2017 paper
Y. W. Cheng and S. C. Lo, “Improving Fair Scheduling Performance on Hadoop,” International Conference on Platform Technology and Service, February 2017.
Shi-Jim Yen, Chingnung Lin, Guan-Lun Cheng and Jr-Chang Chen, “Deep Learning and Block Go”, The International Joint Conference on Neural Networks (IJCNN 2017), Anchorage, Alaska, USA.
C.N. Yang, C.H. Wu, Z.X. Yeh, D. Wang, and C. Kim, “A New Sharing Digital Image Scheme with Clearer Shadow Images,” Computer Standards & Interfaces, Vol. 51, pp. 118-131, Mar., 2017. [SCI 5-year IF: 1.453].
C.N. Yang, S.C. Hsu, and C. Kim, “Improving Stego Image Quality in Image Interpolation Based Data Hiding,” Computer Standards & Interfaces, Vol. 50, pp. 209-215, Feb., 2017. [SCI 5-year IF: 1.453].
Z. Zhou, Y. Wang, Q.M. Wu, C.N. Yang, and X. Sun, “Effective and Efficient Global Context Verification for Image Copy Detection,” IEEE Transactions on Information Forensics and Security, Vol. 12, No. 1, pp. 48-63, Jan., 2017. [SCI 5-year IF: 3.266].
C.N. Yang, J.K. Liao, and D. Wang, “New Privilege-based Visual Cryptography with Arbitrary Privilege Levels,” Journal of Visual Communication and Image Representation, Vol. 42, pp. 121-131, Jan. 2017. [SCI 5-year IF: 1.549].
C.N. Yang, T.C. Tung, F.H. Wu, and Z. Zhou, “Color Transfer Visual Cryptography with Perfect Security,” Measurement, Vol. 95, pp. 480-493, Jan., 2017. [SCI 5-year IF: 1.637].
C.N. Yang,TMCM 2017- International Scientific Committee Member of 2017 2nd International Conference on Test, Measurement and Computational Method (TMCM 2017).
C.N. Yang, ICSIP 2017- Conference Technical Committee Member of 2017 2nd International Conference on Signal and Image Processing (ICSIP 2017).
C.N. Yang,SAPSE 2017- Program Committee Member of 8th IEEE International Workshop on Security Aspects of Process and Services Engineering (SAPSE 2017) in conjunction with COMPSAC 2017.
C.N. Yang,ICMSSP 2017- Conference Chair of 2017 International Conference on Multimedia Systems and Signal Processing (ICMSSP 2017).
C.N. Yang,ISIC’17- Program Committee Chair of The 2017 International Conference on Information Security and Intelligent Computing (ISIC’17).
C.N. Yang,CST2017- Technical Program Committee Member of The 2nd International Conference on Computer Science and Technology (CST 2017).
C.N. Yang,SIGNAL 2017- Technical Program Committee Member of The First International Conference on Advances in Signal, Image and Video Processing (SIGNAL 2017).
C.N. Yang,KESA 2017- Technical Program Committee Chair of The International Workshop on Knowledge Extraction and Semantic Annotation (KESA 2017) in conjunction with ALLDATA 2017.
C.N. Yang,ICISSP 2017- Program Committee Member of the International Conference on Information Systems Security and Privacy (ICISSP 2017).
2016 paper
Huang, C.J., Chuang,Y.T., Lai, W.K., and Hsiao, S.Y., A QoS Enabled Routing and Priority Scheduler Scheme in Mobile Ad Hoc Networks, Wireless Communications and Mobile Computing. (accepted) (SCI, EI) IF:0.909(NSC 93-2213-E-026-001)
Wang, C.C., Lee, P.M., Huang, C.J., and Jeng, M.D., Low power state assignment for finite state machine using a Gray-code-tree (GCT) method. VLSI Design, (accepted no. J00345) (SCI, EI)
Kun-Wen Lee, Shi-Jim Yen, “Pattern Database for Block Go,” TCGA 2016 workshop, Taichung, Taiwan, June, 2016.
Ching-Shen Lin, Shi-Jim Yen, “Using features on Move Prediction for Go,” TCGA 2016 workshop, Taichung, Taiwan, June, 2016.
Shi-Jim Yen, Keng Wen Li, Jr-Chang Chen and Chingnung Lin “Deep Convolutional Neural Network, Minorization-Maximization Algorithm, and Monte Carlo Tree Search on Block Go,” The 21th Game Programming Workshop (GPW-2016).
Chingnung Lin and Shi-Jim Yen “Accelerate Deep Learning Inference with MCTS in the game of Go on the Intel Xeon Phi,”The 21th Game Programming Workshop (GPW-2016).
Min-Xiou Chen, and Chi-Hsun Wu, “An Network Live Migration Mechanism for Hybrid Cloud Network”, 2016 IEEE 17th International Conference on High Performance Switching and Routing, Yokohama, Japan, 2016.(MOST104-2221-E-259-003)
W. X. Weng and S. C. Lo, “Fall Detection Based on Tilt Angle and Acceleration Variations,” IEEE International Symposium on UbiSafe Computing, August 2016.
Lu, C. L., Su, T. C., Lin, T. C., Chung, I. F., “Systematic identification of multiple tumor types in microarray data based on hybrid differential evolution algorithm.” Technology and health care, Vol. 24, pages S237-S244, Supplement 1. [SCI 5-year IF: 0.736]
沈志成, 謝維宸, 李官陵, “個人化偏好之旅遊行程推薦系統”, Taiwan Academic Network Conference, 2016.
孫旻祺, 謝維宸, 陳麗嬌, 李官陵, “個人化健康管理食譜推薦系統”, Cloud Computing and Big Data Analysis Conference, 2016
Cheng-Chin Chiang, Ren-Hong Wang, Bo-Ruei Chen: Recognizing Arbitrarily Connected and Superimposed Handwritten Numerals in Intangible Writing Interfaces. Pattern Recognition 07/2016; 61., DOI:10.1016/j.patcog.2016.07.018
C.-H. Huang, H.-Y. Kao, “Big Data Classification with the Soft Margin Multi-Classifier
Support Vector Machine”, 2016 International Symposium on Business and Social Sciences
(ISBSS 2016), Loisir Hotel Naha, Okinawa, Japan, August 2-4, 2016.
M.T. Yang, & Y.C. Shih, 2016. Interacting with 3D Curricular Contents using Free-Hand Gestures, International Society for Technology in Education (ISTE), June, Denver, Colorado, U.S.A.
高韓英*, 蔡潔茵 (2016), “水產養殖業之策略性顧客資料探勘研究”, 資訊與管理科
學、Vol 9, No. 1, 4-21.
高韓英、廖育軒 (2016), “利用資料包絡分析與多準則決策評估校園永續及能源資訊效
率”, 2016 資訊管理暨電子商務經營管理研討會, 台東, May 13-14, 2016.
高韓英、藍梓恆 (2016), “結合雲端運算之綠色供應鏈網路設計”, 2016 台灣商管與資訊
研討會, 台北, March 25, 2016.
Guanling Lee and Dong-Jhe Jiang, “An Efficient Method for Computing Approximate Top-k Dominating Queries in a Data Stream Environment”, The 6th International Congress on Engineering and Information, May 2016
Wang, I. J., Lee, G. L., Peng, S. L., Chen, Y. C., “Supporting Content-Based Music Retrieval in Structured Peer-to-Peer Overlays.” Journal of internet technology, Vol.17, Issue 3, pages 401-407. [SCI 5-year IF: 0.387]
Lin, H. C., Lee, G. L., “Speedily, efficient and adaptive streaming algorithms for real-time detection of flooding attacks.” Journal of intelligent & fuzzy systems, Vol. 31, Issue 4, pages 2363-2373. [SCI 5-year IF: 1.019]
Liu, C. C., Chang, I. C., “Model of online game addiction: The role of computer-mediated communication motives.” Telematics and informatics, Vol. 33, Issue 4, pages 904-915. [IF:2.261]
Chen, M. X., Sung, F. H., “Integrated service discovery architecture for heterogeneous networks.” International journal of communication systems, Vol. 29, Issue 4, pages 772-786. [SCI 5-year IF: 1.818]
Hong, J. Y., Way, D. L., Shih, Z. C., Tai, W. K., Chang, C. C., “Inner engraving for the creation of a balanced LEGO sculpture.” Visual computer, Vol.32, Issue 5, pages 569-578. [SCI 5-year IF: 1.052]
Cheng, J. J., Chang, C. C., Tai, W. Kai., Way, D. L., “Image resizing based on strengthened edges.” Journal of the chinese institute of engineers, Vol. 39, Issue 4, pages 447-454. [SCI 5-year IF: 0.259]
Lee, C. S., Wang, M. H., Yen, S. J., Wei, T. H., Wu, I. C., Chou, P. C., Chou, C. H., Wang, M. W., Yang, T. H., “Human vs. Computer Go: Review and Prospect.” IEEE Computational intelligence magazine, Vol. 11, Issue 3, pages 68-73. [SCI 5-year IF: 3.483]
Wu, R. Y., Chang, J. M., Peng, S. L., Liu, C. L., “Gray-Code Ranking and Unranking on Left-Weight Sequences of Binary Trees.” Ieice transactions on fundamentals of electronics communications and computer sciences, Vol. E99A, Issue 6, pages 1067-1074. [SCI 5-year IF: 0.234]
Hsueh, C. H., Wu, I. C., Tseng, W. J., Yen, S. J., Chen, J. C., “An analysis for strength improvement of an MCTS-based program playing Chinese dark chess.” Theoretical computer science, Vol. 644, pages 63-75, Sep. 6, 2016. [SCI 5-year IF: 0.827]
Huang, C. J., Chang, S. C., Chen, H. M., Tseng, J. H., and Chien, S. Y. (2016). A group intelligence-ased asynchronous argumentation learning-assistance platform. Interactive Learning Environments, (ahead-of-print), 1-20. (SSCI) IF:1.323 (99- 2511-S-259-008-MY3 and 102-2511-S-259-010-MY3)
Huang, C.J., Hu, K. W., Chen, H.M., Liao, H.H., Tsai, H.W., and Chien, S. Y., (2016) An intelligent energy management mechanism for electric vehicles, Applied Artificial Intelligence. 30(2) 125–152 (SCI, EI) IF:0.527 (101-2622-E-259-001-CC3 and 102- 2511-S-259-010-MY3)
Huang, C.J., Chang, S. C., Chen, H.M., Tseng, J.H, and Chien, S. Y., (2016) Supporting the development of synchronous text-based computer-mediated communication with an intelligent diagnosis tool, Applied Soft Computing. 39 266– 274 (SCI, EI) IF:2.81 (NSC 102-2511-S-259-010-MY3)
C.N. Yang, L.Z. Sun, X. Yan and C. Kim, “Design a New Visual Cryptography for Human-verifiable Authentication in Accessing a Database,” Journal of Real-Time Image Processing, Vol. 12, Issue 2, pp. 483-494, Aug., 2016. [SCI 5-year IF: 1.590].
