SWAT2006), Lecture Notes in Computer Science, 4059, Spring Verlag, pages , Jul. 6-8, 張復 (Chang, Fu) F. Chang, C.-C. Lin, and C.-J. Lu, "Adaptive Prototype Learning Algorithms: Theoretical and Experimental Studies," Journal of Machine Learning Research, volume 7, pages , C.-H. Chou, C.-C. Lin, Y.-H. Liu, and F. Chang, "A Prototype Classification Method and Its Use in a Hybrid Solution for Multiclass Pattern Recognition," Pattern Recognition, volume 39, number 4, pages , F. Chang, "Techniques for Solving the Large-Scale Classification Problem in Chinese Handwriting Recognition," Summit on Arabic and Chinese Handwriting, College Park, MD, Sep , C.-H. Chou, B.-H. Kuo, and F. Chang, "The Generalized Condensed Nearest Neighbor Rule as A Data Reduction Method," Intern. Conf. Pattern Recognition, Hong Kong, Aug , 莊庭瑞 (Chuang, Tyng-Ruey) 87

14 Min-Bin Chen, Tyng-Ruey Chuang, and Jan-Jan Wu, "Parallel divide-and-conquer scheme for 2D Delaunay triangulation," Concurrency and Computation: Practice and Experience, volume 18, number 12, pages , October Yi-Hsuan Lin, Tung-Mei Ko, Tyng-Ruey Chuang, and Kwei-Jay Lin, "Open source licenses and the Creative Commons framework: License selection and comparison," Journal of Information Science and Engineering, volume 22, number 1, pages 1-17, January Chia-Hsin Huang, Tyng-Ruey Chuang, Dong-Po Deng, and Hahn-Ming Lee, "Efficient GML-native processors for Web-based GIS: Techniques and tools," 14th International Symposium on Advances in Geographic Information Systems, Arlington, Virginia, USA November Chia-Hsin Huang, Tyng-Ruey Chuang, James J. Lu, and Hahn-Ming Lee, "XML evolution: A two-phase XML processing model using XML prefiltering techniques," 32nd International Conference on Very Large Data Bases, pages , Seoul, Korea September Tyng-Ruey Chuang and Jan-Li Lin. An Algebra of Dependent Data Types. Technical Report TR-IIS , Institute of Information Science, Academia Sinica, September, Chin-Lung Chang, Yi-Hong Chang, Tyng-Ruey Chuang, Dong-Po Deng, Andrea Wei-Ching Huang, and Chia-Hsin Huang. The Web and Collaborative Geospatial Mapping: A Position Paper. Technical Report TR-IIS , Institute of Information Science, Academia Sinica, September, 許鈞南 (Hsu, Chun-Nan) Hsiang-Yu Yuan, Jen-Jie Chiou, Wen-Hsien Tseng, Chia-Hung Liu, Chuan-Kun Liu,Yi-Jung Lin, Hui-Hung Wang, Adam Yao, Yuan-Tsong Chen and Chun-Nan Hsu, "FASTSNP: an always up-to-date and extendable service for SNP function analysis and prioritization," Nucleic Acids Research, volume 34, number Web Server Issue, pages W W641, July Yu-Shi Lin and Chun-Nan Hsu, "Boosting Multiclass Learning with Repeating Codes," Proceedings of the 2006 TAAI Conference on Artificial Intelligence and Applications, December 88

15 Chun-Nan Hsu, Bo-Hou Yang and Han-Shen Huang, "Global and Componentwise Extrapolation for Accelerating Data Mining from Large Incomplete Data Sets with the EM Algorithm," Proceedings of the 2006 IEEE International Conference on Data Mining (ICDM-2006), IEEE Press, pages , IEEE Computer Society, December 2006, Regular Paper Dau-Cheng Lyu, Ren-Yuan Lyu, Yuang-chin Chiang and Chun-Nan Hsu, "Speech Recognition on Code-Switching Among the Chinese Dialects," Proceedings of 2006 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006), IEEE Press, IEEE Signal Processing Society, May 許聞廉 (Hsu, Wen-Lian) Richard Tzong-Han Tsai, Shih-Hung Wu, Wen-Chi Chou, Yu-Chun Lin, Ding He, Ting-Yi Sung, Wen-Lian Hsu, "Various Criteria in the Evaluation of Biomedical Named Entity Recognition," BMC Bioinformatics, volume 9, number 92, Kuen-Pin Wu, Jia-Ming Chang, Jun-Bo Chen, Chi-Fon Chang, Wen-Jin Wu, Tai-Huang Huang, Ting-Yi Sung and Wen-Lian Hsu, "RIBRA-an Error-Tolerant Algorithm for the NMR Backbone Assignment Problem," To Appear in Journal of Computational Biology, volume 13, number 2, pages Wen-Ting Lin, Wei-Neng Hung, Yi-Hwa Yian, Kun-Pin Wu, Chia-Li Han, Yet-Ran Chen, Yu-Ju Chen, Ting-Yi Sung and Wen-Lian Hsu, "Multi-Q: A Fully Automated Tool for Multiplexed Protein Quantitation," Journal of Proteome Research, volume 5, pages , Tzong-Han Tsai, Shih-Hung Wu, Wen-Chi Chou, Yu-Chun Lin, Ding He, Ting-Yi Sung, Wen-Lian Hsu,, "Various Criteria in the Evaluation of Biomedical Named Entity Recognition," BMC Bioinformatics, volume 7, number 92, Ching-Tai Chen, Hsin-Nan Lin, Kun-Pin Wu, Ting-Ying Sung and Wen-Lian Hsu, "A Knowledge-based Approach to Protein Local Structure Prediction," To Appear in Proceedings of Asia Pacific Bioinformatics Conference (APBC). Tsai, R. T.-H., Dai, H.-J., Sung, C.-L., Hung, H.-C., Day, M.-Y., & Hsu, W.-L., "Chinese Word Segmentation with Minimal Linguistic Knowledge: An Improved Conditional Random Fields Coupled with Character Clustering and 89

