Fang-Yie Leu
Orcid: 0000-0002-7746-7800
According to our database1,
Fang-Yie Leu
authored at least 270 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Wirel. Networks, November, 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Applying ChatGPT-Based Iterative Improvement Model for Improving Software Maintenance Efficiency.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Legal Case Retrieval by Essential Element Extraction Based on Reading Comprehension Model.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Enhancing Legal Judgment Retrieval by Re-Ranking Based on Contrastive Implicit Factors.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2024
2023
DR.QG: Enhancing Closed-Domain Question Answering via Retrieving Documents for Question Generation.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
The Design and Implementation of a Weapon Detection System Based on the YOLOv5 Object Detection Algorithm.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Applying High-Quality Test Case Management Mechanisms to Improve Regression Testing Speed and Quality.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Enhancing Resource Allocation for Cloud Computation Platform with Priority Based Scheduling.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023
2022
Sensors, 2022
Word Embedding Quantization for Personalized Recommendation on Storage-Constrained Edge Devices in a Smart Store.
Mob. Networks Appl., 2022
Predictive intelligence in harmful news identification by BERT-based ensemble learning model with text sentiment analysis.
Inf. Process. Manag., 2022
Int. J. Web Grid Serv., 2022
Innovative Business Process Reengineering Adoption: Framework of Big Data Sentiment, Improving Customers' Service Level Agreement.
Big Data Cogn. Comput., 2022
Hybrid AI-Based iBeacon Indoor Positioning Cybersecurity Attacks and Defenses Thereof.
Proceedings of the Smart Grid and Internet of Things - 6th EAI International Conference, 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Applying CI/CD Process to Improve the Speed and Critical Quality of Perfective Maintenance.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Generating Personalized Phishing Emails for Social Engineering Training Based on Neural Language Models.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
Efficient Weighted and Balanced Resource Allocation for High-Performance Render Farms.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
2021
Examining Successful Attributes for Undergraduate Students by Applying Machine Learning Techniques.
IEEE Trans. Educ., 2021
Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019).
Sensors, 2021
Mob. Networks Appl., 2021
Transformative computing in security, big data analysis, and cloud computing applications.
Concurr. Comput. Pract. Exp., 2021
A deep learning-based indoor-positioning approach using received strength signal indication and carrying mode information.
Concurr. Comput. Pract. Exp., 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Using Object Detection Technology to Measure the Accuracy of the TFT-LCD Printing Process by Using Deep Learning.
Proceedings of the Advances in Internet, 2021
The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
2020
A channel assignment scheme for MIMO on concentric-hexagon-based multi-channel wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2020
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme.
Concurr. Comput. Pract. Exp., 2020
Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks.
IEEE Access, 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
Combining Agile with Traditional Software Development for Improvement Maintenance Efficiency and Quality.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
Dynamic Routing and Bandwidth Provision Based on Reinforcement Learning in SDN Networks.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
IEEE Trans. Ind. Informatics, 2019
Proceedings of the Wireless Internet - 12th EAI International Conference, 2019
LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
A Novel Bounded-Error Piecewise Linear Approximation Algorithm for Streaming Sensor Data in Edge Computing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Air Pollution Source Identification by Using Neural Network with Bayesian Optimization.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Keynote: Air pollution source identification by using Neural Network with Bayesian Optimization.
Proceedings of the 2019 International Conference on Computer, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
2018
Comments on "SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".
IEEE Syst. J., 2018
J. Netw. Comput. Appl., 2018
Healthcare-based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
J. Medical Syst., 2018
Concurr. Comput. Pract. Exp., 2018
Comput. Electr. Eng., 2018
IEEE Access, 2018
Proceedings of the Wireless Internet - 11th EAI International Conference, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
The Study of MME Pool Management and Fault Tolerance in 5G Networks with SDN Controllers.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
A Micro Services Quality Measurement Model for Improving the Efficiency and Quality of DevOps.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
High Performance Grid Computing: Challenges and Opportunities of High Speed Networking.
Proceedings of the Advances on Broadband and Wireless Computing, 2018
Proceedings of the Advances on Broadband and Wireless Computing, 2018
A Banking Chatbot Security Control Procedure for Protecting User Data Security and Privacy.
Proceedings of the Advances on Broadband and Wireless Computing, 2018
Analyzing Attributes of Successful Learners by Using Machine Learning in an Undergraduate Computer Course.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing.
Soft Comput., 2017
Prediction of technical efficiency and financial crisis of Taiwan's information and communication technology industry with decision tree and DEA.
Soft Comput., 2017
An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques.
IEEE Syst. J., 2017
Pervasive Mob. Comput., 2017
J. Netw. Comput. Appl., 2017
Spatial analysis and data mining techniques for identifying risk factors of Out-of-Hospital Cardiac Arrest.
Int. J. Inf. Manag., 2017
Int. J. Ad Hoc Ubiquitous Comput., 2017
Comput. Informatics, 2017
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework.
