Shang-Juh Kao

According to our database1, Shang-Juh Kao authored at least 44 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Q-learning approach for adjusting CWS and TxOP in LAA for Wi-Fi and LAA coexisting networks.
Int. J. Wirel. Mob. Comput., 2023

2022
A Rapid Deployment Mechanism of Forwarding Rules for Reactive Mode SDN Networks.
Symmetry, 2022

An efficient virtualized network function deployment scheme for service function chain using deep Q-network.
Int. J. Commun. Syst., 2022

2020
Delay threshold scheduling algorithm for LTE downlink systems.
Int. J. Wirel. Mob. Comput., 2020

LSTM-based ACB scheme for machine type communications in LTE-A networks.
Comput. Commun., 2020

2019
D2D communications with subchannel reusing for throughput-guaranteed relay selection in LTE.
Int. J. Commun. Syst., 2019

Radio resource allocation using genetic algorithm in heterogeneous networks.
Int. J. Commun. Syst., 2019

2017
Energy Saving Mechanism with a Route Prediction Based Intra-handover in LTE Networks.
Wirel. Pers. Commun., 2017

A signal fading-aware and data transmission estimation assisted handover mechanism in LTE networks.
Int. J. Wirel. Mob. Comput., 2017

2015
Activity Selection-Based Single Carrier-Frequency Division Multiple Access Uplink Scheduling for Two-Tier LTE Networks.
Wirel. Pers. Commun., 2015

Dynamic Orthogonal Frequency Division Multiple Access resource management for downlink interference avoidance in two-tier networks.
Int. J. Commun. Syst., 2015

2014
A moving direction prediction-assisted handover scheme in LTE networks.
EURASIP J. Wirel. Commun. Netw., 2014

2013
Graph-Based Interference Avoidance Scheme for Radio Resource Assignment in Two-Tier Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

An Efficient Handover Mechanism by Adopting Direction Prediction and Adaptive Time-to-Trigger in LTE Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
Using <i>GI</i>-<i>G</i>-1 queuing model for rtPS performance evaluation in 802.16 networks.
Int. J. Commun. Syst., 2012

A slot-based BS scheduling with maximum latency guarantee and capacity first in 802.16e networks.
Int. J. Commun. Syst., 2012

Efficient hierarchical SIP mobility management for WiMAX networks.
Comput. Math. Appl., 2012

An approximation analysis for safety messages transmission in vehicle-to-vehicle WAVE networks.
Comput. Ind. Eng., 2012

2011
A high quality image sharing with steganography and adaptive authentication scheme.
J. Syst. Softw., 2011

Adjustable flooding-based discovery with multiple QoSs for cloud services acquisition.
Int. J. Web Grid Serv., 2011

Correction: Handoff optimization in 802.11 wireless networks.
EURASIP J. Wirel. Commun. Netw., 2011

Handoff optimization in 802.11 wireless networks.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Discrete-time modeling for performance analysis of real-time services in IEEE 802.16 networks.
Comput. Commun., 2010

2009
Security management of mutually trusted domains through cooperation of defensive technologies.
Int. J. Netw. Manag., 2009

Computer-Assisted Evaluation System for Volleyball Referee's Executive Judgment.
Int. J. Comput. Sci. Sport, 2009

Reversible Secret Image Sharing Based on Shamir's Scheme.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

XLCMS - a scalable and distributive linux virtual cluster management system.
Proceedings of the 2009 International Conference on Information Networking, 2009

Performance analysis for unsolicited grant service in 802.16 networks using a discrete-time model.
Proceedings of the 2009 International Conference on Information Networking, 2009

Adopting SCTP and MPLS-TE mechanism in VoIP architecture for fault recovery and resource allocation.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
Enhance the Image Sharing with Steganography and Authentication.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Semantic Web approach to smart link generation for Web navigations.
Softw. Pract. Exp., 2007

2006
Integrating Semantic Web Reasoning into Learning Object Metadata.
Proceedings of the ICEIS 2006, 2006

Browser Compatible XLink Processing.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

Security Gateway for Accessing IPv6 WLAN.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

Topology Discovery for Coexisting IPv6 and IPv4 Networks.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

Application Services Based on Personal Data Ontology.
Proceedings of the 5th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2006) and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering, 2006

2005
An OWL-based extensible transcoding system for mobile multi-devices.
J. Inf. Sci., 2005

AAA Architecture for WLAN over IPv6.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

XBMS - An Open XML Bibliography Management System.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition Mechanisms.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Cooperating Security Management for Mutually Trusted Secure Networks.
Proceedings of The 2005 International Conference on Internet Computing, 2005

2002
Agent-Based Infrastructure and an Application to Internet Information Gathering.
Knowl. Inf. Syst., 2002

1997
An autonomous agent-based infrastructure for inter-LAN systems management.
Proceedings of the Third International Symposium on Autonomous Decentralized Systems, 1997

A New Performance Analysis Model of the Local Switching System.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997


  Loading...