2015 Publications
2014 Publications
Kao-Lin Hu, Pao-Lien Lai, and Cheng-Yi Lin, “One method for efficiently embedding Hamiltonian cycle in Mobius cubes,” in Proceeding of the 31th Workshop on Combinatorial Mathematics and Computation Theory, p. 186-191, Taipei, Taiwan, Apr. 25-26, 2014. (NSC 102-2115-M-259-007)
Wen-Yen Lin and Pao-Lien Lai “Independent spanning trees in hierarchical crossed cubes,” International Computer Symposium, Taichung, Taiwan, Dec. 12-14, 2014. (NSC 102-2115-M-259-007)
Han-Ying Kao*, Yu-Tseng Wang, Chia-Hui Huang, Pao-Lien Lai, and Jen-Yeu Chen, “Assessment and Classification of Service Learning: A Case Study of CS/EE Students”, The Scientific World Journal, vol. 2014 (2014), Article ID 183732.
賴志宏、高碩呈、陳冠瑜(2014, 5 月)。手機成癮相關議題之文獻分析。2014 全 球華人計算機教育應用大會(GCCCE2014)。上海。
Chen, S., Chang, W. H., Lai, C. H., & Tsai, C. Y. (2014). A comparison of students’ approaches to inquiry, conceptual learning and attitudes in simulation-based and microcomputer-based laborites. Science Education. 98(5), 905-935. (SSCI, IF: 2.382, sub-category rank: 8/219)
Lai, C. H.*, Chen, F. C., & Yang, J. C. (2014). Exploration of tensions in a mobile-technology supported fieldtrip: An Activity Theory Perspective. International Journal of Distance Education Technologies. 12(2), 104-117. (EI)
Lai, C. H.*, Lin, C. Y., Chen, C. H., Chen, S. F., & Gwung, H. L. (2014). The association between college students’Internet usage and interpersonal relationships. Journal of Internet Technology. 15(4), 671-678. (SCI, IF:0.481, sub-category rank: 104/131)
Lai, C. H.*, Yang, S. P., Yen, A. C., & Chou, C. G. (2014). SMS and Emails as class reminders to assist subject learning. Journal of Computers. 24(4), 22-30. (EI)
Chung Yung, Ming-Cheng Li, and Yu-Tang Lin, “A New Model of Software Project Management Using Agile Methodology in Cloud Computing Environments,” Proceedings of the 2014 International Scientific Conference on Management and Information Science (ISCMIS 2014), pp. 233-243, June 2014.
Chung Yung, “e-Management of Software Development Projects in Cloud Computing Environments,” Proceedings of the 2014 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology – Fall Session (e-CASE & e-Tech 2014-Fall), pp. 389-400, November 2014.
Chung Yung, Shao-Zong Chen, and Jen-Tsung Hsieh, “Automatic Schedule Control for Distributed Software Development in Cloud Computing Environments,” Journal of Industrial and Intelligent Information (JIII), vol. 2, no. 1, pp. 39-44, March 2014.
Tao-Ku Chang*, “A Secure Operational Model for Mobile Payments.” The Scientific World Journal, 2014. (SCI journal; Supported in part by NSC of Taiwan under grant no. MOST-103-2221-E-259-029)
Tao-Ku Chang* and Tian-Yow Hwang. “An SOA-based System Modeling Methodology.” Journal of Internet Technology, 2014 (SCI journal; Supported in part by NSC of Taiwan under grant no. NSC-101-2221-E-259-030)
Tao-Ku Chang* and Jyun-Siao Huang. “Design and Implementation of a Secure Service-Oriented Workflow Platform.” Journal of Computers, 2014 (EI journal; Supported in part by NSC of Taiwan under grant no. NSC-102-2221-E-259-015)
Chang-Hsiung Tsai* “ The pessimistic diagnosability of alternating groupgraphs under the PMC model,’’ Information Processing Letters, (accepted),2014,
Chia-Jui Lai and Chang-Hsiung Tsai*, “A systematic approach for embedding of Hamiltonian cycles through a prescribed edge in locally twisted cubes”, Information Sciences, vol.289, pp. 1-7, 2014. SCI, EI.
Chia-Jui Lai and Chang-Hsiung Tsai*, “A linear algorithm for embedding of cycles in crossed cubes with edge-pancyclic”, Journal of Information Science and Engineering, (Accepted)2014. SCI, EI.
Y.X. Liu, C.N. Yang, P.H. Yeh, “Reducing Shadow Size in Smooth Scalable Secret Image Sharing,” Security and Communication Networks, Vol. 7, Issue 12, pp. 2237–2244, Dec., 2014.[SCI 5-year IF: 0.468].
C.N.Yang, C.L. Hsieh, and S.R. Cai, “Secret Image Sharing Schemes by Using Maximum Distance Separable Codes,” International Journal of Machine Learning and Computing, Vol. 4, No. 6, pp. 522-526, Dec., 2014. [indexed by Ei INSPEC].
C. Kim and C.N.Yang, “Data Hiding Based on Overlapped Pixels Using Hamming Code,” Multimedia Tools and Applications, published online, DOI: 10.1007/s11042-014-2355-x, Nov., 2014. [SCI 5-year IF: 1.039].
X. Yan, S. Wang,X. Niu, and C.N. Yang, “Essential Visual Cryptographic Scheme with Different Importance of Shares,” LNCS 8836, pp. 636-643, ICONIP 2014 (the 21st International Conference on Neural Information Processing), Kuching, Sarawak, Malaysia, Nov., 2014.
Shinfeng D. Lin, Yu-Ting Jiang, and Jia-Jen Lin, Object Tracking Using Particle Filter with SURF Feature, Journal of Electronic Science and Technology, Vol. 12, No. 3, pp. 339-344, September 2014, El.
Shi-Jim Yen, Wei-Liang Chen, Jr-Chang Chen, Shun-Chin Hsu and I-Chen Wu, “An Improved
X. Yan, G. Chen, and C.N. Yang, “Random Girds-based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
P. Li, C.N. Yang, and Q. Kong, “Two-in-one Image Secret Sharing Scheme Based on Boolean Operations,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
C. Kim and C.N. Yang, “Steganography Based on Grayscale Images Using (5, 3) Hamming Code,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
C.N. Yang , C.C. Wu, and D. Wang, “A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid,” Information Sciences, Vol. 278, pp. 141-173, Sep., 2014. [SCI 5-year IF: 3.969].
D. Wang, F. Yi, and C.N. Yang,“Visual Cryptography Scheme with Autostereogram,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
Y.C. Huang, W.C. Kuo, and C.N. Yang, “Data Hiding Based on Radix-2,” AsiaJCIS 2014 (the 9th Asia Joint Conference on Information Security), Wuhan, China, Sep., 2014.
Chin-Chen Chang, I-Ta Lee, Tsung-Ta Ke and Wen-Kai Tai, “An object-based image reducing approach,” Advanced Materials Research, vols. 1044-1045, pp. 1049-1052, August 2014. (EI)
Chenn-Jung Huang, You-Jia Chen, Heng-Ming Chen, Jui-Jiun Jian, Sheng-Chieh Tseng, Yi-Ju Yang, Po-An Hsu: Intelligent feature extraction and classification of anuran vocalizations. Appl. Soft Comput. 19: 1-7 (2014)
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Han-Wen Tsai, Jui-Jiun Jian, Ai-Lin Cheng, Jia-Jian Liao: Application of cellular automata and type-2 fuzzy logic to dynamic vehicle path planning. Appl. Soft Comput. 19: 333-342 (2014)
C.N. Yang , C.C. Wu, and D. Wang, “A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid,” accepted and to be published at Information Sciences, DOI: 10.1016/j.ins.2014.03.033.[SCI 5-year IF: 3.676].
C.N. Yang and Y.Y. Yang, “New Extended Visual Cryptography Schemes with Clearer Shadow Images,” Information Sciences, Vol. 271, pp. 246-263, July, 2014. [SCI 5-year IF: 3.676].
C.N. Yang, Z.Y. Lin, and S.L. Peng, “Reducing Code Length of Second-Order Spectral-Null Code,” IEEE Transactions on Computers, published online, Feb., 2014, DOI: 10.1109/TC.2013.231. [SCI 5-year IF: 1.726].
C. Kim, D. Shin, Dongil Shin, R. Tso, and C.N. Yang, “A secret sharing scheme for EBTC using steganography,” Journal of Intelligent Manufacturing, Vol. 25, Issue 2, pp 241-249, April, 2014 [SCI 5-year IF: 2.162].