16 Automatically Discovered Template Matching," IEEE IRI-06, September 16-18, Hawaii, USA, Min-Yuh Day, Chorng-Shyong Ong, Shih-Hung Wu, and Wen-Lian Hsu, "Integrating Genetic Algorithms with Conditional Random Fields to Enhance Question Informer Prediction," Proceedings of the IEEE International Conference on Information Reuse and Integration (IEEE IRI), September 16-18, Hawaii, USA, Chia-Wei Wu, Shyh-Yi Jan, Richard Tzong-Han Tsai, Wen-Lian Hsu, "On Using Ensemble Methods for Chinese Named Entity Recognition," Proceedings of SIGHAN Workshop, Richard Tzong-Han Tsai, Hsieh-Chuan Hung, Cheng-Lung Sung, Hong-Jie Dai, and Wen-Lian Hsu, "On Closed Task of Chinese Word Segmentation: An Improved CRF Model Coupled with Character Clustering and Automatically Generated Template Matching," Proceedings of SIGHAN Workshop, Wen-Chi Chou, Richard Tzong-Han Tsai, Ying-Shan Su,Wei Ku, Ting-Yi Sung and Wen-Lian Hsu, "A Semi-Automatic Method for Annotating a Biomedical Proposition Bank," Proceedings of ACL Workshop on Frontiers in Linguistically Annotated Corpora, Allan Lo, Hua-Sheng Chiu, Ting-Yi Sung, Wen-Lian Hsu, "Transmembrane Helix and Topology Prediction Using Hierarchical SVM Classifiers and an Alternating Geometric Scoring Function," Proceedings of IEEE Computational Systems Bioinformatics Conference (CSB), Stanford, CA, Chia-Yu Su, Allan Lo, Hua-Sheng Chiu, Ting-Yi Sung, Wen-Lian Hsu, "Protein Subcellular Localization Prediction Based on Compartment-Specific Biological Features," Proceedings of IEEE Computational Systems Bioinformatics Conference (CSB), Stanford, CA, Chun-Hung Lu, Guey-Fa Chiou, Min-Yuh Day, Chorng-Shyong Ong, and Wen-Lian Hsu, "Using Instant Messaging to Provide an Intelligent Learning Environment," ITS, Jun , Hua-Sheng Chiu, Hsin-Nan Lin, Allan Lo, Ting-Yi Sung, Wen-Lian Hsu, "A two-stage classifier for protein beta-turn prediction using support vector machines," Proceedings of IEEE International Conference on Granular Computing (IEEE GrC), 90

17 Ching-Tai Chen, Hsin-Nan Lin, Ting-Ying Sung and Wen-Lian Hsu, "A Knowledge-based Approach to Protein Local Structure Prediction," Journal of Bioinformatics and Computational Biology, 陳伶志 (Chen, Ling-Jyh) Ling-Jyh Chen, Tony Sun, Guang Yang, M. Y. Sanadidi, and Mario Gerla., "Monitoring Access Link Capacity Using TFRC Probe," Computer Communications Journal (ComCom), Special Issue on Monitoring and Measurements of IP Networks, Elsevier, volume 29, number 10, pages , June Guang Yang, Ling-Jyh Chen, Tony Sun, Mario Gerla, and M. Y. Sanadidi, "Smooth and Efficient Real-time Video Transport in Presence of Wireless Errors," ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP), volume 2, number 2, pages , May Tony Sun, Ling-Jyh Chen, Chih-Chieh Han, Guang Yang, Mario Gerla, "Path Capacity Estimation in IEEE Enabled Wireless Sensor Network via SenProbe ( demo )," IEEE Consumer Communications and Networking Conference (CCNC'06), Las Vegas, USA, Ling-Jyh Chen, Tony Sun, and Yung-Chih Chen, "Improving Bluetooth EDR Data Throughput Using FEC and Interleaving," The Second International Conference on Mobile Ad Hoc and Sensor Networks (MSN'06), Hong Kong, Lecture Notes in Computer Science, 4325, pages , Dec , Guang Yang, Ling-Jyh Chen, Tony Sun, Biao Zhou, and Mario Gerla, "Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs," The Third IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS'06), Vancouver, Canada, Oct. 9-12, Nia-Chiang Liang, Ping-Chieh Chen, Tony Sun, Guang Yang, Ling-Jyh Chen, and Mario Gerla, "Impact of Node Heterogeneity in ZigBee Mesh Network Routing," 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC'06), Taipei, Taiwan, Oct. 8-11, Ling-Jyh Chen, Chen-Hung Yu, Tony Sun, Yung-Chih Chen, and Hao-hua Chu, "A Hybrid Routing Approach for Opportunistic Networks," ACM SIGCOMM Workshop on Challenged Networks (CHANTS'06), Pisa, Italy, Sep. 15, 91

18 Ling-Jyh Chen, Tony Sun, Li Lao, Guang Yang, M. Y. Sanadidi, and Mario Gerla, "Estimating Link Capacity in High Speed Networks," IFIP Networking 2006, Coimbra, Portugal, Lecture Notes in Computer Science, 3976, pages , Jiejun Kong, Ling-Jyh Chen, Markus Jakobsson, Stanley Moyer, Dave Marples, and Mario Gerla, "A Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions," The 2006 IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, Jun , Tony Sun, Ling-Jyh Chen, Chih-Chieh Han, Guang Yang, and Mario Gerla, "Measuring Effective Capacity of IEEE Beaconless Mode," IEEE Wireless Communications and Networking Conference (WCNC'06), Apr. 3-6, Ling-Jyh Chen, Tony Sun, and Mario Gerla, "Modeling Channel Conflict Probabilities between IEEE based Wireless Personal Area Networks," The 2006 IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, Ling-Jyh Chen, Tony Sun, Guang Yang, and Mario Gerla, "USHA: a simple and practical seamless vertical handoff solution ( demo )," IEEE Consumer Communications and Networking Conference (CCNC'06), Las Vegas, USA, Jan. 8-10, 陳克健 (Chen, Keh-Jiann) Li, Shih-Min, Su-Chu Lin, Keh-Jiann Chen, "A Probe into Ambiguities of Determinative-measure Compounds," International Journal of Computational Linguistics and Chinese Language Processing, volume 11, number 3, pages , August Ming-Hong Bai, Keh-Jiann Chen, Jason S. Chang, "Sense Extraction and Disambiguation for Chinese Words from Bilingual Terminology Bank," International Journal of Computational Linguistics and Chinese Language Processing, volume 11, number 3, pages , August Case, John, Keh-Jiann Chen, Sanjay Jain, Wolfgang Merkle, James S. Royer, "Generality's price: Inescapable deficiencies in machine-learned programs," Annals of Pure and Applied Logic, volume 139, pages , 92

