Fang-Yie Leu

Orcid: 0000-0002-7746-7800

According to our database1, Fang-Yie Leu authored at least 270 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Q-learning-based downlink scheduling in 5G systems.
Wirel. Networks, November, 2024

Implementation of Switch Slicing in 5G/B5G/6G Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Applying ChatGPT-Based Iterative Improvement Model for Improving Software Maintenance Efficiency.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Legal Case Retrieval by Essential Element Extraction Based on Reading Comprehension Model.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Base-Station Resource Allocation Based on Frame/Sub-Frame.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Enhancing Legal Judgment Retrieval by Re-Ranking Based on Contrastive Implicit Factors.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024

2023
DR.QG: Enhancing Closed-Domain Question Answering via Retrieving Documents for Question Generation.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

The Design and Implementation of a Weapon Detection System Based on the YOLOv5 Object Detection Algorithm.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Regression Testing Measurement Model to Improve CI/CD Process Quality and Speed.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

QoS-Oriented Uplink OFDMA Random Access Scheme for IEEE 802.11be.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Case Study in Generating RFC Maps of IETF Standards.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and Quality.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Enhancing Resource Allocation for Cloud Computation Platform with Priority Based Scheduling.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

5G Network Base Station Timeline Scheduling.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

2022
A Deep Learning-Based Chinese Semantic Parser for the Almond Virtual Assistant.
Sensors, 2022

Word Embedding Quantization for Personalized Recommendation on Storage-Constrained Edge Devices in a Smart Store.
Mob. Networks Appl., 2022

Predictive intelligence in harmful news identification by BERT-based ensemble learning model with text sentiment analysis.
Inf. Process. Manag., 2022

Adaptive resource management for spot workers in cloud computing environment.
Int. J. Web Grid Serv., 2022

Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers' Service Level Agreement.
Big Data Cogn. Comput., 2022

Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof.
Proceedings of the Smart Grid and Internet of Things - 6th EAI International Conference, 2022

Shannon Entropy Mixing Cumulative Sum Algorithm for DoS/DDoS Detection and Defense.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

Asymmetric Cryptography Among Different 5G Core Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

5G Base Station Scheduling.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Detection and Defense of DDoS Attack and Flash Events by Using Shannon Entropy.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Stock Price Trend Prediction Using LSTM and Sentiment Analysis on News Headlines.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Applying CI/CD Process to Improve the Speed and Critical Quality of Perfective Maintenance.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Efficient Weighted and Balanced Resource Allocation for High-Performance Render Farms.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques.
IEEE Trans. Educ., 2021

Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).
Sensors, 2021

A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
Mob. Networks Appl., 2021

Transformative computing in security, big data analysis, and cloud computing applications.
Concurr. Comput. Pract. Exp., 2021

A deep learning-based indoor-positioning approach using received strength signal indication and carrying mode information.
Concurr. Comput. Pract. Exp., 2021

Secure LoRaWAN Root Key Update Scheme for IoT Environment.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

You Draft We Complete: A BERT-Based Article Generation by Keyword Supplement.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

Using Object Detection Technology to Measure the Accuracy of the TFT-LCD Printing Process by Using Deep Learning.
Proceedings of the Advances in Internet, 2021

The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Efficient Execution of Malleable Applications in Desktop Grids Using Credit Damping.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Mobile Physiological Sensor Cloud System for Long-term Care.
Internet Things, 2020

A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020

A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020

Secure Session Key Generation Method for LoRaWAN Servers.
IEEE Access, 2020

Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks.
IEEE Access, 2020

Novel Reversible Acoustic Steganography Based on Carrier Orthogonality.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Detecting DoS and DDoS Attacks by Using CuSum Algorithm in 5G Networks.
Proceedings of the Advances in Networked-Based Information Systems, 2020

A Hybrid Information-Based Smartphone Indoor-Position Approach.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

The Study on AUSF Fault Tolerance.
Proceedings of the Advances in Internet, 2020

Extractive Summarization by Rouge Score Regression Based on BERT.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2020

On Text Tiling for Documents: A Neural-Network Approach.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

IoT Device Power Management Based on PSM and EDRX Mechanisms.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

Combining Agile with Traditional Software Development for Improvement Maintenance Efficiency and Quality.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