C.N. Yang and D. Wang, “Property Analysis of XOR Based Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 2, pp. 189-197, Feb., 2014. [SCI 5-year IF: 2.556]
M.T. Yang & Y. Chiu. 2014. Note-Taking for 3D Curricular Contents using Markerless Augmented Reality, Interacting with Computers, accepted in 2014. (SCI & SSCI)
M.T. Yang & W. Liao. 2014. Computer-Assisted Culture Learning in an Online Augmented Reality Environment based on Free-Hand Gesture, IEEE Transactions on Learning Technologies, accepted in 2014. (SCI & SSCI)
Shi-Jim Yen*, Cheng-Wei Chou, Jr-Chang Chen, I-Chen Wu, and Kuo-Yuan Kao, “Design and Implementation of Chinese Dark Chess Programs,” IEEE Transactions on Computational Intelligence and AI in Games( IEEE TCIAIG ), revision.
Chang-Shing Lee*, Mei-Hui Wang, Meng-Jhen Wu, Olivier Teytaud, Shi-Jim Yen, “T2FS-based Adaptive Linguistic Assessment System for Semantic Analysis and Human Performance Evaluation on Game of Go,” IEEE Transaction on Fuzzy Systems (IEEE TFS), accepted.
Shi-Jim Yen, Shih-Yuan Chiu, and Sheng-Ta Hsieh*, “Solving the Flexible Job Shop Problem using Multi-Objective Opeimizer with Solution Characteristic Extraction,” Applied Soft Computing, revision.
Shi-Jim Yen, Shih-Yuan Chiu and Sheng-Ta Hsieh*, “Adaptive Search Range and Multi-Mutation Strategies for Differential Evolution,” Journal of Information Science and Engineering, accepted.
Chun-Liang Lu, Shih-Yuan Chiu, Shi-Jim Yen, Hsiang-Chun Cheng, “Solving the Flexible Job-Shop Scheduling Problem Based on Multi-Objective PSO with Pareto Diversity Search,” International Journal of Intelligent Information Processing (ISSN: 2093-1964), accepted.
Cheng-Wei Chou, Ping-Chiang Chou, Jean-Joseph Christophe, Adrien Couetoux, Pierre De Freminville, Nicolas Galichet, Chang-Shing Lee, Jia-Lin Liu, David Lupien Saint-Pierre, Michele Sebag, Olivier Teytaud, Mei-Hui Wang, Li-Wen Wu and Shi-Jim Yen, “Strategic Choices in Optimization,” Journal of Information Science and Engineering, accepted.
Shou-Chih Lo, Nai-Wun Luo, Jhih-Siao Gao, Chih-Cheng Tseng: Quota-Based Multicast Routing in Delay-Tolerant Networks. Wireless Personal Communications 74(4): 1329-1344 (2014)
Shou-Chih Lo, Shan-Jung Lin: Collaborative data transmission in vehicular ad-hoc networks. ICOIN 2014: 18-22
She-I Chang, David C. Yen, I-Cheng Chang, Derek Jan: Internal control framework for a compliant ERP system. Information & Management 51(2): 187-205 (2014)
I-Cheng Chang, Chuang-Chun Liu, Kuanchin Chen: The effects of hedonic/utilitarian expectations and social influence on continuance intention to play online games. Internet Research 24(1) (2014)
Min-Xiou Chen, Bing-Yang Lin: Location service and session mobility for streaming media applications in home networks. Computer Standards & Interfaces 36(2): 368-379 (2014)
2013 Publications
Hsin-Chou Chi, Hsi-Che Tseng, Chia-Wei Jeng, “Reconfigurable VLSI Digital Filters for Tolerating 2 Multiple Timing Errors,” Proc. IEEE Global Conference on Consumer Electronics, Sept. 2013, Tokyo.
Hsin-Chou Chi, Hsi-Che Tseng, Yih-Kai Wang, “Design of VLSI Digital Filters for Tolerating Transient Timing Errors,” Proc. International Conference on Computer, Networks and Communication Engineering, Beijing, May 2013.
Guanling Lee, Yi-Chun Chen and Kuo-Che Hung, “PTree: Mining Sequential Patterns Efficiently in Multiple Data Streams Environment”, Journal of Information Science and Engineering, Vol. 29 No. 6, pp. 1151-1169, November 2013
S.-L. Peng* and Y.-W. Tsay, Adjusting protein graphs based on graph entropy, BMC Bioinformatics 2014, 15 (Suppl 15):S6. (SCI) (A partial result appears in “Assessment of protein-graph remodeling via conformational graph entropy, ICIC 2013, Communications in Computer and Information Science 375 (2013) 43-48.”)
Y.-C. Chen, G. Lee*, S.-L. Peng, I.-J. Wang, Supporting Content-based Music Retrieval in Structured Peer-to-peer Overlays, to appear in Journal of Internet Technology. (SCI) (A preliminary version appears in Proceedings of the 26th IPPR Conference on Computer Vision, Graphics, and Image Processing, August 18-20, 2013.)
Shinfeng D. Lin, Yuan-Ming Liu and Yu-Ruei Jhu, A Robust Image Descriptor for Human Detection Based on HoG and Weber’s Law, to appear in International Journal of Innovative Computing, Information and Control, Vol. 9, Issue 10, October 2013, EI.
Chih-Shan Liao, Jin-Ming Shih, Ruay-Shiung Chang: Simplifying MapReduce data processing. IJCSE 8(3): 219-226 (2013)
Ruay-Shiung Chang, Chih-Shan Liao, Chuan-Yu Liu: Choosing Clouds for an Enterprise: Modeling and Evaluation. IJEEI 4(2): 38-53 (2013)
Chia-Ming Wu, Siang-Sheng Cheng, Ruay-Shiung Chang: A data filtering strategy using cluster architecture in radio frequency identification system. IJRFITA 4(2): 149-161 (2013)
Chia-Ming Wu, Ruay-Shiung Chang, Pu-I. Lee, Jei-Hsiang Yen: An innovative scheme for increasing connectivity and life of ZigBee networks. The Journal of Supercomputing 65(1): 136-153 (2013)
Yun-Sheng Yen, Ruay-Shiung Chang, Chuan-Yung Wu: A seamless handoff scheme for IEEE 802.11 wireless networks. Wireless Communications and Mobile Computing 13(2): 157-169 (2013)
Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He, George Roussos, Wei-Tek Tsai: Mobile Cloud Computing Research – Issues, Challenges and Needs. SOSE 2013: 442-453
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Ai-Lin Cheng, Jui-Jiun Jian, Han-Wen Tsai, Jia-Jian Liao: An adaptive multimedia streaming dissemination system for vehicular networks. Appl. Soft Comput. 13(12): 4508-4518 (2013)
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Ai-Lin Cheng, Jui-Jiun Jian, Han-Wen Tsai, Jia-Jian Liao: An adaptive multimedia streaming dissemination system for vehicular networks. Appl. Soft Comput. 13(12): 4508-4518 (2013)
Chao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang, Shun-Chih Chang, Yu-Wu Wang, Jhe-Hao Tseng: Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform. CyberC 2013: 105-108.
D. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing,” IEEE Transactions on Information Forensics & Security, Vol. 8, No. 12, pp. 2059-2072, Dec., 2013. [SCI 5-year IF: 2.259].
P. Li, C.N. Yang, Q. Kong, Y. Ma, and Z. Liu, “Sharing more information in gray visual cryptography scheme,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 8, pp. 1380-1393, Nov., 2013.[SCI 5-year IF: 1.430]
P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential Secret Image Sharing Scheme with Different Importance of Shadows,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 7, pp. 1106–1114, Oct., 2013. [SCI 5-year IF: 1.430].
C. Kim and C.N. Yang, “Watermark with DSA Signature Using Predictive Coding,” Multimedia Tools and Applications, published online, DOI: 10.1007/s11042-013-1667-6, Aug., 2013. [SCI 5-year IF: 0.932].
C.N. Yang, and Chih-Cheng Wu, “MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges,” Mathematical and Computer Modelling, Vol. 58, pp. 96-107, July, 2013. [SCI 5-year IF: 1.364].
C.N. Yang, P.W. Chen, H.W. Shih, and C. Kim, “Aspect Ratio Invariant Visual Cryptography by Image Filtering and Resizing,” Personal and Ubiquitous Computing, Vol. 17, Issue 5, pp. 843-850, June, 2013. [SCI 5-year IF: 1.169]
H.C. Lin, C.N. Yang, C.S. Laih, and H.T. Lin,” Natural language letter based visual cryptography scheme,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 3, pp. 318-331, April, 2013. [SCI 5-year IF: 1.430].
C.N. Yang and T.H. Chung, “Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme,” The Imaging Science Journal, Vol. 61, No. 3, pp. 334-340, March 2013. [SCI 5-year IF: 0.403].