Z. Zhou, Y. Wang, Q.M. Wu, and C.N. Yang, and X. Sun, “Effective and Efficient Global Context Verification for Image Copy Detection,” IEEE Transactions on Information Forensics and Security (doi: 10.1109/TIFS.2016.2601065) published online at Aug., 2016. [SCI 5-year IF: 3.266]
P. Li, C.N. Yang, and Q. Kong, “A novel two-in-one image secret sharing scheme based on perfect black visual cryptography,” Real-Time Image Processing (doi:10.1007/ s11554-016-0621-z) published online at July, 2016. [SCI 5-year IF: 1.590].
C.N. Yang, C.H. Chen, and S.R. Cai, “Enhanced Boolean-based Multi Secret Image Sharing Scheme,” Journal of Systems and software, Vol. 116, pp. 22-34, June 2016. [SCI 5-year IF: 1.767].
Z. Zhou, C.N. Yang, B. Chen, X. Sun, Q. Liu, and Q.M. Wu, “Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation,” IEICE Transactions on Information and Systems, Vol. E99-D, No. 6, pp. 1531-1540, June, 2016. [SCI 5-year IF: 0.212]
P. Li, C.N. Yang, and Z. Zhou, “Essential Secret Image Sharing Scheme with the Same Size of Shadows,” Digital Signal Processing, Vol. 50, pp. 51-60, Mar., 2016. [SCI 5-year IF: 1.558]
C.N. Yang, L.Z. Sun, and S.R. Cai, “Extended Color Visual Cryptography for Black and White Secret Image,” Theoretical Computer Science, Vol. 609, Part 1, pp. 143-161, Jan., 2016. [SCI 5-year IF: 0.827].
2015 paper
Marie-Liesse Cauwet, Shih-Yuan Chiu, Kuo-Min Lin, David Saint-Pierre, Fabien Teytaud, Olivier Teytaud and Shi-Jim Yen, “Parallel Evolutionary Algorithms Performing Pairwise Comparisons,” Foundations of Genetic Algorithms XIII (FOGA 2015), on 17-20 January, 2015. Aberystwyth, Wales, UK.
Shih-Yuan Chiu, Ching-Nung Lin, Jialin Liu, Tsan-Cheng Su, Fabian Teytaud, Olivier Teytaud and Shi-Jim Yen, “Differential Evolution for Strongly Noisy Optimization: Use 1.01^n Resamplings at Iteration n and Reach the -1/2 Slope”, 2015 IEEE Congress on Evoluationary Computation(CEC 2015), on 25-28 May, 2015, Sendai, Japan.
Hsueh, Chu-Hsuan; Wu, I-Chen; Tseng, Wen-Jie; Yen, Shi-Jim; Chen, Jr-Chang, ” Strength Improvement and Analysis for an MCTS-Based Chinese Dark Chess Program”, International Conference Advances in Computer Games, on 1-3 July, 2015, Leiden, The Netherlands.
Teytaud, Olivier; Saffidine, Abdallah; Yen, Shi-Jim, “The complexities of Go”, International Conference Advances in Computer Games, on 1-3 July, 2015, Leiden, The Netherlands.
Marie-Liesse Cauwet, Olivier Teytaud, Tristan Cazenave, Abdallah Saffidine, Shi-Jim Yen, Hua-Min Liang, Hung-Hsuan Lin and I-Chen Wu, “Depth, Balancing, and Limits of the Elo Model,” 2015 IEEE Conference on Computational Intelligence and Games (IEEE CIG 2015), Aug. 31- Sep. 2, Tainan, Taiwan.
Min-Xiou Chen, “A Routing Strategy for Vehicular ad hoc Networks based on Geographic Internet Protocol”, The 3rd Annual Conference on Engineering and Information Technology, Osaka, Japan, March, 2015.(NSC 101-2628-E-259-004-MY3)
Shinfeng D. Lin, Ting-Yi Chen and Jia-Jen Lin, Object Tracking Using Particle Filter and Template Matching
Shinfeng D. Lin, Jia-Jen Lin, and Chih-Yao Chuang, Particle filter with occlusion handling for visual tracking
Shinfeng D. Lin, Yu-Hung Lo and Chih-Yao, ChuangAn Adaptive Error Concealment Technique for Depth Image-Based Video Transmission
Shinfeng D. Lin, Ting-Yi Chen, and Jia-Jen Lin, VISUAL OBJECT TRACKING BASED ON TEMPLATE MATCHING AND SURF FEATURES
Yen-hui Liang and Shiow-yang Wu. Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework. IEEE BigData 2015: 4th International Congress on Big Data, Taipei Satellite Session, May 15-16, 2015.
Yun-Ning Liu and Shiow-yang Wu. A Dynamic Calculation Method for AHP in Unexpected Environments. e-CASE & e-Tech 2015: International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology, Kuala Lumpur, ysia, April 13, 2015.
Huang, C.J., Guan, C.T., Chen, H.M., Wang, Y.W., Chien, S. Y., Jian, J.J., and Liao, J.J.,(2015) A Self-Adaptive Joint Bandwidth Allocation Scheme for Heterogeneous Wireless Networks, Applied Soft Computing. 37 156–165 (SCI, EI) IF:2.415 (NSC 99-2511-S-259-008-MY3 and 101-2622-E-259-001-CC3)
Huang, C.J., Chang, S. C., Guan, C.T., Wang, Y.W., Chen, H.M., Weng, C.H., and Chien, S. Y., (2015)An adaptive live streaming mechanism for heterogeneous vehicular networks,Applied Artificial Intelligence. 29(7) 637–659 (SCI, EI) IF:0.795 (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chen, H.M., Chang, S.C., and Chien, S.Y., (2015)Application of Social Computing to Collaborative Web Search, Open Journal of Social Sciences. 3(9) 28-33. (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chang, S.C., Guan, C.T., Chen, H.M., and Chien, S.Y., (2015)An Intelligent Short-text Auto-marking Algorithm for Text-based Computer-mediated Communication, Journal of Information Technology and Application in Education. 4 65-69. (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chang, S.C., Chen, H.M., and Chien, S.Y., (2015)An Intelligent Assessment Mechanism for Online Short Text,International Journal of Automation and Control Engineering. 4(1) 22-25. (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chang, S.C., Chen, H.M., Chen, C.Y., Tseng, J.H, and Chien, S.Y., (2015)An Intelligent Assessment Mechanism of Asynchronous Discussion Posts,International Journal of Computer and Communication Engineering. 4(1) 66-72. (NSC 99-2511-S-259-008-MY3 and NSC 102-2511-S-259-010-MY3)
Huang, C.J., Hu, K.W., Wang, Y.W., Chen, H.M., Tasi, H.W., and Chien, S.Y., (2015) An Adaptive Vehicle Path Planning System, International Journal of Computer and Communication Engineering 4(1) 50-56. (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chen, H.M., Chen, Y.J., Chen, C.Y., and Chien, S.Y., (2015)An Intelligent Nocturnal Animal Vocalization Recognition System, International Journal of Computer and Communication Engineering 4(1) 39-45. (NSC 102-2511-S-259-010-MY3 and 99A058)
Huang, C.J., Hu, K.W., Chen, H.M., Wang, Y.W., Jui-Jiun Jian, J.J., and Chien, S.Y., (2015)A SVR-Based Multimedia Streaming Dissemination System for Vehicular Networks,International Journal of Computer and Communication Engineering. 4(1) 26-32. (NSC 102-2511-S-259-010-MY3)
Huang, C.J., Chen, H.M., Chang, S.C., and Tsai, T.A., (2015)Application of social computing to collaborative online learning resource recommender system,2015 International Conference on Education and E-Learning, Nov. 2015. (NSC 102-2511-S-259-010-MY3)
黃振榮, 張舜治,蔡璨安,林子傑,蔡翰文(民104) 適用於多媒體數位學習的學習路徑追蹤系統2015數位科技與創新管理研討會。(NSC 102-2511-S-259-010-MY3)
S. -C. Chou, “Controlling Information Flows in Net Services with Low Runtime Overhead” International Journal of Computer Network and Information Security, 7(3), Feb., 2015, pp.1-9.
P. Li, C.N. Yang, and Z. Zhou, “Essential Secret Image Sharing Scheme with the Same size of Shadows,” accepted and to be published at Digital Signal Processing (doi: 10.1016/j.dsp.2015.12.004). [SCI 5-year IF: 1.709].
C.N. Yang, C.H. Chen, and S.R. Cai, “Enhanced Boolean-based Multi Secret Image Sharing Scheme,” accepted and to be published at Journal of Systems and software (doi:10.1016/j.jss.2015.01.031). [SCI 5-year IF: 1.485].
C.N. Yang, C.C. Wu, Y.C. Lin, and C. Kim, “Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography,” ETRI Journal, Vol. 37, No. 5, pp. 979-989, Oct., 2015. [SCI 5-year IF: 0.803].
C.N. Yang and C.Y. Lin, “Almost-aspect-ratio-invariant Visual Cryptography without Adding Extra Subpixels,” Information Sciences, Vol 312, pp. 131–151, Aug., 2015. [SCI 5-year IF: 4.221].
C. Kim and C.N. Yang, “Watermark with DSA Signature Using Predictive Coding,” Multimedia Tools and Applications, Vol. 74, Issue 14, pp. 5189-5203, July 2015. [SCI 5-year IF: 1.374].
C.N. Yang, L.Z. Sun, X. Yan and C. Kim, “Design a New Visual Cryptography for Human-verifiable Authentication in Accessing a Database,” Journal of Real-Time Image Processing (doi:10.1007/s11554-015-0511-9) published online at June, 2015. [SCI 5-year IF: 1.548].
C.N. Yang , S.R. Cai, and L.Z. Sun, “Parallel Response Ternary Query Tree for RFID Tag Anti-Collision,” Journal of Computer and Communications, Vol. 3, No. 5, pp. 72-79, May 2015. [indexed by Google Scholar].
X. Yan, S. Wang, X. Niu, and C.N. Yang, “Generalized Random Grids-based Threshold Visual Cryptography with Meaningful Shares,” Signal Processing, Vol. 109, pp. 317–333, April, 2015. [SCI 5-year IF: 2.360].
X. Yan, S. Wang, X. Niu, and C.N. Yang, “Halftone Visual Cryptography with Minimum Auxiliary Black Pixels and Uniform Image Quality,” Digital Signal Processing, Vol. 38, pp. 53–65, March, 2015. [SCI 5-year IF: 1.709].