19 Chen, Keh-Jiann, Chiu-yu Tseng, Chia-Hung Tai, "Predicting Prosody from Text," Lecture Notes in Computer Science, Lecture Notes in Computer Science, volume 4274, Springer, pages , Yueh-Yin Shih, Shu-Ling Huang, and Keh-Jiann Chen, "Semantic Representation and Composition for Unknown Compounds in E-HowNet," Proceedings of PACLIC 20, Huang Chu-Ren and Tseng-Dong Dong, editors, pages , Hsieh, Yu-Ming, Duen-Chi Yang, Keh-Jiann Chen, "Improve Parsing Performance by Self-Learning," Proceedings of ROCLING 18, pages 63-76, 陳孟彰 (Chen, Meng-Chang) Yu-Liang Liu, Yeali Sun and Meng Chang Chen, "MTRA: An On-Line Hose Model VPN Provisioning Algorithm," Telecommunication Systems, April Jeng Farn Lee, Meng Chang Chen, Ming Tat Ko and Wanjiun Liao, "Bandwidth Allocation Algorithms for Weighted Maximum Rate Constrained Link Sharing Policy," Information Processing Letter, March Yung-Cheng Tu, Meng Chang Chen, Yeali S. Sun and Wei-Kuan Shih, Bulk Scheduling for Delay Sensitive Streaming Applications, IEEE Globecom, San Francisco, Nov. 27-Dec. 1, I-Fan Liu, Meng Chang Chen, Yeali Sun, The Design of a Web-based Learning Platform: A Case Study in Taiwan, The 14th International Conference on Computers in Education (ICCE2006), Beijing, China, Nov.30-Dec. 14, I-Fan Liu, Meng Chang Chen, Yeali Sun, Exploring the Learning Effect of a Web-based Learning Community on EMBA students, The 14th International Conference on Computers in Education (ICCE2006), Beijing, China, I-Fan Liu, Meng Chang Chen and Yeali Sun, A Study of the Web-based Learning System for Supply Chain Management Course Teaching, The 6 th IEEE International Conference on Advanced Learning Technologies, Kerkrade, The Netherlands, July 5-7, David Wible, Chin-Hwa Kuo, Meng-Chang Chen, Nai-Lung Tsao, Tsung-Fu Hung, A Ubiquitous Agent for Unrestricted Vocabulary Learning in Noisy Digital Environments, 8 th International Conference on Intelligent Tutoring Systems (Lecture Notes in Computer Science 4053), Jhongli, Taiwan, Jun , Yu-Liang Liu, Yeali S. Sun and Meng Chang Chen, Traffic Engineering for 93

20 Provisioning Restorable Hose-Model VPNs, 2nd EuroNGI Conference on Next Generation Internet Design and Engineering (NGI 2006), Valencia, Spain, Apr. 3-5, 陳祝嵩 (Chen, Chu-Song) Ping-Hsien Lee, Chu-Song Chen, and Wen-Yan Chang, "On Automatic Collection of Multi-Angle Face Prototypes," IEEE Transactions on Systems Man and Cybernetics, Part A, volume 36, number 6, pages , November Yong-Dian Jian and Chu-Song Chen,, "Second-Order Belief Propagation and Its Application to Object Localization," Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, SMC 2006, October Jen-Hao Hsiao, Chu-Song Chen, Lee-Feng Chien, and Ming-Syan Chen, "Image Copy Detection via Grouping in Feature Space Based on Virtual Prior Attacks," Proceedings of IEEE International Conference on Image Processing, ICIP 2006, October Jen-Hao Hsiao, Cheng-Hung Li, Chih-Yi Chiu, Jenq-Haur Wang, Chu-Song Chen, and Lee-Feng Chien, "Effective Content Tracking for Digital Rights Management in Digital Libraries," Proceedings of the 10th European Conference on Research and Advanced Technology for Digital Libraries, ECDL 2006, Lecture Notes in Computer Science, 4172, pages , September Chih-Yi Chiu, Cheng-Hung Li, Hsiang-An Wang, Chu-Song Chen, Lee-Feng Chien, "A Time Warping Based Approach for Video Copy Detection," Proceedings of International Conference on Pattern Recognition, ICPR 2006, August Wen-Yan Chang, Chu-Song Chen, and Yi-Ping Hung, "Discriminative Descriptor-Based Observation Model for Visual Tracking," Proceedings of International Conference on Pattern Recognition, ICPR 2006, August Chun-Rong Huang, Chu-Song Chen, and Pau-Choo Chung, "Contrast Context Histogram A Discriminating Local Descriptor," Proceedings of International Conference on Pattern Recognition, ICPR 2006, August Hsien-Ting Cheng and Chu-Song Chen, "A Complementary Ordering Method for Class Imbalanced Problem," Proceedings of International Conference on Pattern Recognition, ICPR 2006, August 94

21 Yu-Ting Chen, Chu-Song Chen, and Yi-Ping Hung, "Integration of Background Modeling and Object Tracking," Proceedings of IEEE International Conference on Multimedia & Expo, ICME 2006, July Cheng-Hung Li, Chih-Yi Chiu, Chun-Rong Huang, Chu-Song Chen, and Lee-Feng Chien, "Image Content Clustering and Summarization for Photo Collections," Proceedings of IEEE International Conference on Multimedia & Expo, ICME 2006, July Chia-Ping Chen and Chu-Song Chen, "The 4-Source Photometric Stereo Under General Unknown Lighting," Proceedings of European Conference on Computer Vision, ECCV 2006, May Yong-Dian Jian, Wen-Yan Chang, and Chu-Song Chen, "Attractor-guided Particle Filtering for Lip Contour Tracking," Proceedings of Asia Conference on Computer Vision, ACCV 2006, January Pang-Hung Huang, Yu-Pao Tsai, Wan-Yen Lo, Sheng-Wen Shih, Chu-Song Chen, "A Method for Calibrating a Motorized Object Rig," Proceedings of Asia Conference on Computer Vision, ACCV 2006, Lecture Notes in Artificial Intelligence, January 陳寬達 (Chen, Kuan-Ta) Kuan-Ta Chen and Polly Huang and Chin-Laung Lei, "How Sensitive are Online Gamers to Network Quality?," Communications of the ACM, Kuan-Ta Chen and Polly Huang and Chin-Laung Lei, "Game Traffic Analysis: An MMORPG Perspective," Computer Networks, volume 50, number 16, November Kuan-Ta Chen and Chun-Ying Huang and Polly Huang and Chin-Laung Lei, "Quantifying Skype User Satisfaction," Proceedings of ACM SIGCOMM 2006, Pisa Itlay, Sep.11-15, Kuan-Ta Chen and Chin-Laung Lei, "Design Implications of Social Interaction in Online Games," Proceedings of IFIP ICEC 2006, Cambridge UK, Aug , Chun-Ying Huang and Yun-Peng Chiu and Kuan-Ta Chen and Chin-Laung Lei, "A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy 95