C. Kim, Y. Choi, H. Kim, D. Shin, D. Shin, and C.N. Yang, “Reversible Data Hiding for Halftone Images Using Histogram Modification,” Information-An International Interdisciplinary Journal, Vol.16, No.3(A), pp.1861-1872, March, 2013. [SCI IF: 0.269]
P. Trung Huy, N. Thanh, C. Kim, and C.N. Yang, “Data-Hiding for Halftone Images Using an Improved CPT scheme,” KSII Transactions on Internet and Information Systems, Vol.7, Issue 7, pp. 405-424, Feb., 2013. [SCI 5-year IF: 0.605].
T. Guo, F. Liu, C. Wu, C.N. Yang, and W. Wang,“Threshold Secret Image Sharing,” LNCS 8233, pp. 404-412, ICICS 2013 (The 15th International Conference on Information and Communications Security), Beijing, China, Nov., 2013
C.N. Yang and Y.C. Lin, “Cheating Immune Block-based Progressive Visual Cryptography,” IWDW 2013 (12-th International Workshop on Digital-forensics and Watermarking), Auckland, New Zealand, Oct., 2013.
X.F. Xu, D. Wang, S.D. Li, and C.N. Yang, “An anti-cheating block secret sharing scheme based-on cyclic codes,” The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2013), pp. 369-372, Beijing, China, Oct., 2013.
C.N. Yang and J.B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” International Symposium on Biometrics and Security Technologies (ISBAST’13), pp. 259-266, Chengdu, China, July, 2013.
P.T. Huy, C. Kim, N. T. Anh, L.Q. Hoa, and C.N. Yang, “Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules,” LNCS 7861, pp 649-658, GPC 2013, (8th International Conference, 2013 Grid and Pervasive Computing 2013 and Colocated Workshops), Seoul, Korea, May, 2013.
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, Pao-Lien Lai: A lower bound on the number of Hamiltonian cycles through a prescribed edge in a crossed cube. Applied Mathematics and Computation 219(19): 9885-9892 (2013)
Chang-Hsiung Tsai: A Quick Pessimistic Diagnosis Algorithm for Hypercube-Like Multiprocessor Systems under the PMC Model. IEEE Trans. Computers 62(2): 259-267 (2013)
Chang-Hsiung Tsai, Jheng-Cheng Chen: Fault isolation and identification in general biswapped networks under the PMC diagnostic model. Theor. Comput. Sci. 501: 62-71 (2013)
Pao-Lien Lai, Ming-Yi Chiu, Chang-Hsiung Tsai: Three Round Adaptive Diagnosis in Hierarchical Multiprocessor Systems. IEEE Transactions on Reliability 62(3): 608-617 (2013)
Chun-Yen Huang, Wan-Ting Jheng, Wen-Kai Tai, Chin-Chen Chang, Der-Lor Way: Procedural grape bunch modeling. Computers & Graphics 37(4): 225-237 (2013)
Si-Yuan Wang, Cong-Kai Lin, Wen-Kai Tai: Compressing 3D Trees With Rendering Efficiency Based on Differential Data. IEEE Transactions on Multimedia 15(2): 304-315 (2013)
Chun-Yen Huang, Wen-Kai Tai: Ting tools: interactive and procedural modeling of Chinese ting. The Visual Computer 29(12): 1303-1318 (2013)
Chin-Chen Chang, Bing-Ruei Wu, Hao-Jen Hsu, Je-Wei Liang, Yuan-Ching Peng, Wen-Kai Tai: Texture Synthesis Approach Using Cooperative Features. CGIV 2013: 50-51
Charlie Irawan Tan, Hung-Wei Hsu, Wen-Kai Tai, Chin-Chen Chang, Der-Lor Way: A Data-Driven Path Synthesis Framework for Racing Games. ICIG 2013: 673-684
Hsin-Chou Chi, Chia-Ming Wu, and Sheng-Chin Hsu, “Efficient IP Routing Lookups for High-Performance Routers,” Journal of Internet Technology, Mar. 2013.
M.T. Yang, & M. Chuang. 2013. Fall Risk Assessment and Early-Warning for Toddler Behaviors at Home, Sensors, 13(12), 16985-17005. (SCI)
M.T. Yang, R. Jhang, & J. Hou. 2013. Traffic Flow Estimation and Vehicle Type Classification using Vision-based Spatial-Temporal Profile Analysis, IET Computer Vision, 7(5), 394-404. (SCI)
M.T. Yang & Z. You. 2013. Vision-based Hypothesis Integration for Inner and Outer Lip Contour Detection, International Journal of Innovative Computing Information and Control, 9(8), 3159-3172. (SCI)
Y. Chiu, & M.T. Yang, 2013. 3D Note-Taking using Markerless Augmented Reality in e-Learning, Computer Vision, Graphics, and Image Processing, August, Taiwan.
M.T. Yang, W. Liao, & Y. Shih, 2013. VECAR: Virtual English Classroom using Markerless Augmented Reality with Intuitive Gesture Interaction, International Conference on Advanced Learning Technologies, July, Beijing, China.
Y, Shih, M.T. Yang, & F. Yang, 2013. Street-View Panorama for Cultural Learning: Implementation and Curriculum Design, International Conference on Advanced Learning Technologies, July, Beijing, China.
Sheng-Ta Hsieh, Shih-Yuan Chiu and Shi-Jim Yen, “An Improved Multi-Objective Genetic Algorithm for Solving Multi-objective Problems,” Applied Mathematics & Information Sciences, Vol. 7, No. 5, pp. 1933-1941 (2013).
Kuo-Yuan Kao, I-Chen Wu*, Shi-Jim Yen, and Yi-Chang Shan, “Incentive Learning in Monte Carlo Tree Search,” IEEE Transactions on Computational Intelligence and AI in Games( IEEE TCIAIG ), VOL. 5, NO. 4, December 2013, pp. 346-352.
Tai-Yen Wu, Ching-Nung Lin, Shi-Jim Yen, and Jr-Chang Chen, “A Minesweeper Solver,” the 18th Game Programming Workshop (GPW-2013), November 8-110, 2013, Hakone Seminar House, Kanagawa, Japan. 2013 GPW Proceeding pp. 15-18.
Shi-Jim Yen, Chen-Shin Lee, Jr-Chang Chen, Tai-Ning Yang, Shun-Chin Hsu, “Suffix Tree Index Structure on Go Game Record,” The 27th Annual Conference of the Japanese Society for Artificial Intelligence, June 4-7, Toyoma, Japan, 2013.
Yu-Jie Ho, Shun-Chin Hsu, Shi-Jim Yen, “An Efficient Index Structure for Go,” The 27th Annual Conference of the Japanese Society for Artificial Intelligence, June 4-7, Toyoma, Japan, 2013.
C. S. Lee, M. J. Wu, M. H. Wang, O. Teytaud, H. M. Wang, and S. J. Yen, “T2FML-based Adaptive Assessment System for Computer Game of Go,” 2013 IEEE International Conference on Fuzzy System (FUZZ-IEEE 2013), Hyderabad, India, Jul. 7-10, 2013.
Sheng-Lung Peng, Yu-Wei Tsay: Assessment of Protein-Graph Remodeling via Conformational Graph Entropy. ICIC (3) 2013: 43-48
Shou-Chih Lo, Jhih-Siao Gao, Chih-Cheng Tseng: A Water-Wave Broadcast Scheme for Emergency Messages in VANET. Wireless Personal Communications 71(1): 217-241 (2013)
Ti-Hsin Yu, Shou-Chih Lo: A Remote Control and Media Sharing System Based on DLNA/UPnP Technology for Smart Home. MUE 2013: 329-335
2012 Publications
Shinfeng D. Lin*, Bo-Feng Liu and Jia-Hong Lin, Combining Speeded Up Roust Features with Principal Component Analysis in Face Recognition System, accepted by International Journal of Innovative Computing, Information and Control, April 2012, SCI.
Shou-Hung Wang and Ruay-Shiung Chang, “Deploying Mobile Nodes for Maximal Energy Matching in WSNs,” Wireless Communications and Mobile Computing, Volume: 12, Issue: 4, Pages: 325-332, MAR 2012. (IF=0.810, cited=0)
Ruay-Shiung Chang and Shou-Hung Wang, “Deploying Relay Nodes in WSNs by Considering Uneven Energy Consumption,” Journal of Internet Technology. Vol. 13, No. 2, pp. 273-280, MAR 2012. (IF=0.448, cited=0)
Ruay-Shiung Chang, Shou-Hung Wang, and Wei-Pang Yang, “Addressing Wormhole Attacks on the Internet,” Journal of Internet Technology. Vol. 13, No. 2, pp. 245-256,MAR 2012.