A High Sensing Accuracy Mechanism for Wireless Sensor Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
E-ANDSF-Based Base Station Selection Scheme by Using MLP in Untrusted Environments.
IEEE Trans. Ind. Informatics, 2019

Low-Power AES Data Encryption Architecture for a LoRaWAN.
IEEE Access, 2019

Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs.
Proceedings of the Wireless Internet - 12th EAI International Conference, 2019

LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

A Novel Bounded-Error Piecewise Linear Approximation Algorithm for Streaming Sensor Data in Edge Computing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019

MIH and CRRM Handover in Trusted or Untrusted Environments.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

A LoRaWAN Based Energy Efficient Data Encryption Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Firewall Services Provided by Edge Computers Under AMF and gNB in 5G.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Air Pollution Source Identification by Using Neural Network with Bayesian Optimization.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Keynote: Air pollution source identification by using Neural Network with Bayesian Optimization.
Proceedings of the 2019 International Conference on Computer, 2019

News Collection and Analysis on Public Political Opinions.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Mobile Physiological Sensor Cloud System for Long-Term Care.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

System Implementation of AUSF Fault Tolerance.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Revealing Storage and Speed Transmission Emerging Technology of Big Data.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
IEEE Syst. J., 2018

Secure and efficient protocol for fast handover in 5G mobile Xhaul networks.
J. Netw. Comput. Appl., 2018

Healthcare-based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
J. Medical Syst., 2018

An MFCC-based text-independent speaker identification system for access control.
Concurr. Comput. Pract. Exp., 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Comput. Electr. Eng., 2018

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments.
IEEE Access, 2018

MIH-Based eNB Selection for Untrusted Networks.
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018

Clickbait Detection Based on Word Embedding Models.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Study on Firewall Services with Edge Computers of vEPC in 5G Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOps.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Self-parameter Based Bilateral Session Key Exchange Method.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

High Performance Grid Computing: Challenges and Opportunities of High Speed Networking.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Migration of Edge Computing Services in 5G Networks - Firewall as a Service Example.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Analyzing Attributes of Successful Learners by Using Machine Learning in an Undergraduate Computer Course.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing.
Soft Comput., 2017

Prediction of technical efficiency and financial crisis of Taiwan's information and communication technology industry with decision tree and DEA.
Soft Comput., 2017

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques.
IEEE Syst. J., 2017

Secure data-sharing using distributed environmental matching keys.
Pervasive Mob. Comput., 2017

Enabling in-network aggregation by diffusion units for urban scale M2M networks.
J. Netw. Comput. Appl., 2017

Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest.
Int. J. Inf. Manag., 2017

Implementation of a virtual switch monitoring system using OpenFlow on cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2017

Square Key Matrix Management Scheme in Wireless Sensor Networks.
Comput. Informatics, 2017

Generating Dynamic Box by Using an Input String.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017

IP-based seamless handover scheme using ANDSF in an untrusted environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

MIH-Based Congestion Control with Seamless Handover in Untrusted Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A 3D encryption with shifting mapping substitution mechanism.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Implement of agent with role-based hierarchy access control for secure grouping IoTs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Relay Base-Station Handover in a 5G Environment.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

A Light Weight Data Encryption Method for WSN Communication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Predicting Video Stream Fragments in a Reactive Mode.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

An MFCC-Based Speaker Identification System.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Approaching green sensor field using queue-based optimization technique.
J. Netw. Comput. Appl., 2016

Editorial.
J. Internet Serv. Inf. Secur., 2016

Android vs iOS or Others? SMD-OS Security Issues: Generation Y Perception.
Int. J. Technol. Diffusion, 2016

An ECC-based secure EMR transmission system with data leakage prevention scheme.
Int. J. Comput. Math., 2016

Data Encryption Method Using Environmental Secret Key with Server Assistance.
Intell. Autom. Soft Comput., 2016

Impacts of Task Re-Execution Policy on MapReduce Jobs.
Comput. J., 2016

Residence Energy Control System Based on Wireless Smart Socket and IoT.
IEEE Access, 2016