C.N. Yang, Z.Y. Lin, and S.L. Peng, “Reducing Code Length of Second-Order Spectral-Null Code,” IEEE Transactions on Computers, Vol. 64, No. 2, pp. 492-503, Feb., 2015. [SCI 5-year IF: 1.768].
C.N. Yang, P. Li, C.C. Wu, and S.R. Cai, “Reducing Shadow Size in Essential Secret Image Sharing by Conjunctive Hierarchical Approach,” Signal Processing- Image Communication,Vol. 31, pp. 1–9, Feb., 2015. [SCI 5-year IF: 1.554].
X. Yan, S. Wang, X. Niu, and C.N. Yang, “Random Grid-based Visual Secret Sharing with Multiple Decryptions,” Journal of Visual Communication and Image Representation, Vol. 26, pp. 94–104, Jan., 2015. [SCI 5-year IF: 1.420].
C.N. Yang, F.H Wu, S.Y. Tsai, and W.C. Kuo, “E-health Services for Elderly Care Based on Google Cloud Messaging,” accepted and to be published at IEEE Smart City 2015 (International Conference on Smart City), Chengdu, China, Dec., 2015.
C.N. Yang, Z.N. Lin, J.K. Liao, and Y.F. Lee, “A Study of Intrusion Detection Tool Snort on Digital Forensics,” 2015 Conference on Information Technology and Applications in Outlying Islands (ITAOI 2015), pp. 815-819, May, 2015.
Chang-Hsiung Tsai ,The pessimistic diagnosability of alternating group graphs under the PMC model,’’ Information Processing Letters, vol. 115, pp.151-154, 2015. SCI, EI
Chia-Jui Lai and Chang-Hsiung Tsai*, “A linear algorithm for embedding of cycles in crossed cubes with edge-pancyclic”, Journal of Information Science and Engineering, vol. 31, pp. 1347-1355, 2015. SCI, EI.
Jheng Cheng Chen, Meng Jou Chien, Chang Hsiung Tsai,Optimal routing and wavelength assignment for augmented cubes in linear array optical networks
Cheng-Chin Chiang, Ren-Hung Wang, Bo-Ruei Chen, Jin-Wei Yeh,Recognizing Arbitrarily Connected and Superimposed Numerals in One-Stroke Finger Gestures for Intangible Writing Interfaces【CVGIP學會黃俊雄佳作論文獎】
Cheng-Chin Chiang, Chiu-Shann Chen, and Yu-Ju Lin,A Novel Approach for Virtual Facial Shape Cloning and Makeup Reproducing
Chang-Shing Lee*, Mei-Hui Wang, Meng-Jhen Wu, Olivier Teytaud, Shi-Jim Yen, T2FS-based Adaptive Linguistic Assessment System for Semantic Analysis and Human Performance Evaluation on Game of Go
Shi-Jim Yen, Cheng-Wei Chou, Jr-Chang Chen, I-Chen Wu, and Kuo-Yuan Kao, Design and Implementation of Chinese Dark Chess Programs
M. T. Yang, & J. Zheng. On-road Collision Warning Based on Multiple FOE Segmentation Using a Dashboard Camera
M.T. Yang & Y. Shih, Workplace Cultural Learning using Augmented Reality and Computer Vision
H.-Y. Kao, Y.-M. Yang, C.-H. Huang, Dynamic virtual machines placement in a cloud environment by multi-objective programming approaches
C.-H. Huang, K.-C. Yang, H.-Y. Kao, Analyzing Big Data with a Cloud Business Intelligence System
高韓英*, 楊祐閔, 利用多目標規劃求解雲端虛擬機之動態配置
高韓英*, 蔡潔茵, 水產養殖業行銷策略之資料探勘
Hsi-Che Tseng, Zhi-Hong Ye, Hsin-Chou Chi, Design of a Multicast Router for Network-on-Chip Architectures with Irregular Topologies
C.-H. Yeh, Guanling. Lee, and C.-Y. Lin, Robust Laser Speckle Authentication System Through Data Mining Techniques
Yi-Chun Chen, Guanling Lee, Mining Non-Redundant Substitution Rules between Sets of Items in Large Databases
Chih-Chieh Tseng and Guanling Lee, A Depth-First Search Approach for Mining Proportional Fault-tolerant Frequent Patterns Efficiently in Large Database
Ruei-Yuan Chang, Sheng-Lung Peng, Guanling Lee, and Chia-Jung Chang, Comparing Group Characteristics to Explain Community Structures in Social Media Networks
Guanling Lee and Hsiou-Hao Lin An Efficient Skyline Maintenance Method for Data Modification
Delvi Ester and Guanling Lee Fault Tolerance Patterns Mining in Dynamic Databases
R.-Y. Chang, S.-L. Peng, G. Lee, C.-J. Chang Comparing group characteristics to explain community structures in social media networks
C.-C. Wei, S.-Y. Hsieh, C.-W. Lee, S.-L. Peng An improved approximation algorithm for the partial-terminal Steiner tree problem with edge cost 1 or 2
Van Bang Le, S.-L. Peng On the Complete Width and Edge Clique Cover Problems
A.-L. Dong, S.-L. Peng A Unified Approach for the Longest Path Problem on Some Tree-like Graphs
Van Bang Le, S.-L. Peng Characterizing and recognizing probe block graphs
C.-N. Yang, Z.-Y. Lin, S.-L. Peng Reducing code length of second-order spectral-null code
S.-L. Peng, Y.-H. Chen, R.-S. Chang, J.-M. Chang An Energy-aware Random Multi-path Routing Protocol for MANETs
R.-Y. Wu, J.-M. Chang, S.-L. Peng, S.-C. Chang Ranking Left-weight Sequences of Binary Trees in Gray-code Order
C.-F. Lin, S.-L. Peng, M.-F. Wu A Variant of the Sum Coloring Problem on Trees
S. C. Lo, C. C. Tsai, and Y. H. Lai Quota-Control Routing in Delay-Tolerant Networks
Meng-Ruei Sie, Shou-Chih Lo The Design of a Smartphone-Based Fall Detection System
陳萱翰, 羅壽之 應用於線上購物之混合式推薦系統
Yun-Ru Lin, Shou-Chih Lo The Design of a Cloud and Mobile Healthcare System
陳英月,羅壽之 應用於社區文化觀光旅遊之電子書製作
陳子寧,羅壽之 基於MapReduce實作多天旅遊行程規劃
Tao-Ku Chang, Elliott T. Y. Hwang An SOA-Based System Modeling Methodology
Tao-Ku Chang A Mutual Non-repudiation Protocol for a Cloud-based Checkout System
I-Cheng Chang, Yu-Chen Hu, Wu-Lin Chen, Chun-Chi Lo High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding
孫崧閔, 賴寶蓮 階層式交叉立方體之三回合適應性診斷模擬
Min-Xiou Chen and Fu-Hsing Sung Integrated Service Discovery Architecture for Heterogeneous Networks
Lai, C. H., Chen, G. Y., & Liang, J. S. Explore the impact of augmented reality on astronomy learning from teachers’ perspective
Chung Yung, and Yu-Tang Lin, “Implementing TOAST, a Tool for Agile Software Project Management in Cloud Computing Environments, ” Journal of Software (JSW), vol. 10, no. 11, pp. 1310-1318, November 2015.
Chung Yung, Ming-Cheng Li, and Yu-Tang Lin, “TOAST: A Tool for Agile Software Project Management in Cloud Computing Environments,” Proceedings of the 2015 International Conference on Information Technology (ICIT 2015), pp. 280-287, February 2015
2014 paper
Kao-Lin Hu, Pao-Lien Lai, and Cheng-Yi Lin, “One method for efficiently embedding Hamiltonian cycle in Mobius cubes,” in Proceeding of the 31th Workshop on Combinatorial Mathematics and Computation Theory, p. 186-191, Taipei, Taiwan, Apr. 25-26, 2014. (NSC 102-2115-M-259-007)
Wen-Yen Lin and Pao-Lien Lai “Independent spanning trees in hierarchical crossed cubes,” International Computer Symposium, Taichung, Taiwan, Dec. 12-14, 2014. (NSC 102-2115-M-259-007)
Han-Ying Kao*, Yu-Tseng Wang, Chia-Hui Huang, Pao-Lien Lai, and Jen-Yeu Chen, “Assessment and Classification of Service Learning: A Case Study of CS/EE Students”, The Scientific World Journal, vol. 2014 (2014), Article ID 183732.
賴志宏、高碩呈、陳冠瑜(2014, 5 月)。手機成癮相關議題之文獻分析。2014 全 球華人計算機教育應用大會(GCCCE2014)。上海。
Chen, S., Chang, W. H., Lai, C. H., & Tsai, C. Y. (2014). A comparison of students’ approaches to inquiry, conceptual learning and attitudes in simulation-based and microcomputer-based laborites. Science Education. 98(5), 905-935. (SSCI, IF: 2.382, sub-category rank: 8/219)
Lai, C. H.*, Chen, F. C., & Yang, J. C. (2014). Exploration of tensions in a mobile-technology supported fieldtrip: An Activity Theory Perspective. International Journal of Distance Education Technologies. 12(2), 104-117. (EI)
Lai, C. H.*, Lin, C. Y., Chen, C. H., Chen, S. F., & Gwung, H. L. (2014). The association between college students’Internet usage and interpersonal relationships. Journal of Internet Technology. 15(4), 671-678. (SCI, IF:0.481, sub-category rank: 104/131)
Lai, C. H.*, Yang, S. P., Yen, A. C., & Chou, C. G. (2014). SMS and Emails as class reminders to assist subject learning. Journal of Computers. 24(4), 22-30. (EI)
Chung Yung, Ming-Cheng Li, and Yu-Tang Lin, “A New Model of Software Project Management Using Agile Methodology in Cloud Computing Environments,” Proceedings of the 2014 International Scientific Conference on Management and Information Science (ISCMIS 2014), pp. 233-243, June 2014.
Chung Yung, “e-Management of Software Development Projects in Cloud Computing Environments,” Proceedings of the 2014 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology – Fall Session (e-CASE & e-Tech 2014-Fall), pp. 389-400, November 2014.
Chung Yung, Shao-Zong Chen, and Jen-Tsung Hsieh, “Automatic Schedule Control for Distributed Software Development in Cloud Computing Environments,” Journal of Industrial and Intelligent Information (JIII), vol. 2, no. 1, pp. 39-44, March 2014.