Proceedings of the IoT as a Service - Third International Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Healthcare Based on Cloud Electrocardiogram System: A Medical Center Experience in Middle Taiwan.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
An Iterative and Incremental Data Preprocessing Procedure for Improving the Risk of Big Data Project.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Prediction of the Fragment of Video Streamed to Mobile Phones Under a 5G Network Base Station.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Implement of agent with role-based hierarchy access control for secure grouping IoTs.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
A Critical Quality Measurement Model for Managing and Controlling Big Data Project Risks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Soft Comput., 2016
J. Netw. Comput. Appl., 2016
Int. J. Technol. Diffusion, 2016
Int. J. Comput. Math., 2016
Intell. Autom. Soft Comput., 2016
IEEE Access, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Secure Mobile Instant Messaging key exchanging protocol with One-Time-Pad substitution transposition cryptosystem.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
A Version Control-Based Continuous Testing Frame for Improving the IID Process Efficiency and Quality.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Data Preprocessing Quality Management Procedure for Improving Big Data Applications Efficiency and Practicality.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Inferring Smartphone User Demographics from Wi-Fi trace Logs: A Study of Users' Privacy Concerns.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption.
IEEE Trans. Parallel Distributed Syst., 2015
Analyzing job completion reliability and job energy consumption for a heterogeneous MapReduce cluster under different intermediate-data replication policies.
J. Supercomput., 2015
Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using TDMA.
J. Internet Serv. Inf. Secur., 2015
J. Inf. Sci. Eng., 2015
A secure data encryption method employing a sequential-logic style mechanism for a cloud system.
Int. J. Web Grid Serv., 2015
Future Gener. Comput. Syst., 2015
Electron. Commer. Res. Appl., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
ReMBF: A Reliable Multicast Brute-Force Co-allocation Scheme for Multi-user Data Grids.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Cluster-RLM: Establishing a Routing Path with Cluster-Based Redundant Link Minimization in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Implementation of a Software-Defined Storage Service with Heterogeneous Storage Technologies.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.
J. Supercomput., 2014
Soft Comput., 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
J. Internet Serv. Inf. Secur., 2014
J. Internet Serv. Inf. Secur., 2014
Intell. Autom. Soft Comput., 2014
Special Issue: Mobile Internet Technologies and Services - Editorial.
Comput. Syst. Sci. Eng., 2014
Comput. Sci. Inf. Syst., 2014
Proceedings of the International Conference on Smart Computing, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Developing a Performance-Analysis Model for a Star-Topology Data Grid from Multi-user Perspective.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid.
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Improving Multi-path Congestion Control for Event-Driven Wireless Sensor Networks by Using TDMA.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Combining IID with BDD to Enhance the Critical Quality of Security Functional Requirements.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Impact of MapReduce Task Re-execution Policy on Job Completion Reliability and Job Completion Time.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems.
Mob. Inf. Syst., 2013
Math. Comput. Model., 2013
Math. Comput. Model., 2013
Analyzing job completion reliability and job energy consumption for a general MapReduce infrastructure.
J. High Speed Networks, 2013
J. Ambient Intell. Humaniz. Comput., 2013
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
A secure wireless communication system by integrating RSA and Diffie-Hellman PKDS in 4G environments and an intelligent protection-key chain with a data connection core.
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the 22nd IEEE International Symposium on Industrial Electronics, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
A Software Security Requirement Quality Improvement Procedure to Increase E-Commerce Security.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
An Interdisciplinary Analysis of Servitization and Active Aging in Taiwan's Senior Care Market: A Case Study of Fitness Equipment Industry.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Deriving Job Completion Reliability and Job Energy Consumption for a General MapReduce Infrastructure from Single-Job Perspective.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Supercomput., 2012
Future Gener. Comput. Syst., 2012
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates.
Comput. Syst. Sci. Eng., 2012
A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking.
Algorithms, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
The IPSec Security Problems and a Cross-layer Security Mechanism for PMIPv6 Handover when an IPSec Security Association is Established on an L2 Direct Link.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional Operation.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks.
Mob. Inf. Syst., 2011
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
J. Univers. Comput. Sci., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks.
J. Netw. Comput. Appl., 2011
Resource brokering using a multi-site resource allocation strategy for computational grids.
Concurr. Comput. Pract. Exp., 2011
Comput. Math. Appl., 2011
A Location-Based Handoff Scheme Based on IEEE 802.21 in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
An AC LED Smart Lighting System with Visible Light Time-Division Multiplexing Free Space Optical Communication.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the First International Conference on Data Compression, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers.
J. Supercomput., 2010
An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language.
J. Inf. Sci. Eng., 2010
Int. J. Ad Hoc Ubiquitous Comput., 2010
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies.
Future Gener. Comput. Syst., 2010
A Channel Assignment and AP Deployment Scheme for Concentric-Hexagon Based Multi-channel Wireless Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS.
Proceedings of the CISIS 2010, 2010
Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering.
Proceedings of the CISIS 2010, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
A novel network mobility handoff scheme using SIP and SCTP for multimedia applications.
J. Netw. Comput. Appl., 2009
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009
A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Detecting DoS and DDoS Attacks by Using an Intrusion Detection and Remote Prevention System.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
J. Parallel Distributed Comput., 2008
Proceedings of the Wireless Telecommunications Symposium, 2008
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008
An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks.
Proceedings of the Advances in Ad Hoc Networking, 2008
A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Seventh International Conference on Software Engineering, 2006
2005
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
1995
A Validation Assistant for A Distributed Office Information System Modeled by Office Procedure Model.
J. Inf. Sci. Eng., 1995
1990
Automatic Rule Base Inspection for Data-Access Oriented Knowledge-based Systems.
Proceedings of the SEKE'90, 1990
Rule base inspection using algorithmic approach for data-access oriented knowledge-based systems.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990