22 Cryptography," Proceedings of ACM ASIACCS 2006, Taipei TW, Mar 21-24, Chun-Ying Huang and Kuan-Ta Chen and Chin-Laung Lei, "Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter," Proceedings of IEEE DSN 2006, Philadelphia USA, Jun , Kuan-Ta Chen and Jhih-Wei Jiang and Polly Huang and Hao-Hua Chu and Chin-Laung Lei and Wen-Chin Chen, "Identifying MMORPG Bots: A Traffic Analysis Approach," Proceedings of ACM SIGCHI ACE'06, Los Angeles USA Kuan-Ta Chen and Chun-Ying Huang and Polly Huang and Chin-Laung Lei, "An Empirical Evaluation of TCP Performance in Online Games," Proceedings of ACM SIGCHI ACE'06, Los Angeles USA Kuan-Ta Chen and Polly Huang and Guo-Shiuan Wang and Chun-Ying Huang and Chin-Laung Lei, "On the Sensitivity of Online Game Playing Time to Network QoS," Proceedings of IEEE INFOCOM'06, Barcelona Spain, Apr , Kuan-Ta Chen and Chin-Laung Lei, "Network Game Design: Hints and Implications of Player Interaction," Proceedings of ACM NetGames, 黃文良 (Hwang, Wen-Liang) Cho-Chun Cheng, Wen-Liang Hwang, Zuowei Shen, and Tao Xia, Subjective and Objective Comparison of Advanced Motion Compensation Methods for Blocking Artifact, IEEE Transactions on Circuit and Systems for Video Technology, vol.16, no. 9, pp , September Wen-Yao Chen, Wen-Liang Hwang, and Tien Ching Lin, Planar Shape Prototype Generation Using a Tree-based Random Greedy Algorithm, IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 36, no. 3, pp , June Jian-Liang Lin, Wen-Liang Hwang, and Soo-Chang Pei, Multiple Blocks Matching Pursuit Update Algorithm for Low Bit-rate Video Coding, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, no. 3, pp , March Chih-Ming Fu, Wen-Liang Hwang, and Chung-Lin Huang, Data-Aided Frame Timing Acquisition for Fractal Modulation in an AWGN Channel, Signal 96

23 Processing 86, pp , February Jinn Ho, Wen-Liang Hwang, Henry Horn-Shing Lu, and D.T. Lee, Gridding Spot Centers of Smoothly Distorted Microarray Images, IEEE Transactions on Image Processing, vol. 15, no. 2, pp , February Chih-Ming Fu, Wen-Liang Hwang, and Chung-Lin Huang, Design Error-Resilient Multiple Substreams 3D Coder Including Receiver Post-processing in Analysis,"IEEE International Conference on Image Processing, Altanta, Ga, U.S.A, October Jian-Liang Lin, Wen-Liang Hwang, and Soo-Chang Pei, Video Compression Based on Orthonormal Matching Pursuits, IEEE International Symposium on Circuits and Systems, Kos, Greece,May 21-24, Chih-Ming Fu, Wen-Liang Hwang, and Chung-Lin Huang, Error Concealment Protection for Loss Resilient Bitplane-Coded Video Communications, IEEE International Symposium on Circuits and Systems, Kos, Greece, May 21-24, Liu-yuan Lai, Wen-Liang Hwang, Silong Peng, A Sampling-based GEM Algorithm with Classiffication for Texture Synthesize, IEEE International Conference on Acoustic, Speech, and Signal Processing, Toulouse, France, May 14-19, 楊柏因 (yang, Bo-Yin) S.-P. Eu, B.-Y. Yang, and Y. Yeh,, "Computing the Generalized Wiener Indices of Hex Chains," Int'l J. of Quant. Chem., S.-Y. Wang, C.-S. Laih, and B.-Y. Yang, "Partially Ordered Signature Schemes," third Taiwan-France Info Tech Conference, Y.-H. Hu, L.-C. Wang, and B.-Y. Yang, "A Medium-Field Multivariate Public-Key Encryption Scheme," Proc. 7th Cryptographer's Track RSA Conference, volume 3860, Lecture Notes in Computer Science, pages , B.-Y. Yang, C.-M. Cheng, B.-R. Chen, and J.-M. Chen, "Implementing Minimized Multivariate Public-Key Cryptosystems on Low-Resource Embedded Systems," the 3rd Security of Pervasive Computing Conference, volume 3934, Lecture Notes in Computer Science, pages 73-88, 97

24 O. C.-H. Chen, B.-Y. Yang, and J.-M. Chen, "Exploring the Limits of Lazard-Faug`ere Gr obner Bases Methods," Info. Security Conference 06 Taichung, 廖弘源 (Liao, Hong-Yuan) Y.H. Ho,C.W.Lin, J.F. Chen and H.Y. Mark Liao, "Fast Coarse-to-Fine Video Retrieval Using shot-level Spatio-temporal Statistics," IEEE Trans. on Circuits and Systems for Video Technology, volume 16, number 5, pages , May D.-Y. Chen, H.-Y. Mark Liao, "Continuous Human Action Segmentation and Recognition Using A Spatio-Temporal Probabilistic Framework," Proc. IEEE International Symposium on Multimedia, December S-W. Shih, A.C.-C. Shih, H.-Y. Mark Liao, and Y.-M. Liang, "Understanding Human Behavior Using a Language Modeling Approach," Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, December Y.-C. Lai and H.-Y. Mark Liao, "Human Motion Recognition Using Clay Represention of Trajectories," Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, USA December D.-Y. Chen, H.-Y. Mark Liao, and S.-W. Shih, "Atomic Human Action Segmentation Using a Spatio-Temporal Progagilistic Framework," Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, December C.-F. Chen, H.-Y. Mark Liao, P.-C. Hsiu, Y.-S. Lin, C-S. Shih, T.-W.Kuo, and Jane W.-S. Liu, "Smart Pantries for Homes," IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan October C.-F. Hsu, H.-Y. Mark Liao, P.-C. Hsiu, Y.-S. Lin, C-S. Shih, T.-W.Kuo, and Jane W.-S. Liu, "Smart Pantries for Homes," IEEE International Conference on Systems, Man, and Cybernetics, Taipei, Taiwan October H.Y. Mark Liao, D.Y.Chen C.W. Su, and H.R.Tyan, "Real-time Event Detection and Its Application to Surveillance Systems," Proc. IEEE International Symposium on Circuits and Systems, Kos, Greece May 98