Tao-Ku Chang*, “A Secure Operational Model for Mobile Payments.” The Scientific World Journal, 2014. (SCI journal; Supported in part by NSC of Taiwan under grant no. MOST-103-2221-E-259-029)
Tao-Ku Chang* and Tian-Yow Hwang. “An SOA-based System Modeling Methodology.” Journal of Internet Technology, 2014 (SCI journal; Supported in part by NSC of Taiwan under grant no. NSC-101-2221-E-259-030)
Tao-Ku Chang* and Jyun-Siao Huang. “Design and Implementation of a Secure Service-Oriented Workflow Platform.” Journal of Computers, 2014 (EI journal; Supported in part by NSC of Taiwan under grant no. NSC-102-2221-E-259-015)
Chang-Hsiung Tsai* “ The pessimistic diagnosability of alternating groupgraphs under the PMC model,’’ Information Processing Letters, (accepted),2014,
Chia-Jui Lai and Chang-Hsiung Tsai*, “A systematic approach for embedding of Hamiltonian cycles through a prescribed edge in locally twisted cubes”, Information Sciences, vol.289, pp. 1-7, 2014. SCI, EI.
Chia-Jui Lai and Chang-Hsiung Tsai*, “A linear algorithm for embedding of cycles in crossed cubes with edge-pancyclic”, Journal of Information Science and Engineering, (Accepted)2014. SCI, EI.
Y.X. Liu, C.N. Yang, P.H. Yeh, “Reducing Shadow Size in Smooth Scalable Secret Image Sharing,” Security and Communication Networks, Vol. 7, Issue 12, pp. 2237–2244, Dec., 2014.[SCI 5-year IF: 0.468].
C.N.Yang, C.L. Hsieh, and S.R. Cai, “Secret Image Sharing Schemes by Using Maximum Distance Separable Codes,” International Journal of Machine Learning and Computing, Vol. 4, No. 6, pp. 522-526, Dec., 2014. [indexed by Ei INSPEC].
C. Kim and C.N.Yang, “Data Hiding Based on Overlapped Pixels Using Hamming Code,” Multimedia Tools and Applications, published online, DOI: 10.1007/s11042-014-2355-x, Nov., 2014. [SCI 5-year IF: 1.039].
X. Yan, S. Wang,X. Niu, and C.N. Yang, “Essential Visual Cryptographic Scheme with Different Importance of Shares,” LNCS 8836, pp. 636-643, ICONIP 2014 (the 21st International Conference on Neural Information Processing), Kuching, Sarawak, Malaysia, Nov., 2014.
Shinfeng D. Lin, Yu-Ting Jiang, and Jia-Jen Lin, Object Tracking Using Particle Filter with SURF Feature, Journal of Electronic Science and Technology, Vol. 12, No. 3, pp. 339-344, September 2014, El.
Shi-Jim Yen, Wei-Liang Chen, Jr-Chang Chen, Shun-Chin Hsu and I-Chen Wu, “An Improved
X. Yan, G. Chen, and C.N. Yang, “Random Girds-based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
P. Li, C.N. Yang, and Q. Kong, “Two-in-one Image Secret Sharing Scheme Based on Boolean Operations,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
C. Kim and C.N. Yang, “Steganography Based on Grayscale Images Using (5, 3) Hamming Code,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
C.N. Yang , C.C. Wu, and D. Wang, “A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid,” Information Sciences, Vol. 278, pp. 141-173, Sep., 2014. [SCI 5-year IF: 3.969].
D. Wang, F. Yi, and C.N. Yang,“Visual Cryptography Scheme with Autostereogram,” IWDW 2014 (13-th International Workshop on Digital-forensics and Watermarking), Taipei, Taiwan, Oct., 2014.
Y.C. Huang, W.C. Kuo, and C.N. Yang, “Data Hiding Based on Radix-2,” AsiaJCIS 2014 (the 9th Asia Joint Conference on Information Security), Wuhan, China, Sep., 2014.
Chin-Chen Chang, I-Ta Lee, Tsung-Ta Ke and Wen-Kai Tai, “An object-based image reducing approach,” Advanced Materials Research, vols. 1044-1045, pp. 1049-1052, August 2014. (EI)
Chenn-Jung Huang, You-Jia Chen, Heng-Ming Chen, Jui-Jiun Jian, Sheng-Chieh Tseng, Yi-Ju Yang, Po-An Hsu: Intelligent feature extraction and classification of anuran vocalizations. Appl. Soft Comput. 19: 1-7 (2014)
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Han-Wen Tsai, Jui-Jiun Jian, Ai-Lin Cheng, Jia-Jian Liao: Application of cellular automata and type-2 fuzzy logic to dynamic vehicle path planning. Appl. Soft Comput. 19: 333-342 (2014)
C.N. Yang , C.C. Wu, and D. Wang, “A Discussion on the Relationship between Probabilistic Visual Cryptography and Random Grid,” accepted and to be published at Information Sciences, DOI: 10.1016/j.ins.2014.03.033.[SCI 5-year IF: 3.676].
C.N. Yang and Y.Y. Yang, “New Extended Visual Cryptography Schemes with Clearer Shadow Images,” Information Sciences, Vol. 271, pp. 246-263, July, 2014. [SCI 5-year IF: 3.676].
C.N. Yang, Z.Y. Lin, and S.L. Peng, “Reducing Code Length of Second-Order Spectral-Null Code,” IEEE Transactions on Computers, published online, Feb., 2014, DOI: 10.1109/TC.2013.231. [SCI 5-year IF: 1.726].
C. Kim, D. Shin, Dongil Shin, R. Tso, and C.N. Yang, “A secret sharing scheme for EBTC using steganography,” Journal of Intelligent Manufacturing, Vol. 25, Issue 2, pp 241-249, April, 2014 [SCI 5-year IF: 2.162].
C.N. Yang and D. Wang, “Property Analysis of XOR Based Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 2, pp. 189-197, Feb., 2014. [SCI 5-year IF: 2.556]
M.T. Yang & Y. Chiu. 2014. Note-Taking for 3D Curricular Contents using Markerless Augmented Reality, Interacting with Computers, accepted in 2014. (SCI & SSCI)
M.T. Yang & W. Liao. 2014. Computer-Assisted Culture Learning in an Online Augmented Reality Environment based on Free-Hand Gesture, IEEE Transactions on Learning Technologies, accepted in 2014. (SCI & SSCI)
Shi-Jim Yen*, Cheng-Wei Chou, Jr-Chang Chen, I-Chen Wu, and Kuo-Yuan Kao, “Design and Implementation of Chinese Dark Chess Programs,” IEEE Transactions on Computational Intelligence and AI in Games( IEEE TCIAIG ), revision.
Chang-Shing Lee*, Mei-Hui Wang, Meng-Jhen Wu, Olivier Teytaud, Shi-Jim Yen, “T2FS-based Adaptive Linguistic Assessment System for Semantic Analysis and Human Performance Evaluation on Game of Go,” IEEE Transaction on Fuzzy Systems (IEEE TFS), accepted.
Shi-Jim Yen, Shih-Yuan Chiu, and Sheng-Ta Hsieh*, “Solving the Flexible Job Shop Problem using Multi-Objective Opeimizer with Solution Characteristic Extraction,” Applied Soft Computing, revision.
Shi-Jim Yen, Shih-Yuan Chiu and Sheng-Ta Hsieh*, “Adaptive Search Range and Multi-Mutation Strategies for Differential Evolution,” Journal of Information Science and Engineering, accepted.
Chun-Liang Lu, Shih-Yuan Chiu, Shi-Jim Yen, Hsiang-Chun Cheng, “Solving the Flexible Job-Shop Scheduling Problem Based on Multi-Objective PSO with Pareto Diversity Search,” International Journal of Intelligent Information Processing (ISSN: 2093-1964), accepted.
Cheng-Wei Chou, Ping-Chiang Chou, Jean-Joseph Christophe, Adrien Couetoux, Pierre De Freminville, Nicolas Galichet, Chang-Shing Lee, Jia-Lin Liu, David Lupien Saint-Pierre, Michele Sebag, Olivier Teytaud, Mei-Hui Wang, Li-Wen Wu and Shi-Jim Yen, “Strategic Choices in Optimization,” Journal of Information Science and Engineering, accepted.
Shou-Chih Lo, Nai-Wun Luo, Jhih-Siao Gao, Chih-Cheng Tseng: Quota-Based Multicast Routing in Delay-Tolerant Networks. Wireless Personal Communications 74(4): 1329-1344 (2014)
Shou-Chih Lo, Shan-Jung Lin: Collaborative data transmission in vehicular ad-hoc networks. ICOIN 2014: 18-22
She-I Chang, David C. Yen, I-Cheng Chang, Derek Jan: Internal control framework for a compliant ERP system. Information & Management 51(2): 187-205 (2014)
I-Cheng Chang, Chuang-Chun Liu, Kuanchin Chen: The effects of hedonic/utilitarian expectations and social influence on continuance intention to play online games. Internet Research 24(1) (2014)
Min-Xiou Chen, Bing-Yang Lin: Location service and session mobility for streaming media applications in home networks. Computer Standards & Interfaces 36(2): 368-379 (2014)
2013 paper
Hsin-Chou Chi, Hsi-Che Tseng, Chia-Wei Jeng, “Reconfigurable VLSI Digital Filters for Tolerating 2 Multiple Timing Errors,” Proc. IEEE Global Conference on Consumer Electronics, Sept. 2013, Tokyo.
Hsin-Chou Chi, Hsi-Che Tseng, Yih-Kai Wang, “Design of VLSI Digital Filters for Tolerating Transient Timing Errors,” Proc. International Conference on Computer, Networks and Communication Engineering, Beijing, May 2013.
Guanling Lee, Yi-Chun Chen and Kuo-Che Hung, “PTree: Mining Sequential Patterns Efficiently in Multiple Data Streams Environment”, Journal of Information Science and Engineering, Vol. 29 No. 6, pp. 1151-1169, November 2013
S.-L. Peng* and Y.-W. Tsay, Adjusting protein graphs based on graph entropy, BMC Bioinformatics 2014, 15 (Suppl 15):S6. (SCI) (A partial result appears in “Assessment of protein-graph remodeling via conformational graph entropy, ICIC 2013, Communications in Computer and Information Science 375 (2013) 43-48.”)
Y.-C. Chen, G. Lee*, S.-L. Peng, I.-J. Wang, Supporting Content-based Music Retrieval in Structured Peer-to-peer Overlays, to appear in Journal of Internet Technology. (SCI) (A preliminary version appears in Proceedings of the 26th IPPR Conference on Computer Vision, Graphics, and Image Processing, August 18-20, 2013.)
R.-Y. Chang, S.-L. Peng*, G. Lee, C.-J. Chang, Comparing group characteristics to explain community structures in social media networks, to appear in Journal of Internet Technology. (SCI) (A preliminary version appears in HumanCom 2013, Lecture Notes in Electrical Engineering 260 (2013) 143-148.)
Shinfeng D. Lin, Yuan-Ming Liu and Yu-Ruei Jhu, A Robust Image Descriptor for Human Detection Based on HoG and Weber’s Law, to appear in International Journal of Innovative Computing, Information and Control, Vol. 9, Issue 10, October 2013, EI.