TTP Based High-Efficient Multi-Key Exchange Protocol.
IEEE Access, 2016

Random Cladding with Feedback Mechanism for encrypting mobile messages.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Cloud Encryption Using Distributed Environmental Keys.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Finite State Machine Based Real Time Scheduling for Microchip.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Wireless Body Sensor Network and Its Applications: Rehearsal with a Smartphone.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Secure and High Performance Wireless Sensor Network Based on Symmetric Key Matrix.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Secure Official Vehicle Communication Protocol for VANET.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Device Parameter based Secure User Authentication.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Enhancing Security of LTE using a Double Masking Technique.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Applying Data Mining to Explore Students' Self-Regulation in Learning Contexts.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Pareto-based cache replacement for YouTube.
World Wide Web, 2015

Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption.
IEEE Trans. Parallel Distributed Syst., 2015

Analyzing job completion reliability and job energy consumption for a heterogeneous MapReduce cluster under different intermediate-data replication policies.
J. Supercomput., 2015

Secure ubiquitous computing.
Pervasive Mob. Comput., 2015

S-PMIPv6: An intra-LMA model for IPv6 mobility.
J. Netw. Comput. Appl., 2015

Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA.
J. Internet Serv. Inf. Secur., 2015

PAReS: A Proactive and Adaptive Redundant System for MapReduce.
J. Inf. Sci. Eng., 2015

A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015

Innovations in security and knowledge management.
Int. J. Inf. Manag., 2015

Accessing medical image file with co-allocation HDFS in cloud.
Future Gener. Comput. Syst., 2015

A Secure M-Commerce System based on credit card transaction.
Electron. Commer. Res. Appl., 2015

A Wireless Physiological Sensor Area Network.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

A Security Threats Measurement Model for Reducing Cloud Computing Security Risk.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An AP Selection with RSS Standard Deviation for Indoor Positioning in Wi-Fi.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Applying Web Crawlers to Develop a Sale Management System for Online Malls.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

ReMBF: A Reliable Multicast Brute-Force Co-allocation Scheme for Multi-user Data Grids.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Construction of a Green Power Virtual Machine Management Method on OpenStack.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Secure Power Management Scheme for WSN.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Applying Continuous Integration for Reducing Web Applications Development Risks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014

The simulation of an emotional robot implemented with fuzzy logic.
Soft Comput., 2014

Guest Editorial: Emerging Software Reliability and System Security Technologies.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

A Secure ECC-based Electronic Medical Record System.
J. Internet Serv. Inf. Secur., 2014

A Grid System Detecting Internal Malicious Behaviors at System Call Level.
J. Internet Serv. Inf. Secur., 2014

Editorial.
Int. J. Commun. Networks Distributed Syst., 2014

Designing A Healthcare Authorization Model Based On Cloud Authentication.
Intell. Autom. Soft Comput., 2014

Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014

A true Random-Number Encryption Method employing block cipher and PRNG.
Comput. Sci. Inf. Syst., 2014

Implementation of an environmental quality and harmful gases monitoring system.
Proceedings of the International Conference on Smart Computing, 2014

A Group File Encryption Method using Dynamic System Environment Key.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

An Environmental Monitoring System for Air Quality Control.
Proceedings of the Intelligent Systems and Applications, 2014

Developing a Performance-Analysis Model for a Star-Topology Data Grid from Multi-user Perspective.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Mobile Shopping System Based on Credit Card Transaction.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Secure Traffic Control System with Emergency Handling for Ambulances.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Research on Comparison and Analysis of the DEFSOP, NIST Cell SOP, and ISO27037 SOP.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Secure Authentication Scheme of Health Care Based on the Cloud.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Minimum Cost Content Object Reconstruction in Multi-tier Servers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014

A random wrapping encryption method.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A Wandering Path Tracking and Fall Detection System for People with Dementia.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Cache Replacement Algorithms for YouTube.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems.
Mob. Inf. Syst., 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Math. Comput. Model., 2013

A secure communication over wireless environments by using a data connection core.
Math. Comput. Model., 2013

Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure.
J. High Speed Networks, 2013

Special issue on cloud, wireless and e-commerce security.
J. Ambient Intell. Humaniz. Comput., 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

On Construction of an Intelligent Environmental Monitoring System for Healthcare.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Building a block cipher mode of operation with feedback keys.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013

Implementation of a Virtual Switch Monitor System Using OpenFlow on Cloud.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