25 H. Y. M. Liao, D. Y. Chen, C. W. Su, and H. R. Tyan,, chapter "Intelligent Video Event Detection for Surveillance Systems," Intelligent Multimedia Data Hiding, J. S. Pan, W. C. Fang, H. C. Huang and and L. C. Jain, editors, pages , Springer-Verlag, Berlin-Heidelberg, 廖純中 (Liau, Churn-Jung) T.Y. Lin, S. Ohsuga, C.J. Liau, and X. Hu (2006), Foundations and Novel Approaches in Data Mining, Springer-Verlag. D.W. Wang, C.J. Liau, and T.-s. Hsu (2006), An epistemic framework for privacy protection in database linking, Data and Knowledge Engineering D.W. Wang, C.J. Liau, T.-s. Hsu, and J.K.-P. Chen (2006), Value versus damage of information release: A data privacy perspective, International Journal of Approximate Reasoning D.W. Wang, C.J. Liau, and T.-s. Hsu (2006), A GrC-based approach to social nnetwork data protection, Proc. of the Fifth International Conference on Rough Sets and Current Trends in Computing, LNAI 4259, 2006 D.W. Wang, C.J. Liau, Y.T. Chiang, and T.-s. Hsu (2006), Information theoretical analysis of two-party secret computation, Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp , LNCS 4127 Y.C. Chang, S.M. Chen, and C.J. Liau (2006), A new inductive learning method for multilabel text categorization, Proc. The 19th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA/AIE'06), pp , LNCS 4031 Y.C. Chang, S.M. Chen, and C.J. Liau (2006), A new linear classifier for multilabel text categorization, Proc. Joint 3rd International Conference on Soft Computing and Intelligent Systems and 7th International Symposium on advanced Intelligent Systems (SCIS & ISIS 2006) D.W. Wang, C.J. Liau, and T.-s. Hsu (2006), Privacy protection in social network data disclosure based on granular computing," Proc IEEE International Conference on Fuzzy Systems, pp

26 D.W. Wang, C.J. Liau, and T.-s. Hsu (2006), "Attribute-oriented granulation for privacy protection, Proc. The 2nd IEEE International Conference on Granular Computing, pp 劉庭祿 (Liu, Tyng-Luh) Hwann-Tzong Chen, Tyng-Luh Liu, and Chiou-Shann Fuh. Segmenting Highly Articulated Video Objects with Weak-Prior Random Forests, Appeared in 9th European Conference on Computer Vision, Lecture Notes in Computer Science 3954, pp , Graz, Austria, May Tien-Lung Chang, Tyng-Luh Liu, and Jen-Hui Chuang. Direct Energy Minimization for Super-Resolution on Nonlinear Manifolds, Appeared in 9th European Conference on Computer Vision, Lecture Notes in Computer Science 3954, pp , Graz, Austria, May 劉進興 (Liu, Jing-Sin) YRChien, JS Liu, "Learning the Stylistic Similarity Between Human Motions," 2nd International Symposium on Visual Computing, Lecture Notes in Computer Science, November Nov. Liu JS, Kao JI, Chang YZ, "Collision detection of deformable polyhedral objects via inner-outer ellipsoids," IEEE International Conference on Intelligent robots and Systems, Beijing October Liu JS, "Exact collision detection for scaled convex polyhedra via inner ellipsoidal deformation bounds," IEEE Int. Conf. Robotics, Automation and Mechatronics, Bangkok, Thailand June 蔡懷寬 (Tsai, Huai-Kuang) Tsai, H.K., Huang, Grace T., Chou, M.Y., Lu, Henry, H.S. and Li, W.H., "Method for identifying transcription factor binding sites in yeast," Bioinformatics, volume 22, pages , July 穆信成 (Mu, Shin-Cheng) Z. Hu, S-C. Mu and M. Takeichi, A programmable editor for developing structured documents based on bidirectional transformations. Submitted to Higher-Order 100

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七

104 年 03 月通過學術審查. 著作列表 Journal Papers. Conference Papers 級 :96 學年度入學, 博七 104 年 03 月通過學術審查 年 級 :96 學年度入學, 博七 著作列表 Journal Papers 1. Cheng-Yen Lin, Chung-Wen Huang, Chi-Bang Kuan, Shi-Yu Huang, and Jenq-Kuen Lee, The Design and Experiments of A SID-Based Power-Aware Simulator

More information

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648 Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern

More information

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute Oral 011 Oral 016 Oral 017 Agile Project Management in MIS: A Case Study in A Research Institute Exploring Developing Countries Immigrants Intention to Use Information Communication Technology Partial

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

Arbee L.P. Chen ( 陳良弼 )

Arbee L.P. Chen ( 陳良弼 ) Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of

More information

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features

Room B1. 53 Proximity Comparison Modes for Logo Design. 138 Detection of Bus Route Number via Motion and YCbCr Features Room B1 Title June 10 08:30-10:00 53 Proximity Comparison Modes for Logo Design 75 Flood Tracking in Severe Weather 138 Detection of Bus Route Number via Motion and YCbCr Features Chen-I Huang, Shing-Sheng

More information

Curriculum Vitae. Biography of Kuang-Hui Chi (February 2018)

Curriculum Vitae. Biography of Kuang-Hui Chi (February 2018) Curriculum Vitae Biography of Kuang-Hui Chi (February 2018) Kuang-Hui Chi was Assistant Professor (2003 2009), Associate Professor (2009 2018), and is Professor (elevation effective since August 2017)

More information

資訊科學研究所 王大為 (WANG, DA-WEI) 王柏堯 (WANG, BOW-YAW) 王新民 (WANG, HSIN-MIN) 學術會議 ( 研討會 ) 論文

資訊科學研究所 王大為 (WANG, DA-WEI) 王柏堯 (WANG, BOW-YAW) 王新民 (WANG, HSIN-MIN) 學術會議 ( 研討會 ) 論文 資訊科學研究所 王大為 (WANG, DA-WEI) K. Chen, T.-s. Hsu, W.K. Huang, C.J. Liau and D.W. Wang, 2012, Towards a scripting language for automating secure multiparty computation, paper presented at 2012 Asia-Pacific

More information

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems PROCEEDINGS Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems Copyright 1996 by National Sun Yat-Sen University All rights reserved. Abstracting

More information

PUBLICATIONS. Journal Papers

PUBLICATIONS. Journal Papers PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.

More information

Clock Skew Based Client Device Identification in Cloud Environments

Clock Skew Based Client Device Identification in Cloud Environments Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech. 1 Wei-Chung Teng on behalf of Assoc.