Chih-Shan Liao, Jin-Ming Shih, Ruay-Shiung Chang: Simplifying MapReduce data processing. IJCSE 8(3): 219-226 (2013)
Ruay-Shiung Chang, Chih-Shan Liao, Chuan-Yu Liu: Choosing Clouds for an Enterprise: Modeling and Evaluation. IJEEI 4(2): 38-53 (2013)
Chia-Ming Wu, Siang-Sheng Cheng, Ruay-Shiung Chang: A data filtering strategy using cluster architecture in radio frequency identification system. IJRFITA 4(2): 149-161 (2013)
Chia-Ming Wu, Ruay-Shiung Chang, Pu-I. Lee, Jei-Hsiang Yen: An innovative scheme for increasing connectivity and life of ZigBee networks. The Journal of Supercomputing 65(1): 136-153 (2013)
Yun-Sheng Yen, Ruay-Shiung Chang, Chuan-Yung Wu: A seamless handoff scheme for IEEE 802.11 wireless networks. Wireless Communications and Mobile Computing 13(2): 157-169 (2013)
Ruay-Shiung Chang, Jerry Gao, Volker Gruhn, Jingsha He, George Roussos, Wei-Tek Tsai: Mobile Cloud Computing Research – Issues, Challenges and Needs. SOSE 2013: 442-453
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Ai-Lin Cheng, Jui-Jiun Jian, Han-Wen Tsai, Jia-Jian Liao: An adaptive multimedia streaming dissemination system for vehicular networks. Appl. Soft Comput. 13(12): 4508-4518 (2013)
Chenn-Jung Huang, Yu-Wu Wang, Heng-Ming Chen, Ai-Lin Cheng, Jui-Jiun Jian, Han-Wen Tsai, Jia-Jian Liao: An adaptive multimedia streaming dissemination system for vehicular networks. Appl. Soft Comput. 13(12): 4508-4518 (2013)
Chao-Yi Chen, Heng-Ming Chen, Jui-Jiun Jian, Chenn-Jung Huang, Shun-Chih Chang, Yu-Wu Wang, Jhe-Hao Tseng: Applications of Data Mining to an Asynchronous Argumentation Based Learning Assistance Platform. CyberC 2013: 105-108.
D. Wang, T. Song, L. Dong, and C.N. Yang, “Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing,” IEEE Transactions on Information Forensics & Security, Vol. 8, No. 12, pp. 2059-2072, Dec., 2013. [SCI 5-year IF: 2.259].
P. Li, C.N. Yang, Q. Kong, Y. Ma, and Z. Liu, “Sharing more information in gray visual cryptography scheme,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 8, pp. 1380-1393, Nov., 2013.[SCI 5-year IF: 1.430]
P. Li, C.N. Yang, C.C. Wu, Q. Kong, and Y. Ma, “Essential Secret Image Sharing Scheme with Different Importance of Shadows,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 7, pp. 1106–1114, Oct., 2013. [SCI 5-year IF: 1.430].
C. Kim and C.N. Yang, “Watermark with DSA Signature Using Predictive Coding,” Multimedia Tools and Applications, published online, DOI: 10.1007/s11042-013-1667-6, Aug., 2013. [SCI 5-year IF: 0.932].
C.N. Yang, and Chih-Cheng Wu, “MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges,” Mathematical and Computer Modelling, Vol. 58, pp. 96-107, July, 2013. [SCI 5-year IF: 1.364].
C.N. Yang, P.W. Chen, H.W. Shih, and C. Kim, “Aspect Ratio Invariant Visual Cryptography by Image Filtering and Resizing,” Personal and Ubiquitous Computing, Vol. 17, Issue 5, pp. 843-850, June, 2013. [SCI 5-year IF: 1.169]
H.C. Lin, C.N. Yang, C.S. Laih, and H.T. Lin,” Natural language letter based visual cryptography scheme,” Journal of Visual Communication and Image Representation, Vol. 24, Issue 3, pp. 318-331, April, 2013. [SCI 5-year IF: 1.430].
C.N. Yang and T.H. Chung, “Cryptanalysis of Chen et al.’s multi-secret visual cryptography scheme,” The Imaging Science Journal, Vol. 61, No. 3, pp. 334-340, March 2013. [SCI 5-year IF: 0.403].
C. Kim, Y. Choi, H. Kim, D. Shin, D. Shin, and C.N. Yang, “Reversible Data Hiding for Halftone Images Using Histogram Modification,” Information-An International Interdisciplinary Journal, Vol.16, No.3(A), pp.1861-1872, March, 2013. [SCI IF: 0.269]
P. Trung Huy, N. Thanh, C. Kim, and C.N. Yang, “Data-Hiding for Halftone Images Using an Improved CPT scheme,” KSII Transactions on Internet and Information Systems, Vol.7, Issue 7, pp. 405-424, Feb., 2013. [SCI 5-year IF: 0.605].
T. Guo, F. Liu, C. Wu, C.N. Yang, and W. Wang,“Threshold Secret Image Sharing,” LNCS 8233, pp. 404-412, ICICS 2013 (The 15th International Conference on Information and Communications Security), Beijing, China, Nov., 2013
C.N. Yang and Y.C. Lin, “Cheating Immune Block-based Progressive Visual Cryptography,” IWDW 2013 (12-th International Workshop on Digital-forensics and Watermarking), Auckland, New Zealand, Oct., 2013.
X.F. Xu, D. Wang, S.D. Li, and C.N. Yang, “An anti-cheating block secret sharing scheme based-on cyclic codes,” The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2013), pp. 369-372, Beijing, China, Oct., 2013.
C.N. Yang and J.B. Lai, “Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing,” International Symposium on Biometrics and Security Technologies (ISBAST’13), pp. 259-266, Chengdu, China, July, 2013.
P.T. Huy, C. Kim, N. T. Anh, L.Q. Hoa, and C.N. Yang, “Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules,” LNCS 7861, pp 649-658, GPC 2013, (8th International Conference, 2013 Grid and Pervasive Computing 2013 and Colocated Workshops), Seoul, Korea, May, 2013.
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, Pao-Lien Lai: A lower bound on the number of Hamiltonian cycles through a prescribed edge in a crossed cube. Applied Mathematics and Computation 219(19): 9885-9892 (2013)
Chang-Hsiung Tsai: A Quick Pessimistic Diagnosis Algorithm for Hypercube-Like Multiprocessor Systems under the PMC Model. IEEE Trans. Computers 62(2): 259-267 (2013)
Chang-Hsiung Tsai, Jheng-Cheng Chen: Fault isolation and identification in general biswapped networks under the PMC diagnostic model. Theor. Comput. Sci. 501: 62-71 (2013)
Pao-Lien Lai, Ming-Yi Chiu, Chang-Hsiung Tsai: Three Round Adaptive Diagnosis in Hierarchical Multiprocessor Systems. IEEE Transactions on Reliability 62(3): 608-617 (2013)
Chun-Yen Huang, Wan-Ting Jheng, Wen-Kai Tai, Chin-Chen Chang, Der-Lor Way: Procedural grape bunch modeling. Computers & Graphics 37(4): 225-237 (2013)
Si-Yuan Wang, Cong-Kai Lin, Wen-Kai Tai: Compressing 3D Trees With Rendering Efficiency Based on Differential Data. IEEE Transactions on Multimedia 15(2): 304-315 (2013)
Chun-Yen Huang, Wen-Kai Tai: Ting tools: interactive and procedural modeling of Chinese ting. The Visual Computer 29(12): 1303-1318 (2013)
Chin-Chen Chang, Bing-Ruei Wu, Hao-Jen Hsu, Je-Wei Liang, Yuan-Ching Peng, Wen-Kai Tai: Texture Synthesis Approach Using Cooperative Features. CGIV 2013: 50-51
Charlie Irawan Tan, Hung-Wei Hsu, Wen-Kai Tai, Chin-Chen Chang, Der-Lor Way: A Data-Driven Path Synthesis Framework for Racing Games. ICIG 2013: 673-684
Hsin-Chou Chi, Chia-Ming Wu, and Sheng-Chin Hsu, “Efficient IP Routing Lookups for High-Performance Routers,” Journal of Internet Technology, Mar. 2013.
M.T. Yang, & M. Chuang. 2013. Fall Risk Assessment and Early-Warning for Toddler Behaviors at Home, Sensors, 13(12), 16985-17005. (SCI)
M.T. Yang, R. Jhang, & J. Hou. 2013. Traffic Flow Estimation and Vehicle Type Classification using Vision-based Spatial-Temporal Profile Analysis, IET Computer Vision, 7(5), 394-404. (SCI)
M.T. Yang & Z. You. 2013. Vision-based Hypothesis Integration for Inner and Outer Lip Contour Detection, International Journal of Innovative Computing Information and Control, 9(8), 3159-3172. (SCI)
Y. Chiu, & M.T. Yang, 2013. 3D Note-Taking using Markerless Augmented Reality in e-Learning, Computer Vision, Graphics, and Image Processing, August, Taiwan.
M.T. Yang, W. Liao, & Y. Shih, 2013. VECAR: Virtual English Classroom using Markerless Augmented Reality with Intuitive Gesture Interaction, International Conference on Advanced Learning Technologies, July, Beijing, China.
Y, Shih, M.T. Yang, & F. Yang, 2013. Street-View Panorama for Cultural Learning: Implementation and Curriculum Design, International Conference on Advanced Learning Technologies, July, Beijing, China.
Sheng-Ta Hsieh, Shih-Yuan Chiu and Shi-Jim Yen, “An Improved Multi-Objective Genetic Algorithm for Solving Multi-objective Problems,” Applied Mathematics & Information Sciences, Vol. 7, No. 5, pp. 1933-1941 (2013).
Kuo-Yuan Kao, I-Chen Wu*, Shi-Jim Yen, and Yi-Chang Shan, “Incentive Learning in Monte Carlo Tree Search,” IEEE Transactions on Computational Intelligence and AI in Games( IEEE TCIAIG ), VOL. 5, NO. 4, December 2013, pp. 346-352.
Tai-Yen Wu, Ching-Nung Lin, Shi-Jim Yen, and Jr-Chang Chen, “A Minesweeper Solver,” the 18th Game Programming Workshop (GPW-2013), November 8-110, 2013, Hakone Seminar House, Kanagawa, Japan. 2013 GPW Proceeding pp. 15-18.
Shi-Jim Yen, Chen-Shin Lee, Jr-Chang Chen, Tai-Ning Yang, Shun-Chin Hsu, “Suffix Tree Index Structure on Go Game Record,” The 27th Annual Conference of the Japanese Society for Artificial Intelligence, June 4-7, Toyoma, Japan, 2013.
Yu-Jie Ho, Shun-Chin Hsu, Shi-Jim Yen, “An Efficient Index Structure for Go,” The 27th Annual Conference of the Japanese Society for Artificial Intelligence, June 4-7, Toyoma, Japan, 2013.