Huang, C.J., Chen, H.M., Lin, C.F., Liao, J.J., Hu, K.W., Yang, D.X., Chen, C.H., and Chuang, Y.T., (2012) “A Scalable Routing for Delay-Tolerant Heterogeneous Networks”, International Journal of Innovative Computing, Information and Control. 8(1A) 49-60 (SCI, EI) IF: 1.667. (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
Huang, C.J., Chang, T.K., Shen, H.Y., Li, C.Y., Luo, Y.C., and Hu, K.W., (2012) “Application of Type-2 Fuzzy Logic to Rule-Based Intrusion Alert Correction Detection”, International Journal of Innovative Computing, Information and Control. 8(4) 2865-2874 (SCI, EI) IF:2.791. (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
P. Li, P.J. Ma, X.H. Su, and C.N. Yang, “Improvements of a Two-in-one Image Secret Sharing Scheme based on Gray Mixing Model,” Journal of Visual Communication and Image Representation, Vol. 23, Issue 3, pp. 441-453, Apr, 2012. [SCI 5-year IF: 1.382].
C.N. Yang, P.W. Chen, H.W. Shih, and C. Kim, “Aspect Ration Invariant Visual Cryptography by Image Filtering and Resizing,” Personal and Ubiquitous Computing, published online, DOI 10.1007/s00779-012-0535-0, Apr., 2012. [SCI 5-year IF: 1.087].
C. Kim, D. Shin, Dongil Shin, R. Tso, and C.N.Yang, “A secret sharing scheme for EBTC using steganography,” Journal of Intelligent Manufacturing, published online, DOI: 10.1007/s10845-012-0660-7, May, 2012 [SCI 5-year IF: 1.414].
C.N. Yang, H.W. Shih, C.C. Wu, and L. Harn, “k out of n Region Incrementing Scheme in Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No. 6, pp. 779-810, May, 2012. [SCI 5-year IF: 2.489]
Y.X. Liu, L. Harn, C.N. Yang, and Y.Q. Zhang, “Efficient (n, t, n) Secret Sharing Schemes,” Journal of Systems & Software, Vol. 85, Issue 6, pp. 11325-1332, Jun., 2012. [SCI 5-year IF: 1.117].
C.N. Yang, and Chih-Cheng Wu, “MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges,” Mathematical and Computer Modelling, published online, DOI: 10.1016/j.mcm.2012.07.010, July, 2012 [SCI 5-year IF: 1.351
C.N. Yang, L.J. Hu and J.B. Lai, “Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC,” IEEE Communications Letters, Vol. 16, No. 10, pp. 1616-1619, Oct., 2012. [SCI 5-year IF: 1.234].].
C.N. Yang, C.C. Wu, Y.C. Lin, and C. Kim, “Enhanced Matrix-Based Secret Image Sharing Scheme,” IEEE Signal Processing Letters, Vol. 19, Issue 12, pp. 789-792, Dec., 2012. [SCI 5-year IF: 1.430].
Tseng-Kui Li, Chang-Hsiung Tsai*, Hong-chun Hsu, “A fast fault identification algorithm for bijective connection graphs using the PMC model,” Information Sciences, vol. 187, pp. 291-297, 2012, Supported by NSC-100-2115-M-259-008,. SCI, EI. [IF:3.005] [cited:0]
Charlie Irawan Tan+ and Wen Kai Tai*, ”Characteristics Preserving Racers Animation: A Data-driven Race Path Synthesis in Formation Space,” Computer Animation and Virtual Worlds, to be appeared in 2012 (SCI/IF= 0.629)( COMPUTER SCIENCE, SOFTWARE ENGINEERING 77/99)
Cong-Kai Lin+ and Wen-Kai Tai*, “Automatic Upright Orientation and Good View Recognition for 3D Man-made Models,” Pattern Recognition, Vol. 45, No. 4, pp.1524-1530, April 2012 DOI: 10.1016/j.patcog.2011.10.022 (SCI/IF 2.682, 5Y-IF= 3.480 ) (COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE15/108)(ENGINEERING, ELECTRICAL & ELECTRONIC 18/247)
Tu S.C., Tai W.K., “A high-capacity data-hiding approach for polygonal meshes using maximum expected level tree”, COMPUTERS & GRAPHICS-UK,OCT 2012
Su Y.L., Chang C.C., Shih Z.C., Tai W.K.,” Vector-field-based deformations for threedimensional texture synthesis”, IET IMAGE PROCESSING, JUN 2012
Ming-Che Ho+, Cheng-Chin Chiang* and Ying-Yu Su+, “Object Tracking by Exploiting Adaptive Region-wise Linear Subspace Representations and Adaptive Templates in an Iterative Particle Filter,” Pattern Recognition Letter, online version available on
http://dx.doi.org/10.1016/j.patrec.2011.11.019, Dec. 2011. (SCI/IF= 1.235, 5Y-IF= 1.897)
Lee G.L., Zhu Y.T., Chen Y.C., “Summarizing Association Patterns Efficiently by Using PI Tree in a Data Stream Environment”, JOURNAL OF INTERNET TECHNOLOGY, MAR 2012
Lee G.L., Chen Y.C., “Protecting sensitive knowledge in association patterns mining”, WILEY INTERDISCIPLINARY REVIEWSDATA MINING AND KNOWLEDGE DISCOVE, JAN-FEB 2012
Lee G.L., Peng S.L., Chen Y.C., Huang J.S., “An efficient search mechanism for supporting partial filename queries in structured peer-topeer overlay”, PEER-TOPEER NETWORKING AND APPLICATIONS, DCE 2012
Kuo-Yuan Kao, I-Chen Wu, Yi-Chang Shan, and Shi-Jim Yen, “Selection Search for Mean and Temperature of Multi-Branch Combinatorial Games,” ICGA Journal, vol. 35, no. 2, 2012.
Ching-Nung Lin and Shi-Jim Yen, “The Computer Go Tournaments in TCGA 2012,” to appear in ICGA Journal.
Ming-Cheng Cheng, Jr-Chang Chen, Tsan-Cheng Su, and Shi-Jim Yen, “Shiga Wins Chinese Chess Tournament,” to appear in ICGA Journal vol. 35, no.1, pp. 53-54, 2012.
Cheng-Wei Chou, Jr-Chang Chen, Hideki Kato, and Shi-Jim Yen, “The 5th GPW Cup 9×9 and 13×13 Computer Go Tournaments,” ICGA Journal vol. 35, no.1, pp. 59-60, 2012.
Shi-Jim Yen*, Jung-Kuei Yang, Kuo-Yuan Kao, and Tai-Ning Yang, “Bitboard Knowledge Based System and Elegant Search Architectures for Connect6,” Knowledge-Based Systems, 0950-7051, vol. 34, 2012, pp. 43-54.
Chang-Shing Lee, Olivier Teytaud, Mei-Hui Wang, and Shi-Jim Yen, “Computational Intelligence Meets Game of Go @ IEEE WCCI 2012,” IEEE Computational Intelligence Magazine (IEEE CIM), to appear at NOV 2012.
Vaidya B, Park JH, Arabnia HR, Pedrycz W, “Bio-inspired computing for hybrid information technology”, SOFT COMPUTING, MAR 2012
Chang RS, Kim TH, Peng SL, “Security-Enriched Urban Computing and Smart Grid”, JOURNAL OF INTERNET TECHNOLOGY, MAR 2012
S. C. Lo, “Efficient Content-Based Publish/Subscribe Systems over Peer-to-Peer Networks,” Journal of Internet Technology, Vol. 13, No. 5, pp. 713-724, September 2012. (SCI)
S. C. Lo, J. S. Gao, and C. C. Tseng, “A Water-Wave Broadcast Scheme for Emergency Messages in VANET,” Wireless Personal Communications, 2012, (DOI)10.1007/s11277-012-0812-2.
C.-L. Huang, H.-Y. Kao*, C.-H. Huang, C.-Y. Hsu (2012), “Evaluation of e-learning systems in cloud environments using DEA with fuzzy data set”, IEEE Multidisciplinary Engineering Education Magazine, Vol. 7, No 2, 33-36.
Pao-Lien Lai*, “A systematic algorithm for identifying faults on hypercube-like networks under the comparison model,” IEEE Transactions on Reliability, Mar.2012.
Lai P.L., “ Adaptive diagnosis for torus systems under the comparison model”, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012
Chung Yung, Shao-Zong Chen, Shun-Cheng Wu, Jen-Tsung Hsieh, and Kang-Jhih Peng, “A Web-based Model of Distributed Software Development Management for Cloud Computing
Chen M.X., Sung F.H., Lin B.Y., “SERVICE DISCOVERY PROTOCOL FOR NETWORK MOBILITY ENVIRONMENT”, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, AUG 2012
2011 Publications
Shinfeng D. Lin*, Jia-Hong Lin and Chun-Yen Chen, A ROI-based Semi-Fragile Watermarking for Image Tamper Detection and Recovery, International Journal of Innovative Computing, Information and Control, Volume 7, Number 12, pp. 6875-6888, December 2011, SCI.