More information

Curriculum Vitae Rong-Hao Liang

Curriculum Vitae Rong-Hao Liang Curriculum Vitae Rong-Hao Liang Address: 3F., No.10, Aly. 3, Ln. 423, Zhuangjing Rd., Xinyi Dist., Taipei City 110, Taiwan Mobile: +31-6-27264425 (NL)/ +886-911-451827 (TW) Website: http://ronghaoliang.me

More information

林嘉文著作目錄. Journal Special Issues Edited: Refereed Journal Papers: Published/Accepted:

林嘉文著作目錄. Journal Special Issues Edited: Refereed Journal Papers: Published/Accepted: Journal Special Issues Edited: 林嘉文著作目錄 [S1] Luming Zhang *, Zhigang Ma, Yahong Han, Luca Marchesotti, and Chia-Wen Lin, Special Issue on Aesthetically-Aware Image and Video Analysis, EURASIP Signal processing:

More information

Baseball Game Highlight & Event Detection

Baseball Game Highlight & Event Detection Baseball Game Highlight & Event Detection Student: Harry Chao Course Adviser: Winston Hu 1 Outline 1. Goal 2. Previous methods 3. My flowchart 4. My methods 5. Experimental result 6. Conclusion & Future

More information

Blind Signature Scheme Based on Elliptic Curve Cryptography

Blind Signature Scheme Based on Elliptic Curve Cryptography Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

(Proceedings of the 2002 International Computer Symposium

(Proceedings of the 2002 International Computer Symposium (Proceedings of the 2002 International Computer Symposium Edited by Arbee L.P. Chen and Ruay-Shiung Chang Sponsored by Ministry of Education, R.O.C. National Science Council, R.O.C. National Dong Hwa University,

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES

LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES LARGE-VOCABULARY CHINESE TEXT/SPEECH INFORMATION RETRIEVAL USING MANDARIN SPEECH QUERIES Bo-ren Bai 1, Berlin Chen 2, Hsin-min Wang 2, Lee-feng Chien 2, and Lin-shan Lee 1,2 1 Department of Electrical

More information

Zhi-Quan Luo Electrical and Computer Engineering

Zhi-Quan Luo Electrical and Computer Engineering Sun, Ruoyu, and Zhi-Quan Luo. 2015. Interference alignment using finite and dependent channel extensions: The single beam case. IEEE Transactions on Information Theory 61 (1) (JAN 01): 239-55. Baligh,

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

An Introduction to Pattern Recognition

An Introduction to Pattern Recognition An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included

More information

Jyun-Yu Jiang. Room 3551, Boelter Hall, Department of Computer Science. University of California, Los Angeles, California, United States

Jyun-Yu Jiang. Room 3551, Boelter Hall, Department of Computer Science. University of California, Los Angeles, California, United States Jyun-Yu Jiang 姜俊宇 Room 3551, Boelter Hall, Department of Computer Science University of California Los Angeles, CA 90095, United States jyunyu@cs.ucla.edu http://jyunyu.csie.org/ +1-213-378-3894 (mobile)

More information

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules Support and Confidence Based Algorithms for Hiding Sensitive Association Rules K.Srinivasa Rao Associate Professor, Department Of Computer Science and Engineering, Swarna Bharathi College of Engineering,

More information

A Feasible Power Saving Scheduling Approach in WiMAX e Networks

A Feasible Power Saving Scheduling Approach in WiMAX e Networks A Feasible Power Saving Scheduling Approach in WiMAX 802.16e Networks WEN-CHUAN HUANG Department of Computer Science and Information Engineering Tamkang University No.151, Yingzhuan Rd., Tamsui District,

More information

2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan November IEEE Catalog Number: ISBN:

2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan November IEEE Catalog Number: ISBN: 2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI 2012) Tainan, Taiwan 16 18 November 2012 IEEE Catalog Number: ISBN: CFP1224L-PRT 978-1-4673-4976-5 2012 Conference on Technologies

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

Opening Speech First Lecture Room Prof. Jenq-Neng Hwang

Opening Speech First Lecture Room Prof. Jenq-Neng Hwang Time Dec. 16 (Thur.) 08:30 Registration 09:00 Opening Ceremony 09:30 Opening Speech Prof. Jenq-Neng Hwang 10:20 Coffee Break Parallel Session 1 Digital Content, Digital Life, Information Security (I) E-learning,

More information

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h)

HAI ZHOU. Evanston, IL Glenview, IL (847) (o) (847) (h) HAI ZHOU Electrical and Computer Engineering Northwestern University 2535 Happy Hollow Rd. Evanston, IL 60208-3118 Glenview, IL 60025 haizhou@ece.nwu.edu www.ece.nwu.edu/~haizhou (847) 491-4155 (o) (847)

More information

3D HAND LOCALIZATION BY LOW COST WEBCAMS

3D HAND LOCALIZATION BY LOW COST WEBCAMS 3D HAND LOCALIZATION BY LOW COST WEBCAMS Cheng-Yuan Ko, Chung-Te Li, Chen-Han Chung, and Liang-Gee Chen DSP/IC Design Lab, Graduated Institute of Electronics Engineering National Taiwan University, Taiwan,

More information

Curriculum Vitae Rong-Hao Liang

Curriculum Vitae Rong-Hao Liang Curriculum Vitae Rong-Hao Liang Address: Hartelstein 37, 5655AJ, Eindhoven, North Brabant, The Netherlands Mobile: +31-6-27264425 (NL) Website: http://ronghaoliang.me Email: r.liang@tue.nl Dr. Rong-Hao

More information

Fish4Knowledge Deliverable D4.1. Video and RDF Store, plus access

Fish4Knowledge Deliverable D4.1. Video and RDF Store, plus access Fish4Knowledge Video and RDF Store, plus access Principal Author: H.M Chou Contributors: NARL Dissemination: PU Abstract: WP4.1 has two key objectives: to maintain a sustainable data capturing system which

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News Selecting Model in Automatic Text Categorization of Chinese Industrial 1) HUEY-MING LEE 1 ), PIN-JEN CHEN 1 ), TSUNG-YEN LEE 2) Department of Information Management, Chinese Culture University 55, Hwa-Kung

More information

Lingxi Xie. Post-doctoral Researcher (supervised by Prof. Alan Yuille) Center for Imaging Science, the Johns Hopkins University

Lingxi Xie. Post-doctoral Researcher (supervised by Prof. Alan Yuille) Center for Imaging Science, the Johns Hopkins University Lingxi Xie Room 246, Malone Hall, the Johns Hopkins University, Baltimore, MD 21218, USA EMail: 198808xc@gmail.com Homepage: http://bigml.cs.tsinghua.edu.cn/~lingxi/ Title Education Background Post-doctoral

More information

Development of a Smart Power Meter for AMI Based on ZigBee Communication

Development of a Smart Power Meter for AMI Based on ZigBee Communication Development of a Smart Power Meter for AMI Based on ZigBee Communication Shang-Wen Luan Jen-Hao Teng Member IEEE Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan Abstract: Many

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

Program at a glance. Wednesday, 23 August Session 1. Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ~ ID 26 ID 20 ID 28 15:00

Program at a glance. Wednesday, 23 August Session 1. Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ~ ID 26 ID 20 ID 28 15:00 Program at a glance Wednesday, 23 August Session 1 (Room:Y201) Session 2 (Room:Y202) Session 3 (Room:Y208) ID 14 ID 17 ID 39 13:30 ID 15 ID 72 ID 53 ID 26 ID 20 ID 28 15:00 ID 36 ID 38 ID 9 ID 48 ID 51