C. S. Lee, M. J. Wu, M. H. Wang, O. Teytaud, H. M. Wang, and S. J. Yen, “T2FML-based Adaptive Assessment System for Computer Game of Go,” 2013 IEEE International Conference on Fuzzy System (FUZZ-IEEE 2013), Hyderabad, India, Jul. 7-10, 2013.
Sheng-Lung Peng, Yu-Wei Tsay: Assessment of Protein-Graph Remodeling via Conformational Graph Entropy. ICIC (3) 2013: 43-48
Shou-Chih Lo, Jhih-Siao Gao, Chih-Cheng Tseng: A Water-Wave Broadcast Scheme for Emergency Messages in VANET. Wireless Personal Communications 71(1): 217-241 (2013)
Ti-Hsin Yu, Shou-Chih Lo: A Remote Control and Media Sharing System Based on DLNA/UPnP Technology for Smart Home. MUE 2013: 329-335
“H.-Y. Kao*, T.-K. Chang & Y.-C. Chang (2013), “Classification of hospital web security efficiency using data envelopment analysis and support vector machine”, Mathematical Problems in Engineering, Volume 2013 (November 1, 2013), Article ID 542314, ”
“H.-Y. Kao*, C.-H. Huang & J.-Y. Chen (2013), “Classification using DEA and SVM approaches: the empirical study of higher education in Taiwan”, Information-An International Interdisciplinary Journal, Vol. 16, No 11, 7801-7810 (NSC 99-2410-H-259”
She-I Chang, I-Cheng Chang, Tawei Wang: Information systems integration after merger and acquisition. Industrial Management and Data Systems 114(1) (2013)
I-Cheng Chang, She-I Chang, Chuang-Chun Liu: Assessment Mechanism of Internal Control for Information Technology Governance. PACIS 2013: 117
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, Pao-Lien Lai: A lower bound on the number of Hamiltonian cycles through a prescribed edge in a crossed cube. Applied Mathematics and Computation 219(19): 9885-9892 (2013)
Pao-Lien Lai: Adaptive system-level diagnosis for hypercube multiprocessors using a comparison model. Inf. Sci. 252: 118-131 (2013)
Pao-Lien Lai, Ming-Yi Chiu, Chang-Hsiung Tsai: Three Round Adaptive Diagnosis in Hierarchical Multiprocessor Systems. IEEE Transactions on Reliability 62(3): 608-617 (2013)
Pao-Lien Lai, Kao-Lin Hu, Hong-Chun Hsu: Cycles Embedding of Twisted Cubes. ICPP 2013: 1077-1081
Min-Xiou Chen, Kuo-Le Mei: Mechanism of Automatic Deployment for Virtual Network Environment. ICPP 2013: 1061-1066
Tao-Ku Chang: A Secure Cloud-Based Payment Model for M-Commerce. ICPP 2013: 1082-1086
Chih-Hung Lai, Hwei-Ling Gwung: The effect of gender and Internet usage on physical and cyber interpersonal relationships. Computers & Education 69: 303-309 (2013)
Ying-Tien Wu, Huei-Tse Hou, Fu-Kwun Hwang, Ming-Hsien Lee, Chih-Hung Lai, Guo-Li Chiou, Silvia Wen-Yu Lee, Yu-Chen Hsu, Jyh-Chong Liang, Nian-Shing Chen, Chin-Chung Tsai: A Review of Intervention Studies On Technology-assisted Instruction From 2005-2010. Educational Technology & Society 16(3): 191-203 (2013)
2012 paper
Shi-Jim Yen*, Cheng-Wei Chou, Jr-Chang Chen, I-Chen Wu, and Kuo-Yuan Kao, “Design and Implementation of Chinese Dark Chess Programs,” IEEE Transactions on Computational Intelligence and AI in Games( IEEE TCIAIG ), vol. 7, no. 1, march 2015 ( SCI, 2012 IF = 1.694,16/105)
Hsin-Chou Chi, Jr-Fen Ferng, and Yu-Chen Hsieh, “Area Utilization Based Mapping for Network-on-Chip Architectures with Over-Sized IP Cores,” Proc. IEEE International Conference on Embedded Software and Systems, Liverpool, June 2012.
Van Bang Le* and S.-L. Peng,, to appear in Theoretical Computer Science. (SCI) (A preliminary version appears in Proceedings of ICS 2012, 7-14, Springer.)
Shinfeng D. Lin*, Bo-Feng Liu and Jia-Hong Lin, Combining Speeded Up Roust Features with Principal Component Analysis in Face Recognition System, accepted by International Journal of Innovative Computing, Information and Control, April 2012, SCI.
Shou-Hung Wang and Ruay-Shiung Chang, “Deploying Mobile Nodes for Maximal Energy Matching in WSNs,” Wireless Communications and Mobile Computing, Volume: 12, Issue: 4, Pages: 325-332, MAR 2012. (IF=0.810, cited=0)
Ruay-Shiung Chang and Shou-Hung Wang, “Deploying Relay Nodes in WSNs by Considering Uneven Energy Consumption,” Journal of Internet Technology. Vol. 13, No. 2, pp. 273-280, MAR 2012. (IF=0.448, cited=0)
Ruay-Shiung Chang, Shou-Hung Wang, and Wei-Pang Yang, “Addressing Wormhole Attacks on the Internet,” Journal of Internet Technology. Vol. 13, No. 2, pp. 245-256,MAR 2012.
Huang, C.J., Chen, H.M., Lin, C.F., Liao, J.J., Hu, K.W., Yang, D.X., Chen, C.H., and Chuang, Y.T., (2012) “A Scalable Routing for Delay-Tolerant Heterogeneous Networks”, International Journal of Innovative Computing, Information and Control. 8(1A) 49-60 (SCI, EI) IF: 1.667. (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
Huang, C.J., Chang, T.K., Shen, H.Y., Li, C.Y., Luo, Y.C., and Hu, K.W., (2012) “Application of Type-2 Fuzzy Logic to Rule-Based Intrusion Alert Correction Detection”, International Journal of Innovative Computing, Information and Control. 8(4) 2865-2874 (SCI, EI) IF:2.791. (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
P. Li, P.J. Ma, X.H. Su, and C.N. Yang, “Improvements of a Two-in-one Image Secret Sharing Scheme based on Gray Mixing Model,” Journal of Visual Communication and Image Representation, Vol. 23, Issue 3, pp. 441-453, Apr, 2012. [SCI 5-year IF: 1.382].
C.N. Yang, P.W. Chen, H.W. Shih, and C. Kim, “Aspect Ration Invariant Visual Cryptography by Image Filtering and Resizing,” Personal and Ubiquitous Computing, published online, DOI 10.1007/s00779-012-0535-0, Apr., 2012. [SCI 5-year IF: 1.087].
C. Kim, D. Shin, Dongil Shin, R. Tso, and C.N.Yang, “A secret sharing scheme for EBTC using steganography,” Journal of Intelligent Manufacturing, published online, DOI: 10.1007/s10845-012-0660-7, May, 2012 [SCI 5-year IF: 1.414].
C.N. Yang, H.W. Shih, C.C. Wu, and L. Harn, “k out of n Region Incrementing Scheme in Visual Cryptography,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No. 6, pp. 779-810, May, 2012. [SCI 5-year IF: 2.489]
Y.X. Liu, L. Harn, C.N. Yang, and Y.Q. Zhang, “Efficient (n, t, n) Secret Sharing Schemes,” Journal of Systems & Software, Vol. 85, Issue 6, pp. 11325-1332, Jun., 2012. [SCI 5-year IF: 1.117].
C.N. Yang, and Chih-Cheng Wu, “MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges,” Mathematical and Computer Modelling, published online, DOI: 10.1016/j.mcm.2012.07.010, July, 2012 [SCI 5-year IF: 1.351
C.N. Yang, L.J. Hu and J.B. Lai, “Query Tree Algorithm for RFID Tag with Binary-Coded Decimal EPC,” IEEE Communications Letters, Vol. 16, No. 10, pp. 1616-1619, Oct., 2012. [SCI 5-year IF: 1.234].].
C.N. Yang, C.C. Wu, Y.C. Lin, and C. Kim, “Enhanced Matrix-Based Secret Image Sharing Scheme,” IEEE Signal Processing Letters, Vol. 19, Issue 12, pp. 789-792, Dec., 2012. [SCI 5-year IF: 1.430].
Tseng-Kui Li, Chang-Hsiung Tsai*, Hong-chun Hsu, “A fast fault identification algorithm for bijective connection graphs using the PMC model,” Information Sciences, vol. 187, pp. 291-297, 2012, Supported by NSC-100-2115-M-259-008,. SCI, EI. [IF:3.005] [cited:0]
Charlie Irawan Tan+ and Wen Kai Tai*, ”Characteristics Preserving Racers Animation: A Data-driven Race Path Synthesis in Formation Space,” Computer Animation and Virtual Worlds, to be appeared in 2012 (SCI/IF= 0.629)( COMPUTER SCIENCE, SOFTWARE ENGINEERING 77/99)
Cong-Kai Lin+ and Wen-Kai Tai*, “Automatic Upright Orientation and Good View Recognition for 3D Man-made Models,” Pattern Recognition, Vol. 45, No. 4, pp.1524-1530, April 2012 DOI: 10.1016/j.patcog.2011.10.022 (SCI/IF 2.682, 5Y-IF= 3.480 ) (COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE15/108)(ENGINEERING, ELECTRICAL & ELECTRONIC 18/247)
Tu S.C., Tai W.K., “A high-capacity data-hiding approach for polygonal meshes using maximum expected level tree”, COMPUTERS & GRAPHICS-UK,OCT 2012
Su Y.L., Chang C.C., Shih Z.C., Tai W.K.,” Vector-field-based deformations for threedimensional texture synthesis”, IET IMAGE PROCESSING, JUN 2012
Ming-Che Ho+, Cheng-Chin Chiang* and Ying-Yu Su+, “Object Tracking by Exploiting Adaptive Region-wise Linear Subspace Representations and Adaptive Templates in an Iterative Particle Filter,” Pattern Recognition Letter, online version available on http://dx.doi.org/10.1016/j.patrec.2011.11.019, Dec. 2011. (SCI/IF= 1.235, 5Y-IF= 1.897)
Lee G.L., Zhu Y.T., Chen Y.C., “Summarizing Association Patterns Efficiently by Using PI Tree in a Data Stream Environment”, JOURNAL OF INTERNET TECHNOLOGY, MAR 2012
Lee G.L., Chen Y.C., “Protecting sensitive knowledge in association patterns mining”, WILEY INTERDISCIPLINARY REVIEWSDATA MINING AND KNOWLEDGE DISCOVE, JAN-FEB 2012
Lee G.L., Peng S.L., Chen Y.C., Huang J.S., “An efficient search mechanism for supporting partial filename queries in structured peer-topeer overlay”, PEER-TOPEER NETWORKING AND APPLICATIONS, DCE 2012
Kuo-Yuan Kao, I-Chen Wu, Yi-Chang Shan, and Shi-Jim Yen, “Selection Search for Mean and Temperature of Multi-Branch Combinatorial Games,” ICGA Journal, vol. 35, no. 2, 2012.