Shinfeng D. Lin*, Chih-Yao Chuang and Mei-Juan Chen, A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC, International Journal of Innovative Computing, Information and Control, Volume 7, Number 11, pp. 6359-6367, November 2011, SCI.
Chih-Cheng Wang, Chih-Yao Chuang and *Shinfeng D. Lin, An IntegratedTemporal Error Concealment for H.264/AVC Based on Spatial Evaluation Criteria, Journal of Visual Communication and Image Representation, Volume 22, Issue 6, pp. 522-528, August 2011, SCI.
Shinfeng D. Lin*, Chih-Yao Chuang, Hsiang-Cheng Meng and Yu-Lung Su, An Error Resilient Technique Using Reversible Data Embedding in H.264/AVC, International Journal of Innovative Computing, Information and Control, Volume 7, Number 5(A), pp. 2283-3390, May 2011, SCI.
Shinfeng D. Lin, Jia-Hong Lin and Cheng-Chin Chiang, Using Gradient Features from Scale-Invariant Keypoints on Face Recognition, International Journal of Innovative Computing, Information and Control, Volume 7, Number 4, pp. 1639-1649, April 2011, IF(2009:2.932, 2008:2.791), SCI. (2008 A 級期刊)
Shinfeng D. Lin and Zong-Lin Yang, Hierarchical Fragile Watermarking Scheme for Image Authentication, Intelligent Automation and Soft Computing, Vol. 17, No. 2, pp. 245-255, 2011, SCI. (2008 Impact Factor: 0.224)
Shinfeng Lin, Chih-Cheng Wang, Chih-Yao Chuang, and Kuan-Ru Fu, A Hybrid Error Concealment Technique for H.264/AVC Based on Boundary Distortion Estimation, INTECH-“Recent Advances on Video Coding “, ISBN 978-953-307-181-7, Chapter 11, P.243-P.258, July 2011.
Shinfeng D. Lin* and Shih-Chieh Shie, Digital Steganographic Schemes based on Image Vector Quantization, Accepted by Multimedia Security and Steganography, September 22, 2011.
Shinfeng D. Lin and Tszan Wu, An Integrated Technique for Splicing and Copy-move Forgery Image Detection, 2011 4th International Congress on Image on Image and Signal Processing(CISP’11), Shanghai, P.R.O.C., October 15-17, 2011.
Shinfeng D. Lin, Kuan-Ru Fu and Chih-Yao Chuang, An Adaptive Frame-based Error Concealment Technique Based on Motion Variation for H.264/AVC, the 24th IPPR Conference on Computer Vision, Graphics, and Image Processing (CVGIP2011), Chiayi, TAIWAN, R.O.C., Aug. 21-23, 2011.
Shinfeng D. Lin, Chih-Cheng Wang, Chih-Yao Chuang and Kuan-Ru Fu, An Adaptive Error Concealment Technique for H.264/AVC, 2011 International Symposium on Intelligent Informatics, Qingdao, P.R.O.C., May 1-3, 2011.
Wu, Shiow-yang and Kuo-Chang Lin. Structured Design, Consistency Analysisand Failure Reasoning of Business Workflows with Activity-Control Templates and Causal Ordering. Expert Systems with Applications, 38(7):8000-8013 , July 2011. (SCI, 2011 IF=1.926)
Wu, Shiow-yang and Cheng-en He. QoS-Aware Dynamic Adaptation for Cooperative Media Streaming in Mobile Environments. IEEE Transactions on Parallel and Distributed Systems, 22(3):439-450, Mar 2011. (SCI, 2011 IF=1.575)
Seiven Leu and Ruay-Shiung Chang, “A Simple Algorithm for Solving Broadcast Storm in MANET,” IET Communications, Volume: 5, Issue: 16, Pages: 2356-2363, NOV 4 2011.(IF=0.963, cited=0)
Ruay-Shiung Chang, Taihoon Kim, C.L. Wang, and S.L. Peng, ” Special Issue on Radio Frequency Identification (RFID),” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 8 Issue: 4, Pages: 203-204, 2011. (IF=0.435, cited=0)
Lee Yun-Han, Leu Seiven, and Chang Ruay-Shiung, “Improving job scheduling algorithms in a grid environment, Future Generation Computer Systems, Vol. 27 Issue:8, Pages: 991-998, Oct. 2011. (IF=2.371, cited=1)
Chang Ruay-Shiung and Chao Han-Chieh, “Special Section: Grid and pervasive computing,” Future Generation Computer Systems, Vol. 27 Issue: 6, Pages: 820-822, Jun. 2011. (IF=2.371, cited=0)
Yun-Sheng Yen, Han-Chieh Chao, Ruay-Shiung Chang, and Athanasios Vasilakos, “Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs,” Mathematical and Computer Modeling, 53 (2011) 2238–2250, Jun. 2011. (IF=1.066, cited=0)
Chang Ruay-Shiung and Kim Tai-hoon, “Special Section: Future Generation Information Technology,” Future Generation Computer Systems, Vol. 27 Issue: 4, Pages: 370-371, Apr. 2011. (IF=2.371, cited=0)
Chang Ruay-Shiung and Wu Chung-Hsien, “Special Issue: Future generation information technology Foreword,” Journal of the Chinese Institute of Engineers, Vol. 34 Issue: 2, Pages: 169-169, Mar. 2011. (IF=0.225, cited=0)
Ruay-Shiung Chang, Chun-Fu Lin, and Jen-Jom Chen, ” Selecting the Most Fitting Resource for Task Execution,” Future Generation Computer Systems, Volume: 27, Issue: 2, Pages: 227-231, Feb. 2011. (IF=2.371, cited=1)
Chia-Ming Wu, Ruay-Shiung Chang, and Chang-Chih Chen, “A Complex Event Processing Method Based on Pre-Grouping for Radio Frequency Identification Data Streams,” Journal of Internet Technology, Volume: 12 Issue: 1, Pages: 95-102, Jan. 2011. (IF=0.448, cited=0)
Chang Ruay-Shiung and Chao Han-Chieh, ” Guest Editorial: Special Issue on Grid and Pervasive Computing,” Journal of Internet Technology, Volume: 12 Issue: 1, Jan. 2011. (IF=0.448, cited=0)
Huang, C.J., Liao, J.J., Shen, H.Y., Aye N.N., Wang, Y.W., Chen, H.X., Yang, D.X., Luo, Y.C., and Chuang, Y.T., (2011) Using Learning Style-Based Diagnosis Tool to Enhance Correlation Learningin an Undergraduate Engineering Curriculum, Computer Applications in Engineering Education. (SCI, EI) IF:0.321. (NSC 96-2628-E-259-022-MY3 and NSC 97-2218-E-259-005)
Huang, C.J., Li, C.Y., Chen, Y.T., Lee, C.Y., Liao, J.J., Chang, C.H., Chen, I.F., Hu, K.W., Chen, H.X., and Chen, Y.J., (2011) Intelligent Resource Management Schemes for Heterogeneous Wireless Networks, International Journal of Innovative Computing, Information and Control. 7(8) 4765-4778 (SCI, EI) IF:1.667. (NSC 96-2628-E-026-001-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Huang, T.H., Chen, Y.C., Chen, H.M., Chang, S.C., (2011) Performance Evaluation of an Online Argumentation Learning Assistance Agent, Computers & Education. 57(1) 1270-1280 (SSCI, SCI, EI) IF: 2.617. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Lin, C.F., Chen, Y.T., Chen, H.M., Shen, H.Y., Chen, Y.J., Chen, I.F., Hu, K.W. and Yang, D.X., (2011) A Self-Healing Clustering Algorithm for Underwater Sensor Networks, Cluster Computing-The Journal of Networks Software Tools and Applications 14(1) (SCI, EI) IF:0.679. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Huang T.H., Lin, C.F., Li, C.Y., Chen, H.M., Chen, P.C., Liao J.J., (2011) Applications of Machine Learning Techniques to a Sensor-Network-Based Prosthesis Training System, Applied Soft Computing. 11(3) 3229-3237 (SCI, EI) IF:2.097. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Lin, C.F., Liao, H.H., Li, C.Y., Hu, K.W., Chang, T.Y., and Shen, H.Y., (2011) A Power-Efficient Routing Protocol for Underwater Wireless Sensor Networks, Applied Soft Computing, 11(2) 2348–2355. (SCI, EI) IF: 2.097. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Lin, C.F., Li, C.Y., Lee, C.Y., Chen, H.M., Shen, H.Y., Chen, Y.J., and Chen, I.F., (2011) Service-oriented routing and clustering strategies for vehicle infotainment dissemination, International Journal of Innovative Computing, Information and Control, 7(3) 1467–1479. (SCI, EI) IF:1.667. (NSC 96-2628-E-026-001-MY3 and NSC 98-2220-E-259-003)
黃振榮,辛孟錩,薛文魁(民 100) : 車載網路上的無縫串流機制,2011創意教學與研究成果研討會(NSC99-2220-E-259-002)。
Huang, C.J., Lin, C.F., Hsu, P.A., Lee, Y.W., Chen, H.M., Lien, Y.J., Li, C.Y., Yang, Y.J., Liao, J.J., and Chen, Y.J., (2011) Application of Fast Learning Neural-Networks to Identification of Mixed Anuran Vocalizations, 2011 The 13th IEEE Joint International Computer Science and Information Technology Conference, Aug. 2011 . (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
Huang, C.J., Chen, H.M., Huang, T.H., Lin, C.F., Chen, Y.T., Lien, Y.J., Wang, Y.W., Chen, Y.J., Chen, I.F., Shen, H.Y., Huang, H.Y., (2011) Load-Balancing Routing And Clustering Strategies For Vehicle Infotainment Dissemination, 2011 IEEE International Conference on Information and Automation, Jun. 2011 . (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
黃振榮,李昱緯,蔡柏彥,王宇武,陳恆鳴,曾聖傑,廖家健,沈宏彥(民 100) : 適用於車載網路之適化性無縫串流傳播系統,2011智慧型數位生活研討會。(NSC 99-2511-S-259-008-MY3and 99-2220-E-259-002)
黃振榮,連逸傑,林志昇,李哲宇,關智太,曾聖傑(民 100) : 應用股票市場技術分析及撮合機制於雲端計算之資源配置,2011 電子商務與數位生活研討會。(NSC 99-2511-S-259-008-MY3and 99-2220-E-259-002)
Shih-Chien Chou and Jin-Yuan Jhu, “Embedding Access Control Policy in Web Service PathComposition Algorithm”, JISE, vol. 27, no. 6, pp. 1839-1853, 2011. (SCI)
S. -C. Chou, “Using Partial Ordered Numbers to Control Information Flows”, Fifth InternationalConference on Secure Software Integration and Reliability Improvement (SSIRI), Korea, pp. 60-69,2011.