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks Mary Wu 1, ChongGun Kim 1 1*, HeeJoo park 1 Dept. of Computer Eng., Yeungnam Univ., Korea Dept. of Cyber Security., Kyungil

More information

xiv Contents An Ontology-Based Herb Therapy Recommendation for Respiration System Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ti

xiv Contents An Ontology-Based Herb Therapy Recommendation for Respiration System Hung-Yu Chien, Jian-Fan Chen, Yu-Yu Chen, Pei-Syuan Lin, Yi-Ti Contents Multimedia Security and Its Applications A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification... 3 Chin-Feng Lee, Jau-Ji Shen, and Yu-Hua Lai Steganographic

More information

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 [30] Dong J., Lou j. and Yu L. (3), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 Algorithm for Implementation of nine Intra Prediction Modes in MATLAB and

More information

Curriculum Vitae Chia-Wen Lin

Curriculum Vitae Chia-Wen Lin Curriculum Vitae Chia-Wen Lin Office: Home: Department of Computer science & Information Engineering 7F-2, No. 169, San-Hsing National Chung Cheng University Min-Hsiung Chiayi 621, Taiwan, ROC Chiayi 621,

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 3 of 4 TECHNISCHE INFORMATIO.NSBIBLIOTHEK UNIVERS1TATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

CURRICULUM VITAE. Hao MA

CURRICULUM VITAE. Hao MA CURRICULUM VITAE Hao MA Mailing Address: Room 101, HSH Engineering Buildings, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong. Contact Information: Mobile: (+852) 60898067 Email: hma@cse.cuhk.edu.hk

More information

Survey on Recommendation of Personalized Travel Sequence

Survey on Recommendation of Personalized Travel Sequence Survey on Recommendation of Personalized Travel Sequence Mayuri D. Aswale 1, Dr. S. C. Dharmadhikari 2 ME Student, Department of Information Technology, PICT, Pune, India 1 Head of Department, Department

More information

Automatic Image Annotation by Classification Using Mpeg-7 Features

Automatic Image Annotation by Classification Using Mpeg-7 Features International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Automatic Image Annotation by Classification Using Mpeg-7 Features Manjary P.Gangan *, Dr. R. Karthi **

More information

Symposium (ICS 2010) 2010 International Computer. Pages Tainan, Taiwan December IE EC IEEE Catalog Number: CFP1029K-PRT

Symposium (ICS 2010) 2010 International Computer. Pages Tainan, Taiwan December IE EC IEEE Catalog Number: CFP1029K-PRT 2010 International Computer Symposium (ICS 2010) Tainan, Taiwan - 16 18 December 2010 Pages 524-1054 IE EC IEEE Catalog Number: CFP1029K-PRT IEEE ISBN: 978-1-4244-7639-8 2/2 Parallel Session 7 Friday,

More information

Research Issues and Challenges for Multiple Digital Signatures

Research Issues and Challenges for Multiple Digital Signatures INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey

More information

BibPro: A Citation Parser Based on Sequence Alignment Techniques

BibPro: A Citation Parser Based on Sequence Alignment Techniques TR-IIS-07-017 BibPro: A Citation Parser Based on Sequence Alignment Techniques Kai-Hsiang Yang, Chien-Chih Chen, Jan-Ming Ho Oct. 30, 2007 Technical Report No. TR-IIS-07-017 http://www.iis.sinica.edu.tw/page/library/lib/techreport/tr2007/tr07.html

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 1 of 4 TECHNISCHE INFORMATIONSBIBLiOTHEK UNIVERSITATSBiBLIOTHEK HANNOVCR November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

Adopting Data Mining Techniques on the Recommendations of Library Collections

Adopting Data Mining Techniques on the Recommendations of Library Collections Adopting Data Mining Techniques on the Recommendations of Library Collections Shu-Meng Huang a, Lu Wang b and Wan-Chih Wang c a Department of Information Management, Hsing Wu College, Taiwan (simon@mail.hwc.edu.tw)

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System

Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System Toward Interlinking Asian Resources Effectively: Chinese to Korean Frequency-Based Machine Translation System Eun Ji Kim and Mun Yong Yi (&) Department of Knowledge Service Engineering, KAIST, Daejeon,

More information

Embedded Surveillance System using Multiple Ultrasonic Sensors

Embedded Surveillance System using Multiple Ultrasonic Sensors IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 05, 2015 ISSN (online): 2321-0613 Embedded Surveillance System using Multiple Ultrasonic Sensors Harshad S. Patil 1 Dr.

More information

International Journal of Electrical, Electronics ISSN No. (Online): and Computer Engineering 3(2): 85-90(2014)

International Journal of Electrical, Electronics ISSN No. (Online): and Computer Engineering 3(2): 85-90(2014) I J E E E C International Journal of Electrical, Electronics ISSN No. (Online): 2277-2626 Computer Engineering 3(2): 85-90(2014) Robust Approach to Recognize Localize Text from Natural Scene Images Khushbu

More information

Optimization of HMM by the Tabu Search Algorithm

Optimization of HMM by the Tabu Search Algorithm JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 949-957 (2004) Optimization of HMM by the Tabu Search Algorithm TSONG-YI CHEN, XIAO-DAN MEI *, JENG-SHYANG PAN AND SHENG-HE SUN * Department of Electronic

More information

Hao-Hua (Hao) Chu. Computer Science, National Taiwan University, Taipei, Taiwan Associate Professor

Hao-Hua (Hao) Chu. Computer Science, National Taiwan University, Taipei, Taiwan Associate Professor Hao-Hua (Hao) Chu Room 518 Dept of Computer Science & Information Engineering National Taiwan University #1 Roosevelt Road, Section 4, Taipei, Taiwan, 106 EDUCATION University of Illinois at Urbana Champaign,

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

Curriculum Vitae Chia-Wen Lin. Research Interests (See for details)

Curriculum Vitae Chia-Wen Lin. Research Interests (See  for details) Education Curriculum Vitae Chia-Wen Lin Professor Department of Electrical Engineering National Tsing Hua University Hsinchu 30013, Taiwan Tel: +886-3-573-1152 Fax: +886-3-571-5971 Email: cwlin@ee.nthu.edu.tw

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

A Few Things to Know about Machine Learning for Web Search

A Few Things to Know about Machine Learning for Web Search AIRS 2012 Tianjin, China Dec. 19, 2012 A Few Things to Know about Machine Learning for Web Search Hang Li Noah s Ark Lab Huawei Technologies Talk Outline My projects at MSRA Some conclusions from our research

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

A Survey on Postive and Unlabelled Learning

A Survey on Postive and Unlabelled Learning A Survey on Postive and Unlabelled Learning Gang Li Computer & Information Sciences University of Delaware ligang@udel.edu Abstract In this paper we survey the main algorithms used in positive and unlabeled