Ching-Nung Lin and Shi-Jim Yen, “The Computer Go Tournaments in TCGA 2012,” to appear in ICGA Journal.
Ming-Cheng Cheng, Jr-Chang Chen, Tsan-Cheng Su, and Shi-Jim Yen, “Shiga Wins Chinese Chess Tournament,” to appear in ICGA Journal vol. 35, no.1, pp. 53-54, 2012.
Cheng-Wei Chou, Jr-Chang Chen, Hideki Kato, and Shi-Jim Yen, “The 5th GPW Cup 9×9 and 13×13 Computer Go Tournaments,” ICGA Journal vol. 35, no.1, pp. 59-60, 2012.
Shi-Jim Yen*, Jung-Kuei Yang, Kuo-Yuan Kao, and Tai-Ning Yang, “Bitboard Knowledge Based System and Elegant Search Architectures for Connect6,” Knowledge-Based Systems, 0950-7051, vol. 34, 2012, pp. 43-54.
Chang-Shing Lee, Olivier Teytaud, Mei-Hui Wang, and Shi-Jim Yen, “Computational Intelligence Meets Game of Go @ IEEE WCCI 2012,” IEEE Computational Intelligence Magazine (IEEE CIM), to appear at NOV 2012.
Vaidya B, Park JH, Arabnia HR, Pedrycz W, “Bio-inspired computing for hybrid information technology”, SOFT COMPUTING, MAR 2012
Chang RS, Kim TH, Peng SL, “Security-Enriched Urban Computing and Smart Grid”, JOURNAL OF INTERNET TECHNOLOGY, MAR 2012
S. C. Lo, “Efficient Content-Based Publish/Subscribe Systems over Peer-to-Peer Networks,” Journal of Internet Technology, Vol. 13, No. 5, pp. 713-724, September 2012. (SCI)
S. C. Lo, J. S. Gao, and C. C. Tseng, “A Water-Wave Broadcast Scheme for Emergency Messages in VANET,” Wireless Personal Communications, 2012, (DOI)10.1007/s11277-012-0812-2.
C.-L. Huang, H.-Y. Kao*, C.-H. Huang, C.-Y. Hsu (2012), “Evaluation of e-learning systems in cloud environments using DEA with fuzzy data set”, IEEE Multidisciplinary Engineering Education Magazine, Vol. 7, No 2, 33-36.
Pao-Lien Lai*, “A systematic algorithm for identifying faults on hypercube-like networks under the comparison model,” IEEE Transactions on Reliability, Mar.2012.
Lai P.L., “ Adaptive diagnosis for torus systems under the comparison model”, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012
Chung Yung, Shao-Zong Chen, Shun-Cheng Wu, Jen-Tsung Hsieh, and Kang-Jhih Peng, “A Web-based Model of Distributed Software Development Management for Cloud Computing
Chen M.X., Sung F.H., Lin B.Y., “SERVICE DISCOVERY PROTOCOL FOR NETWORK MOBILITY ENVIRONMENT”, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, AUG 2012
2011paper
Shinfeng D. Lin*, Jia-Hong Lin and Chun-Yen Chen, A ROI-based Semi-Fragile Watermarking for Image Tamper Detection and Recovery, International Journal of Innovative Computing, Information and Control, Volume 7, Number 12, pp. 6875-6888, December 2011, SCI.
Shinfeng D. Lin*, Chih-Yao Chuang and Mei-Juan Chen, A CAVLC-BASED VIDEO WATERMARKING SCHEME FOR H.264/AVC CODEC, International Journal of Innovative Computing, Information and Control, Volume 7, Number 11, pp. 6359-6367, November 2011, SCI.
Chih-Cheng Wang, Chih-Yao Chuang and *Shinfeng D. Lin, An IntegratedTemporal Error Concealment for H.264/AVC Based on Spatial Evaluation Criteria, Journal of Visual Communication and Image Representation, Volume 22, Issue 6, pp. 522-528, August 2011, SCI.
Shinfeng D. Lin*, Chih-Yao Chuang, Hsiang-Cheng Meng and Yu-Lung Su, An Error Resilient Technique Using Reversible Data Embedding in H.264/AVC, International Journal of Innovative Computing, Information and Control, Volume 7, Number 5(A), pp. 2283-3390, May 2011, SCI.
Shinfeng D. Lin, Jia-Hong Lin and Cheng-Chin Chiang, Using Gradient Features from Scale-Invariant Keypoints on Face Recognition, International Journal of Innovative Computing, Information and Control, Volume 7, Number 4, pp. 1639-1649, April 2011, IF(2009:2.932, 2008:2.791), SCI. (2008 A 級期刊)
Shinfeng D. Lin and Zong-Lin Yang, Hierarchical Fragile Watermarking Scheme for Image Authentication, Intelligent Automation and Soft Computing, Vol. 17, No. 2, pp. 245-255, 2011, SCI. (2008 Impact Factor: 0.224)
Shinfeng Lin, Chih-Cheng Wang, Chih-Yao Chuang, and Kuan-Ru Fu, A Hybrid Error Concealment Technique for H.264/AVC Based on Boundary Distortion Estimation, INTECH-“Recent Advances on Video Coding “, ISBN 978-953-307-181-7, Chapter 11, P.243-P.258, July 2011.
Shinfeng D. Lin* and Shih-Chieh Shie, Digital Steganographic Schemes based on Image Vector Quantization, Accepted by Multimedia Security and Steganography, September 22, 2011.
Shinfeng D. Lin and Tszan Wu, An Integrated Technique for Splicing and Copy-move Forgery Image Detection, 2011 4th International Congress on Image on Image and Signal Processing(CISP’11), Shanghai, P.R.O.C., October 15-17, 2011.
Shinfeng D. Lin, Kuan-Ru Fu and Chih-Yao Chuang, An Adaptive Frame-based Error Concealment Technique Based on Motion Variation for H.264/AVC, the 24th IPPR Conference on Computer Vision, Graphics, and Image Processing (CVGIP2011), Chiayi, TAIWAN, R.O.C., Aug. 21-23, 2011.
Shinfeng D. Lin, Chih-Cheng Wang, Chih-Yao Chuang and Kuan-Ru Fu, An Adaptive Error Concealment Technique for H.264/AVC, 2011 International Symposium on Intelligent Informatics, Qingdao, P.R.O.C., May 1-3, 2011.
Wu, Shiow-yang and Kuo-Chang Lin. Structured Design, Consistency Analysisand Failure Reasoning of Business Workflows with Activity-Control Templates and Causal Ordering. Expert Systems with Applications, 38(7):8000-8013 , July 2011. (SCI, 2011 IF=1.926)
Wu, Shiow-yang and Cheng-en He. QoS-Aware Dynamic Adaptation for Cooperative Media Streaming in Mobile Environments. IEEE Transactions on Parallel and Distributed Systems, 22(3):439-450, Mar 2011. (SCI, 2011 IF=1.575)
Seiven Leu and Ruay-Shiung Chang, “A Simple Algorithm for Solving Broadcast Storm in MANET,” IET Communications, Volume: 5, Issue: 16, Pages: 2356-2363, NOV 4 2011.(IF=0.963, cited=0)
Ruay-Shiung Chang, Taihoon Kim, C.L. Wang, and S.L. Peng, ” Special Issue on Radio Frequency Identification (RFID),” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 8 Issue: 4, Pages: 203-204, 2011. (IF=0.435, cited=0)
Lee Yun-Han, Leu Seiven, and Chang Ruay-Shiung, “Improving job scheduling algorithms in a grid environment, Future Generation Computer Systems, Vol. 27 Issue:8, Pages: 991-998, Oct. 2011. (IF=2.371, cited=1)
Chang Ruay-Shiung and Chao Han-Chieh, “Special Section: Grid and pervasive computing,” Future Generation Computer Systems, Vol. 27 Issue: 6, Pages: 820-822, Jun. 2011. (IF=2.371, cited=0)
Yun-Sheng Yen, Han-Chieh Chao, Ruay-Shiung Chang, and Athanasios Vasilakos, “Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs,” Mathematical and Computer Modeling, 53 (2011) 2238–2250, Jun. 2011. (IF=1.066, cited=0)
Chang Ruay-Shiung and Kim Tai-hoon, “Special Section: Future Generation Information Technology,” Future Generation Computer Systems, Vol. 27 Issue: 4, Pages: 370-371, Apr. 2011. (IF=2.371, cited=0)
Chang Ruay-Shiung and Wu Chung-Hsien, “Special Issue: Future generation information technology Foreword,” Journal of the Chinese Institute of Engineers, Vol. 34 Issue: 2, Pages: 169-169, Mar. 2011. (IF=0.225, cited=0)
Ruay-Shiung Chang, Chun-Fu Lin, and Jen-Jom Chen, ” Selecting the Most Fitting Resource for Task Execution,” Future Generation Computer Systems, Volume: 27, Issue: 2, Pages: 227-231, Feb. 2011. (IF=2.371, cited=1)
Chia-Ming Wu, Ruay-Shiung Chang, and Chang-Chih Chen, “A Complex Event Processing Method Based on Pre-Grouping for Radio Frequency Identification Data Streams,” Journal of Internet Technology, Volume: 12 Issue: 1, Pages: 95-102, Jan. 2011. (IF=0.448, cited=0)
Chang Ruay-Shiung and Chao Han-Chieh, ” Guest Editorial: Special Issue on Grid and Pervasive Computing,” Journal of Internet Technology, Volume: 12 Issue: 1, Jan. 2011. (IF=0.448, cited=0)
Huang, C.J., Liao, J.J., Shen, H.Y., Aye N.N., Wang, Y.W., Chen, H.X., Yang, D.X., Luo, Y.C., and Chuang, Y.T., (2011) Using Learning Style-Based Diagnosis Tool to Enhance Correlation Learningin an Undergraduate Engineering Curriculum, Computer Applications in Engineering Education. (SCI, EI) IF:0.321. (NSC 96-2628-E-259-022-MY3 and NSC 97-2218-E-259-005)