C.N. Yang and C.C. Wu, and F. Liu, “Construction of General (k, n) Probabilistic Visual Cryptography Scheme,” Journal of Electronic Science and Technology, Vol. 9, Issue 4, pp. 317-324, Dec., 2011.[indexed by Ei INSPEC].
C.N. Yang, C.Y. Chiu, and G.C. Wu, “Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks,” IEEE Trans. on Computers, Vol. 60, Issue 10, pp. 1503-1510, Oct., 2011. [SCI 5-year IF: 1.627].
C.N. Yang and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems & Software, vol. 84, pp. 1726-1733, 2011. [SCI 5-year IF: 1.117].
C.N. Yang, J.Y. He, “An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision,” IEEE Communications Letters, Vol. 15, No. 5, pp. 539-541, May, 2011. [SCI 5-year IF: 1.234]
C.N. Yang, G.C. Ye, and C. Kim, “Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization,” KSII Transactions on Internet and Information Systems, Vol. 5, Issue 2, pp. 457-476, Feb., 2011. [SCI 5-year IF: 0.355].
C.N. Yang, T.Y. Wu, L.J. Hu, P. Wang, and C.H. Lee, “Applying Dynamic Partition in IRC-Based Botnet Detection,” 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011), Vol. II, pp. 655-660, Hangzhou, China, Nov., 2011.
F. Liu, T. Guo, C. Wu, and C.N. Yang, “Flexible Visual Cryptography Scheme Without Distortion,” LNCS 7128, pp. 211–227, IWDW 2011, (10th International Workshop on Digital-forensics and Watermarking), Atlantic City, USA, Oct., 2011.
C.N. Yang, H.W. Shih, Y.Y. Chu, and L. Harn, “New Region Incrementing Visual Cryptography Scheme,” The 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011) in conjunction with WORLDCOMP 2011, pp. 323-329, Las Vegas, USA, July, 2011.
C.N. Yang, G.C. Wu, and C.C. Wu, “Certificate-in-Certificate: Designing A New Certificate Extension for Mobile-Commerce,” The 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), pp. 554-564, Tokyo, Japan, Jan., 2011.
C.N. Yang, S.H. Lin, G.C. Huang, Y.L. Chang, H.W. Shih, and Y.C. Lin, “A Text-in-Picture Steganographic Method using Android Platform,” TANET 2011, Oct. 2011.
C.N. Yang, C.H. Wu, P.Y. Liao, and G.C. Wu, “ROI/NROI Data Hiding of Medical Images, with Application on Blood Capillary Images,” 2011 the 6th International Symposium on Healthcare Information Management (UHIMA 2011).
Book- S. Cimato and C.N. Yang, Visual Cryptography and Secret Image Sharing, Publisher: CRC Press/Taylor & Francis, ISBN: 9781439837214, Number of Pages: 501, Publication Date: August 10, 2011.
Book Chapter-C.N. Yang, C.B. Ciou, and T.S. Chen, Chapter 17: Two-Decoding-Option Image Sharing Method, in the book Visual Cryptography and Secret Image Sharing, Aug., 2011.
Chang-Hsiung Tsai*, “A quick pessimistic diagnosis algorithm for hypercube-like multiprocessor systems under the PMC model,” IEEE Trans. On Computers,http://dx.doi.org/10.1109/TC.2011.228, Supported by NSC-100-2115-M-259-008,. SCI, EI. [IF2010:2.036] [cited:0]
Tseng-Kui Li, Chia-Jui Lai, Chang-Hsiung Tsai, “A novel algorithm to embed a multidimensional torus into a locally twisted cube,” Theoretical Computer Sciences, vol. 412, pp. 2418-2424, 2011, Supported by NSC-98-2115-M-259-002-MY2,. SCI, EI. [IF:1.085] [cited:0]
Jheng-Cheng Chen, Chang-Hsiung Tsai*, “Conditional edge-fault-tolerant Hamiltonicity of dual-cubes,” Information Sciences, vol. 181, pp. 620-627, 2011, Supported by NSC-97-2115-M-259-005,. SCI, EI. [IF:3.005] [cited:3]
Pao-Lien Lai, Hong-Chun Hsu, Chang-Hsiung Tsai, “A Systematic Algorithm for Embedding Hamiltonian Cycle in Hierarchical Crossed Cubes,” CSE 2011: 358-365
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, “An Adaptive Diagnostic Algorithm for a Distributed System Modeled by Dual-cubes”, CSE 2011: 366-370
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, “Optimal adaptive parallel diagnosis for a distributed system modeled by dual-cubes”, FSKD 2011: 1989-1993
Wen-Kai Tai, “Chapter 8. The state-of-the-art Steganography for 3D Meshes,” Book chapter of “Steganography and Watermarking,” Nova Science Publishers, Inc., 2011/12
S. F. Siao+ , Hung-Wei Hsu+ , Wen-Kai Tai*, and Andrew Yip, ” Fractal Territory Board Game,” 2011 IEEE International Games Innovation Conference (IGIC), Chapman University, Orange, CA, Nov 2-3, 2011
Ming-Che Ho+, Cheng-Chin Chiang* and Ying-Yu Su+, “Object Tracking by Exploiting Adaptive Region-wise Linear Subspace Representations and Adaptive Templates in an Iterative Particle Filter,” Pattern Recognition Letter, online version available on http://dx.doi.org/10.1016/j.patrec.2011.11.019, Dec. 2011. (SCI/IF= 1.235, 5Y-IF= 1.897)
Cheng-Chin Chiang*, Ming-Che Ho+, Hong-Sheng Liao+ and Andi Pratama+, Wei-Cheng Shyu+, “Detecting and RecognizingTraffic Lights by Genetic Approximate Ellipse Detection and Spatial Texture Layouts,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 12, pp. 6919-6934, Dec. 2011. (SCI/IF=1.667, 5Y-IF= 1.797)
Shinfeng D. Lin*@, Jia-Hong Lin+ and Cheng-Chin Chiang, “Using Gradient Features from Scale-Invariant Keypoints on Face Recognition,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 4, pp. 1349-4198, Apr. 2011. (SCI/IF=1.667, 5Y-IF= 1.797)
Hsin-Chou Chi and Tat-Seng Chang, “Design of a Reconfigurable Pipelined Switch for Faulty On-Chip Networkss,”Proc. International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Feb. 2011.