More information

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem

The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Int. J. Advance Soft Compu. Appl, Vol. 9, No. 1, March 2017 ISSN 2074-8523 The Un-normalized Graph p-laplacian based Semi-supervised Learning Method and Speech Recognition Problem Loc Tran 1 and Linh Tran

More information

Curriculum Vitae. Yao-Nan Lien

Curriculum Vitae. Yao-Nan Lien Curriculum Vitae Yao-Nan Lien Dean, College of Information and Electrical Engineering Asia University 500, Liu-Feng Rd., WuFeng District Taichung, Taiwan, R.O.C. Phone: +886-4-2332-3456#6300 FAX: +886-4-2332-0718

More information

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework Department of Computer Science & Engineering University of Kalyani Syllabus for Ph.D. Coursework Paper 1: A) Literature Review: (Marks - 25) B) Research Methodology: (Marks - 25) Paper 2: Computer Applications:

More information

Symposium (ICS 2010) IEEE International Computer. Pages Tainan, Taiwan December 2010 CFP1029K-PRT /2

Symposium (ICS 2010) IEEE International Computer. Pages Tainan, Taiwan December 2010 CFP1029K-PRT /2 2010 International Computer Symposium (ICS 2010) Tainan, Taiwan 16-18 December 2010 Pages 1-523 IEEE IEEE Catalog Number: ISBN: CFP1029K-PRT 978-1-4244-7639-8 1/2 Parallel Session 1 Thursday, Dec. 16,

More information

Self-organized Routing for Radial Underwater Networks PAPER ID: 2326 AUTHORS: WAHEEDUDDIN HYDER JAVIER PONCELA PABLO OTERO

Self-organized Routing for Radial Underwater Networks PAPER ID: 2326 AUTHORS: WAHEEDUDDIN HYDER JAVIER PONCELA PABLO OTERO Self-organized Routing for Radial Underwater Networks PAPER ID: 2326 AUTHORS: WAHEEDUDDIN HYDER JAVIER PONCELA PABLO OTERO Problem Statement Localization is difficult in UWSN Most of the existing routing

More information

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University.

JOYCE JIYOUNG WHANG. June 2008 May 2010: Undergraduate Research Assistant, Department of Computer Science and Engineering, Ewha Womans University. JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

2016 International Computer Symposium (ICS 2016)

2016 International Computer Symposium (ICS 2016) 2016 International Computer Symposium (ICS 2016) Chiayi, Taiwan 15-17 December 2016 IEEE Catalog Number: ISBN: CFP1629K-POD 978-1-5090-3439-0 Copyright 2016 by the Institute of Electrical and Electronics

More information

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding.

Wireless Communications, Information Theory, Physical Layer Security, Cyber Security for Smart Grid, Cryptography, Network Coding. Mustafa El-Halabi Contact Information Fleifel Building Cell Phone: + (979) 422 4585 Mathaf E-mail: mhalabi@aust.edu.lb Beirut, Lebanon Webpage: https://mustafa-halabi.appspot.com/ Research Interests Education

More information

JOYCE JIYOUNG WHANG EDUCATION

JOYCE JIYOUNG WHANG EDUCATION JOYCE JIYOUNG WHANG Assistant Professor Department of Computer Science and Engineering Sungkyunkwan University (SKKU) Office: Engineering Building 2, #27326 Lab: Engineering Building 2, #26315B (Big Data

More information

Publications for Vera Chung

Publications for Vera Chung Publications for Vera Chung 2018 Kang, K., Bae, C., Yeung, H., Chung, V. (2018). A hybrid gravitational search algorithm with swarm intelligence and deep convolutional feature for object tracking optimization.

More information

Texture classification using fuzzy uncertainty texture spectrum

Texture classification using fuzzy uncertainty texture spectrum Neurocomputing 20 (1998) 115 122 Texture classification using fuzzy uncertainty texture spectrum Yih-Gong Lee*, Jia-Hong Lee, Yuang-Cheh Hsueh Department of Computer and Information Science, National Chiao

More information

Learning based face hallucination techniques: A survey

Learning based face hallucination techniques: A survey Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)

More information

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks Xiuzhen Cheng, Min Ding Department of Computer Science The George Washington University Washington, DC 20052, USA {cheng,minding}@gwu.edu

More information

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Event Sensing on Distributed Video Sensor Networks

Event Sensing on Distributed Video Sensor Networks Event Sensing on Distributed Video Sensor Networks Edward Chang Associate Professor Department of Electrical and Computer Engineering University of California Collaborator Prof. Yuan-Fang Wang Industry

More information

Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones

Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones Sensors and Materials, Vol. 29, No. 7 (2017) 989 995 MYU Tokyo 989 S & M 1390 Design of Miniaturized Optical Image Stabilization and Autofocusing Camera Module for Cellphones Yu-Hao Chang, Chieh-Jung Lu,

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

An Efficient Data Transmission in VANET Using Clustering Method

An Efficient Data Transmission in VANET Using Clustering Method INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 309-313 Manuscript received April 29, 2016; revised July, 2017. DOI: 10.1515/eletel-2017-0045 An Efficient Data Transmission

More information

SMART ENERGY MANAGEMENT SYSTEM

SMART ENERGY MANAGEMENT SYSTEM International Journal of Recent Innovation in Engineering and Research Scientific Journal Impact Factor - 3.605 by SJIF e- ISSN: 2456 2084 SMART ENERGY MANAGEMENT SYSTEM Mrs Ashwini Kale 1, Mr Jeevan Ugale

More information

Frequent Pattern Mining On Un-rooted Unordered Tree Using FRESTM

Frequent Pattern Mining On Un-rooted Unordered Tree Using FRESTM Frequent Pattern Mining On Un-rooted Unordered Tree Using FRESTM Dhananjay G. Telavekar 1, Hemant A. Tirmare 2 1M.Tech. Scholar, Dhananjay G. Telavekar, Dept. Of Technology, Shivaji University, Kolhapur,

More information

Reversible Data Hiding Based on Median Difference Histogram

Reversible Data Hiding Based on Median Difference Histogram JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 577-593 (2011) Reversible Data Hiding Based on Median Difference Histogram HSIEN-WEI YANG 1,2, I-EN LIAO * AND CHAUR-CHIN CHEN + 1 Department of Information

More information

Comments on four multi-server authentication protocols using smart card

Comments on four multi-server authentication protocols using smart card Comments on four multi-server authentication protocols using smart card * Jue-Sam Chou 1, Yalin Chen 2, Chun-Hui Huang 3, Yu-Siang Huang 4 1 Department of Information Management, Nanhua University Chiayi

More information

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering

More information