TSR: Topology Reduction from Tree to Star Data Grids.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A True Random-Number Encryption Method.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A Block Cipher Mode of Operation with Two Keys.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Implementation of Cloud IaaS for Virtualization with Live Migration.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

A Handover Scheme for LTE Wireless Networks under the Assistance of GPS.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

The Simulation of a Robot with Emotions Implemented with Fuzzy Logic.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment Industry.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Improve Two Remote User Authentication Scheme Using Smart Card.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

A Multiple-Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Lifetime elongation for wireless sensor network using queue-based approaches.
J. Supercomput., 2012

PFRF: An adaptive data replication algorithm based on star-topology data grids.
Future Gener. Comput. Syst., 2012

A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates.
Comput. Syst. Sci. Eng., 2012

A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking.
Algorithms, 2012

Improving security level of LTE authentication and key agreement procedure.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Controlling Traffic Lights for Ambulances.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Emerging Wireless and Mobile Technologies.
Mob. Inf. Syst., 2011

A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. Univers. Comput. Sci., 2011

Emerging Security Technologies and Applications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Netw. Comput. Appl., 2011

Resource brokering using a multi-site resource allocation strategy for computational grids.
Concurr. Comput. Pract. Exp., 2011

A path switching scheme for SCTP based on round trip delays.
Comput. Math. Appl., 2011

A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Semi-preemptive Ad Hoc Computational Service System with Limited Resources.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

An Improvement of Chen Et al.'s Scheme for Mobile Pay-TV.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Verification of a Batch of Bad Signatures by Using the Matrix-Detection Algorithm.
Proceedings of the First International Conference on Data Compression, 2011

Improving Data Grids Performance by Using Popular File Replicate First Algorithm.
Proceedings of the 2011 International Conference on Broadband, 2011

A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers.
J. Supercomput., 2010

An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language.
J. Inf. Sci. Eng., 2010

Predicting vertebrate promoters using heterogeneous clusters.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies.
Future Gener. Comput. Syst., 2010

A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon Based Multi-channel Wireless Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

An Event-Driven Mobile Assistant Control Protocol for Wireless Sensor Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
Proceedings of the CISIS 2010, 2010

Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering.
Proceedings of the CISIS 2010, 2010

Mutual Authentication with Dynamic Keys in an IEEE802.16e PKM Environment.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications.
J. Netw. Comput. Appl., 2009

A Routing Scheme with Localized Movement in Event-Driven Wireless Sensor Networks.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Detecting DoS and DDoS Attacks Using Chi-Square.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Path Switching Scheme for SCTP Based on Round Trip Delay.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Detection workload in a dynamic grid-based intrusion detection environment.
J. Parallel Distributed Comput., 2008

Maximum capacity in chain-topology wireless mesh networks.
Proceedings of the Wireless Telecommunications Symposium, 2008

A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks.
Proceedings of the Advances in Ad Hoc Networking, 2008

A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
A scalable sensor network using a polar coordinate system.
Signal Process., 2007

An Improved Bandwidth-Use Method on IEEE 802.11e Standard over Wireless LAN.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.
Proceedings of the Advances in Information and Computer Security, 2007

An Enhanced DGIDE Platform for Intrusion Detection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A Wireless Grid Service Platform Using SIP and Agents.
Proceedings of the Seventh International Conference on Software Engineering, 2006

2005
Predicting vertebrate promoters with heterogeneous cluster computing.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Garanteed non dropping mechanism deploying IEEE802.11e standard.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Mobile Agent Communication Using SIP.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

IFTS: Intrusion Forecast and Traceback based on Union Defense Environment.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Distributed Sendbox Scheme for Mobile Agent Communication.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

Fuzzy-Based Dynamic Bandwidth Allocation System.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Intrusion Detection with CUSUM for TCP-Based DDoS.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Performance-Based Grid Intrusion Detection System.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Integrating Grid with Intrusion Detection.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Compressing a Directed Massive Graph using Small World Model.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004

Compressing an Inverted File with LCS.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

1995
A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model.
J. Inf. Sci. Eng., 1995

1990
Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems.
Proceedings of the SEKE'90, 1990

Rule base inspection using algorithmic approach for data-access oriented knowledge-based systems.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990


  Loading...