Hsin-Chou Chi, Hsi-Che Tseng, Kun-Lin Tsai, “Design of Timing-Error-Resilient Systolic Arrays for Matrix Multiplication,”Proc. International SoC Design Conference, Jeju, Nov. 2011.
Hsin-Chou Chi, Hsi-Che Tseng, and Chih-Ling Yang, “Efficient Diagnosable Design of IEEE P1500 for Soc Testing,”Proc. IEEE International Conference on Networked Embedded Systems for Enterprise Applications, Dec. 2011.
Ming-Hung Bai and Hsin-Chou Chi, “Efficient Table-Based Routing for On-Chip Networks with Faulty Components,”Proc. Global Congress on Science and Engineering, Dubai, Dec. 2011.
S. J. Yen, J. K. Yang, “2-Stage Monte Carlo Tree Search for Connect6,” IEEE Transactions on Computational Intelligence and AI in Games, VOL. 3, NO. 2, JUNE 2011. DOI: 10.1109/TCIAIG.2011.2134097(SCI)
Cheng-Wei Chou, Shi-Jim Yen, and I-Chen Wu, “TAAI 2011 Computer Go Tournaments,” ICGA Journal, vol. 34, no.4, 2011, pp. 251-252
Shi-Jim Yen, Jung-Kuei Yang and I-Chen Wu, “2010 WORLD COMPUTER CHINESE CHESS CHAMPIONSHIP,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 45-47. (SCI)
Shi-Jim Yen, Tsan-Cheng Su and I-Chen Wu, “SHIGA Wins Chinese Chess Tournament,” ICGA Journal, vol. 34, no. 2, 2011, pp. 94–95.
Shi-Jim Yen, Cheng-Wei Chou, Chang-Shing Lee, Hassen Doghmen and Olivier Teytaud, “THE IEEE SSCI 2011 HUMAN VS. COMPUTER-GO COMPETITION,” ICGA Journal, vol. 34, no. 2, 2011, pp. 106–107.
Shi-Jim Yen, Cheng-Wei Chou and I-Chen Wu, “TAAI 2010 COMPUTER GO TOURNAMENTS,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 48-50. (SCI)
Hung-Hsuan, Lin, Der-Johng Sun, I-Chen Wu and Shi-Jim Yen, “TAAI COMPUTER GAME TOURNAMENT REPORT IN 2010,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 51-54. (SCI)
Cheng-Wei Chou, Shi-Jim Yen and Hideki Kato, “THE 4th GPW CUP 9×9 AND 13×13 COMPUTER GO TOURNAMENTS,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 43-45. (SCI)
Shi-Jim Yen, Shih-Yuan Chiu Cheng-Wei Chou and Jr-Chang Chen, “CPUZZLER WINS NONOGRAM TOURNAMENT,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 34-35. (SCI)
Shi-Jim Yen, Tsan-Cheng Su and I-Chen Wu, “The TCGA 2011 Computer-Games Tournament,” ICGA Journal, vol. 34, no. 2, 2011, pp. 108–110.
Olivier Teytaud, Cheng-Wei Chou, Ping-Chiang Chou, Hassen Doghmen, Chang-Shing Lee, Tsan-Cheng Su, Fabien Teytaud, Olivier Teytaud, Hui-Min Wang, Mei-Hui Wang, Li-Wen Wu, Shi-Jim Yen, “Towards a solution of 7×7 Go with Meta-MCTS,” Advances in Computer Games 13, November 20-23, 2011, Tilburg University, The Netherlands.
Jung-Kuei Yang and Shi-Jim Yen, “Conservative Relevance Zone Search in Connect6,” The 2010 Conference on Technologies and Applications of Artificial Intelligence TAAI 2011, November 11-13, 2011. Taoyuan, Taiwan.
Shi-Jim Yen, Cheng-Wei Chou, Tsan-Cheng Su, Shun-Chin Hsu, Hsin-Hung Chou and Jr-Chang Chen, “Monte Carlo Tree Search in Chinese Dark Chess ,” the 16th Game Programming Workshop (GPW-2011), November 4-6, 2011, Hakone Seminar House, Kanagawa, Japan. GPW-2011.
Rou-Yu Lai, Hsin-Hung Chou, Shun-Chin Hsu and Shi-Jim Yen, “The Design and Implementation of a Pattern-directed MCTS-based Computer Go Program — WINGO ,” the 16th Game Programming Workshop (GPW-2011), November 4-6, 2011, Hakone Seminar House, Kanagawa, Japan. GPW-2011.
Bernard Helmstetter, Chang-Shing Lee, Mei-Hui Wang, Fabien Teytaud, Olivier Teytaud, Shi-Jim Yen, “Random positions in Go,” 2011 IEEE Conference on Computational Intelligence and Games( IEEE CIG 2011), August 31- September, 2011, Seoul, South Korea.
Ping-Chiang Chou, Hassen Doghmen, Chang-Shing Lee, Fabien Teytaud, Olivier Teytaud, Hui-Ming Wang, Mei-Hui Wang, Li-Wen Wu and Shi-Jim Yen, “Computational and Human Intelligence in Blind Go,” 2011 IEEE Conference on Computational Intelligence and Games( IEEE CIG 2011), August 31- September, 2011, Seoul, South Korea.
Shi-Jim Yen, Tsan-Cheng Su and Shun-Chin Hsu, “An efficient algorithm for solving Fillomino,” 2011 IEEE International Conference on Fuzzy Systems, June 27-30, 2011.
Shi-Jim Yen, Shih-Yuan Chiu, Cheng-Wei Chou and Tsan-Cheng Su, “Elimination Search for puzzle games : An Application for Hashi Solver,” 2011 IEEE International Conference on Fuzzy Systems, June 27-30, 2011.
Sheng-Ta Hsieh, Shih-Yuan Chiu and Shi-Jim Yen, “Sharing Mutation Genetic Algorithm for Solving Multi-objective Optimization Problems,” 2011 IEEE Congress on Evolutionary Computation(2011 IEEE CEC), June 5-8, 2011, New Orleans, USA.
S.-L. Peng* and Y.-W. Tsay, On the usage of graph spectra in protein structural similarity, Journal of Computers 23 (2012) 95-102. (EI) (A preliminary version appears in Proceedings of the 2011 International Computer Science and Engineering Conference, 209-214, September 7-9, 2011, Thailand. (Best paper award))
M.-S. Chang, L.-J. Hung, T. Kloks, and S.-L. Peng, On the threshold-width of graphs, Journal of Graph Algorithms and Applications 15 (2011) 253-268.
C.-H. Hsu, S.-L. Peng*, Y.-W. Tsay, An improved algorithm for protein structural comparison based on graph theoretical approach, Chiang Mai Journal of Science 38 (2011) 71-81. (SCI)
M.-S. Chang, L.-J. Hung, T. Kloks, and S.-L. Peng*, Block-graph width, Theoretical Computer Science 412 (2011) 2496-2502. (Extended abstract appeared in TAMC 2009, Lecture Notes in Computer Science, 5532 (2009), 150-157. (EI))
G. Lee, Y.-C. Chen, S.-L. Peng, and J.-H. Lin, Solving the sensitive itemset hiding problem whilst minimizing side effects on a sanitized database, SUComS 2011, Communications in Computer and Information Science, 223 (2011) 104-113. (EI)
S.-L. Peng* and Y.-W. Tsay, On the usage of graph spectra in protein structural similarity, Proceedings of the 2011 International Computer Science and Engineering Conference, 209-214, September 7-9, 2011, Thailand. (Best paper award)
S.-L. Peng* and Y.-W. Tsay, A fast algorithm for protein structural comparison, Proceedings of the 28th Workshop on Combinatorial Mathematics and Computation Theory, 59-66, May 27-28, 2011.
R.-Y. Chang and S.-L. Peng*, Minimum edge ranking spanning tree problem on interval graphs, Proceedings of the 28th Workshop on Combinatorial Mathematics and Computation Theory, 200-203, May 27-28, 2011.
S. C. Lo and Wei-Kun Lu, “Packet Routing Schemes in Vehicular Ad Hoc Networks” Journal of Internet Technology, Vol. 12, No. 6, pp. 931-940, November. 2011. (SCI)
C. C. Tseng, H. H. Chen, K. C. Chen, S. C. Lo and M. Y. Liu, “On QoS Guaranteed Cluster-based Multihop Wireless Ad Hoc Networks,” IET Communications, vol. 5, no. 12, pp. 1698-1710, August 2011. (SCI)
S. C. Lo and L. C. Ou, “Efficient Routing and Centralized Scheduling Algorithms for IEEE 802.16 Mesh Networks,” International Journal of Network Management, Vol. 21, No. 6, pp. 494-512, December 2011. (EI)
S. C. Lo, M. H. Chiang, J. H. Liou, and J. S. Gao, “Routing and Buffering Strategies in Delay-Tolerant Networks: Survey and Evaluation,” Proc. IEEE ICPP Workshop, Sept. 2011.
Y. J. Lin, J. S. Gao, and S. C. Lo, “A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks,” IEEE International Conference on Computer Science and Information Technology, June, 2011.
呂權龍、羅壽之,”延遲容忍網路下具壅塞控制之動態路由”,The16th Mobile Computing Workshop, June 2011.
H.-Y. Kao* & C.-L. Hsu, (2011), “Modeling users’ attitudes toward ERP systems with a Bayesian network”, International Journal of Industrial Engineering- Theory, Applications and Practice, Vol. 18, No. 11, 559-567 (SCI-e).
H.-Y. Kao* , C.-H. Huang & C.-L. Hsu, C.-L. Huang (2011), “Diagnosis from Bayesian Networks with Fuzzy Parameters–A Case in Supply Chains”, Journal of Internet Technology, Vol. 12, No. 1, 49-56 (NSC 98-2410-H-259-006-) (SCI-e).
H.-Y. Kao* , C.-H. Huang & C.-L. Hsu (2011), “Learning from Supply Chains with Probabilistic Network Models”, International Journal of Industrial Engineering- Theory, Applications and Practice, Vol. 18, No. 6, 317-322 (SCI-e).
H.-Y. Kao*, M.-C. Liu, C.-L. Huang & Y.-C. Chang (2011), “Evaluation and classification of e-learning systems from design perspectives”, ICIC Express Letters, Part B: Applications- An International Journal of Research and Surveys, Vol. 2, No. 4, 873-878 (EI).
C.-H. Huang* & H.-Y. Kao (2011), “Learning Influence Diagram with Rough Sets for Bacterial Infection Treatments”, 2011 International Conference on Information Communication and Management, Singapore, October 14-15, 2011.
H.-Y. Kao* & C.-H. Huang (2011), “Competency Analysis with DEA and DBN: The Case Study of Higher Education in Taiwan”, International Conference on Business and Information, Bangkok, Thailand, July 4-6, 2011 (NSC 99-2410-H-259-045-MY2).
C.-H. Huang & H.-Y. Kao (2011), “Supply Chain Management using Rough Sets and Influence Diagrams”, International Conference on Business and Information, Bangkok, Thailand, July 4-6, 2011 (NSC 99-2410-H-259-045-MY2).
H.-Y. Kao*, J.-Y. Chen & Y.-C. Lai (2011), “Causal analysis on R&D and financial efficiencies for universities ranking by the DEA approach”, The International Conference on Electronic Commerce, Administration, Society, and Education (e-CASE), Tokyo, Japan, January 18-20, 2011 (NSC 99-2410-H-259-045-MY2).
I-Cheng Chang* and Chieh-Jung Hsieh, “Image Forgery Using An Enhanced Bayesian-based Matting Algorithm”,Intelligent Automation and Soft Computing, to be published in Vol. 17, No. 2, pp. 269-281, 2011. [2009 IF = 0.349][5-Year IF = 0.301]
Pao-Lien Lai*, “Geodesic pancyclicity of twisted cubes,” Information Sciences, vol. 181, no. 23, pp. 5,321-5,332, 2011.
Po-Chang Li*, Zheng-Da Liu, and Pao-Lien Lai, “Three-round adaptive diagnosis in crossed cubes,” in Proceeding of the 28th Workshop on Combinatorial Mathematics and Computation Theory, p. 254-259, Penghu, Taiwan, May 2011.
Hong-Chun Hsu*, Pao-Lien Lai, Tseng-Kuei Li, and Chang-Hsiung Tsai, “Fault diagnosis algorithm for biswapped networks under the PMC model,” in Proceeding of the 28th Workshop on Combinatorial Mathematics and Computation Theory, p. 144-151, Penghu, Taiwan, May 2011.
Pao-Lien Lai*, Hong-Chun Hsu, and Chang-Hsiung Tsai, “A systematic algorithm for embedding Hamiltonian cycle in hierarchical crossed cubes,” in the 11th International Symposium on Parallel Architecture, Algorithms and Networks (ISPAN 2011), p. 358-365, Dalian, China, Aug. 2011.
Pao-Lien Lai* and Ming-Yi Chiu, “Uniform disjoint cycle covers on a hierarchical multicomputer system,”Communications in Computer and Information Science, vol. 223, pp. 141-148, 2011.
Min-Xiou Chen, and Tze-Chin Tzeng, 2011, “Integrating Service Discovery Technologies in OSGi platform”, Computer Standards & Interfaces, Vol. 33, No. 3, pp. 271-279. (SCI)
Min-Xiou Chen, Bing-Yang Lin, and Yung-Cheng Chuang, 2011, June, “Design Remote Monitor System based on OSGi platform in Vehicle Gateway for Vehicle Network”, 7th International Conference on Networked Computing and Advanced Information Management, June, Gyeongju, Korea.(IEEE)
Chung Yung, Yen-Chang Lai, and Qin-Xin Tu, “Local Independence Transformation and Its Application to Removing Nonduplicate Statements in Code Clones”, Proceedings of the 2011 International Conference on Software Engineering Research and Practice (SERP’11), pp. 571-577, Las Vegas NV, U.S.A., July 2011.
Tao-Ku Chang and Gwan-Hwan Hwang, “Developing an Efficient Query System for Encrypted XML Documents.” Accepted for publication in Journal of Systems and Software, 2011. (SCI journal; Supported in part by NSC of Taiwan under grant no. NSC 98-2221-E-259-011and NSC 97-2221-E-026 -001)
Tao-Ku Chang and Te-Feng Chiu, “A Secure Web Services-Based Workflow Management System,” The 2011 International Conference on Electric Information and Control Engineering (ICEICE): 1108-1111, Wuhan, China.
張至豪、王子源、賴志宏、劉蓁蓁(2011 年 10月)。即時通訊代理人對外語課程學習成效影響之實證研究。台灣數位學習發展研討會。台北福華會館,台北,台灣。
Book and Chapter
Shinfeng Lin, Chih-Cheng Wang, Chih-Yao Chuang, and Kuan-Ru Fu, A Hybrid Error Concealment Technique for H.264/AVC Based on Boundary Distortion Estimation, INTECH-“Recent Advances on Video Coding “, ISBN 978-953-307-181-7, Chapter 11, P.243-P.258, July 2011.
Shinfeng D. Lin* and Shih-Chieh Shie, Digital Steganographic Schemes based on Image Vector Quantization, Accepted by Multimedia Security and Steganography, September 22, 2011.
Wen-Kai Tai, “Chapter 8. The state-of-the-art Steganography for 3D Meshes,” Book chapter of “Steganography and Watermarking,” Nova Science Publishers, Inc., 2011/12
H.-Y. Kao*, C.-H. Huang, C.-L. Hsu and C.-L. Huang (2010), “Diagnosis from Bayesian Networks with Fuzzy Parameters–A Case in Supply Chains”, Lecture Notes in Computer Science, Vol. 6104, to appear (GPC 2010) (NSC 97-2410-H-259-065-) (EI).
C.-H. Huang and H.-Y. Kao (2009), “Interval Regression Analysis with Soft-Margin Reduced Support Vector Machine“, Lecture Notes in Computer Science, Vol. 5579, 826-835 (IEA-AIE 2009) (EI)
C.-H. Huang, H.-Y. Kao, “An Effective Linear Approximation Method for Geometric Programming Problems”, 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, December 8-11, 2009 (NSC 97-2410-H-259-065-) (EI).
C.-H. Huang, H.-Y. Kao*& H.-L. Li (2007), “Intelligent Decision Support based on Influence Diagrams with Rough Sets,” Lecture Notes in Computer Science, Vol. 4482, 518-525 (JRS 2007) (TMS-094 -2-B-009) (EI).
Yung-Sheng Chen, I-Cheng Chang, Bor-Tow Chen and Ching-Long Huang, Three-Dimensional Digital colour Camera, Image Processing, ISBN 978-953-307-026-1, IN-TECH, 2009.
Min-Xiou Chen, 2009, December, ” Design and Implementation of Vehicle Navigation Systems,” a book chapter in Handbook of Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, IGI Global.
陳旻秀, 2011, “車載服務取得與應用”, 車載通訊原理、服務與應用, pp. 487-514, 東華書局
陳旻秀, 2011, “智慧型車載資通訊環境設計”, 行動裝置應用程式設計, pp. 153-172, 東華書局