Huang, C.J., Li, C.Y., Chen, Y.T., Lee, C.Y., Liao, J.J., Chang, C.H., Chen, I.F., Hu, K.W., Chen, H.X., and Chen, Y.J., (2011) Intelligent Resource Management Schemes for Heterogeneous Wireless Networks, International Journal of Innovative Computing, Information and Control. 7(8) 4765-4778 (SCI, EI) IF:1.667. (NSC 96-2628-E-026-001-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Huang, T.H., Chen, Y.C., Chen, H.M., Chang, S.C., (2011) Performance Evaluation of an Online Argumentation Learning Assistance Agent, Computers & Education. 57(1) 1270-1280 (SSCI, SCI, EI) IF: 2.617. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Lin, C.F., Chen, Y.T., Chen, H.M., Shen, H.Y., Chen, Y.J., Chen, I.F., Hu, K.W. and Yang, D.X., (2011) A Self-Healing Clustering Algorithm for Underwater Sensor Networks, Cluster Computing-The Journal of Networks Software Tools and Applications 14(1) (SCI, EI) IF:0.679. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Huang T.H., Lin, C.F., Li, C.Y., Chen, H.M., Chen, P.C., Liao J.J., (2011) Applications of Machine Learning Techniques to a Sensor-Network-Based Prosthesis Training System, Applied Soft Computing. 11(3) 3229-3237 (SCI, EI) IF:2.097. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Wang, Y.W., Lin, C.F., Liao, H.H., Li, C.Y., Hu, K.W., Chang, T.Y., and Shen, H.Y., (2011) A Power-Efficient Routing Protocol for Underwater Wireless Sensor Networks, Applied Soft Computing, 11(2) 2348–2355. (SCI, EI) IF: 2.097. (NSC 96-2628-E-259-022-MY3 and NSC 98-2220-E-259-003)
Huang, C.J., Lin, C.F., Li, C.Y., Lee, C.Y., Chen, H.M., Shen, H.Y., Chen, Y.J., and Chen, I.F., (2011) Service-oriented routing and clustering strategies for vehicle infotainment dissemination, International Journal of Innovative Computing, Information and Control, 7(3) 1467–1479. (SCI, EI) IF:1.667. (NSC 96-2628-E-026-001-MY3 and NSC 98-2220-E-259-003)
黃振榮,辛孟錩,薛文魁(民 100) : 車載網路上的無縫串流機制,2011創意教學與研究成果研討會(NSC99-2220-E-259-002)。
Huang, C.J., Lin, C.F., Hsu, P.A., Lee, Y.W., Chen, H.M., Lien, Y.J., Li, C.Y., Yang, Y.J., Liao, J.J., and Chen, Y.J., (2011) Application of Fast Learning Neural-Networks to Identification of Mixed Anuran Vocalizations, 2011 The 13th IEEE Joint International Computer Science and Information Technology Conference, Aug. 2011 . (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
Huang, C.J., Chen, H.M., Huang, T.H., Lin, C.F., Chen, Y.T., Lien, Y.J., Wang, Y.W., Chen, Y.J., Chen, I.F., Shen, H.Y., Huang, H.Y., (2011) Load-Balancing Routing And Clustering Strategies For Vehicle Infotainment Dissemination, 2011 IEEE International Conference on Information and Automation, Jun. 2011 . (NSC 99-2511-S-259-008-MY3 and 99-2220-E-259-002)
黃振榮,李昱緯,蔡柏彥,王宇武,陳恆鳴,曾聖傑,廖家健,沈宏彥(民 100) : 適用於車載網路之適化性無縫串流傳播系統,2011智慧型數位生活研討會。(NSC 99-2511-S-259-008-MY3and 99-2220-E-259-002)
黃振榮,連逸傑,林志昇,李哲宇,關智太,曾聖傑(民 100) : 應用股票市場技術分析及撮合機制於雲端計算之資源配置,2011 電子商務與數位生活研討會。(NSC 99-2511-S-259-008-MY3and 99-2220-E-259-002)
Shih-Chien Chou and Jin-Yuan Jhu, “Embedding Access Control Policy in Web Service PathComposition Algorithm”, JISE, vol. 27, no. 6, pp. 1839-1853, 2011. (SCI)
S. -C. Chou, “Using Partial Ordered Numbers to Control Information Flows”, Fifth InternationalConference on Secure Software Integration and Reliability Improvement (SSIRI), Korea, pp. 60-69,2011.
C.N. Yang and C.C. Wu, and F. Liu, “Construction of General (k, n) Probabilistic Visual Cryptography Scheme,” Journal of Electronic Science and Technology, Vol. 9, Issue 4, pp. 317-324, Dec., 2011.[indexed by Ei INSPEC].
C.N. Yang, C.Y. Chiu, and G.C. Wu, “Efficient Encoding/Decoding for Second-Order Spectral-Null Codes by Reducing Random Walks,” IEEE Trans. on Computers, Vol. 60, Issue 10, pp. 1503-1510, Oct., 2011. [SCI 5-year IF: 1.627].
C.N. Yang and Y.Y. Chu, “A general (k, n) scalable secret image sharing scheme with the smooth scalability,” Journal of Systems & Software, vol. 84, pp. 1726-1733, 2011. [SCI 5-year IF: 1.117].
C.N. Yang, J.Y. He, “An Effective 16-bit Random Number Aided Query Tree Algorithm for RFID Tag Anti-Collision,” IEEE Communications Letters, Vol. 15, No. 5, pp. 539-541, May, 2011. [SCI 5-year IF: 1.234]
C.N. Yang, G.C. Ye, and C. Kim, “Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization,” KSII Transactions on Internet and Information Systems, Vol. 5, Issue 2, pp. 457-476, Feb., 2011. [SCI 5-year IF: 0.355].
C.N. Yang, T.Y. Wu, L.J. Hu, P. Wang, and C.H. Lee, “Applying Dynamic Partition in IRC-Based Botnet Detection,” 2011 IEEE International Conference on Information Theory and Information Security (ICITIS 2011), Vol. II, pp. 655-660, Hangzhou, China, Nov., 2011.
F. Liu, T. Guo, C. Wu, and C.N. Yang, “Flexible Visual Cryptography Scheme Without Distortion,” LNCS 7128, pp. 211–227, IWDW 2011, (10th International Workshop on Digital-forensics and Watermarking), Atlantic City, USA, Oct., 2011.
C.N. Yang, H.W. Shih, Y.Y. Chu, and L. Harn, “New Region Incrementing Visual Cryptography Scheme,” The 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2011) in conjunction with WORLDCOMP 2011, pp. 323-329, Las Vegas, USA, July, 2011.
C.N. Yang, G.C. Wu, and C.C. Wu, “Certificate-in-Certificate: Designing A New Certificate Extension for Mobile-Commerce,” The 2011 International Conference on e-Commerce, e-Administration, e-Society, e-Education, and e-Technology (e-CASE & e-Tech 2011), pp. 554-564, Tokyo, Japan, Jan., 2011.
C.N. Yang, S.H. Lin, G.C. Huang, Y.L. Chang, H.W. Shih, and Y.C. Lin, “A Text-in-Picture Steganographic Method using Android Platform,” TANET 2011, Oct. 2011.
C.N. Yang, C.H. Wu, P.Y. Liao, and G.C. Wu, “ROI/NROI Data Hiding of Medical Images, with Application on Blood Capillary Images,” 2011 the 6th International Symposium on Healthcare Information Management (UHIMA 2011).
Book- S. Cimato and C.N. Yang, Visual Cryptography and Secret Image Sharing, Publisher: CRC Press/Taylor & Francis, ISBN: 9781439837214, Number of Pages: 501, Publication Date: August 10, 2011.
Book Chapter-C.N. Yang, C.B. Ciou, and T.S. Chen, Chapter 17: Two-Decoding-Option Image Sharing Method, in the book Visual Cryptography and Secret Image Sharing, Aug., 2011.
Chang-Hsiung Tsai*, “A quick pessimistic diagnosis algorithm for hypercube-like multiprocessor systems under the PMC model,” IEEE Trans. On Computers, http://dx.doi.org/10.1109/TC.2011.228, Supported by NSC-100-2115-M-259-008,. SCI, EI. [IF2010:2.036] [cited:0]
Tseng-Kui Li, Chia-Jui Lai, Chang-Hsiung Tsai, “A novel algorithm to embed a multidimensional torus into a locally twisted cube,” Theoretical Computer Sciences, vol. 412, pp. 2418-2424, 2011, Supported by NSC-98-2115-M-259-002-MY2,. SCI, EI. [IF:1.085] [cited:0]
Jheng-Cheng Chen, Chang-Hsiung Tsai*, “Conditional edge-fault-tolerant Hamiltonicity of dual-cubes,” Information Sciences, vol. 181, pp. 620-627, 2011, Supported by NSC-97-2115-M-259-005,. SCI, EI. [IF:3.005] [cited:3]
Pao-Lien Lai, Hong-Chun Hsu, Chang-Hsiung Tsai, “A Systematic Algorithm for Embedding Hamiltonian Cycle in Hierarchical Crossed Cubes,” CSE 2011: 358-365
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, “An Adaptive Diagnostic Algorithm for a Distributed System Modeled by Dual-cubes”, CSE 2011: 366-370
Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai, “Optimal adaptive parallel diagnosis for a distributed system modeled by dual-cubes”, FSKD 2011: 1989-1993
Wen-Kai Tai, “Chapter 8. The state-of-the-art Steganography for 3D Meshes,” Book chapter of “Steganography and Watermarking,” Nova Science Publishers, Inc., 2011/12
S. F. Siao+ , Hung-Wei Hsu+ , Wen-Kai Tai*, and Andrew Yip, ” Fractal Territory Board Game,” 2011 IEEE International Games Innovation Conference (IGIC), Chapman University, Orange, CA, Nov 2-3, 2011
Ming-Che Ho+, Cheng-Chin Chiang* and Ying-Yu Su+, “Object Tracking by Exploiting Adaptive Region-wise Linear Subspace Representations and Adaptive Templates in an Iterative Particle Filter,” Pattern Recognition Letter, online version available on http://dx.doi.org/10.1016/j.patrec.2011.11.019, Dec. 2011. (SCI/IF= 1.235, 5Y-IF= 1.897)
Cheng-Chin Chiang*, Ming-Che Ho+, Hong-Sheng Liao+ and Andi Pratama+, Wei-Cheng Shyu+, “Detecting and RecognizingTraffic Lights by Genetic Approximate Ellipse Detection and Spatial Texture Layouts,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 12, pp. 6919-6934, Dec. 2011. (SCI/IF=1.667, 5Y-IF= 1.797)
Shinfeng D. Lin*@, Jia-Hong Lin+ and Cheng-Chin Chiang, “Using Gradient Features from Scale-Invariant Keypoints on Face Recognition,” International Journal of Innovative Computing, Information and Control, Vol. 7, No. 4, pp. 1349-4198, Apr. 2011. (SCI/IF=1.667, 5Y-IF= 1.797)
Hsin-Chou Chi and Tat-Seng Chang, “Design of a Reconfigurable Pipelined Switch for Faulty On-Chip Networkss,”Proc. International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Feb. 2011.
Hsin-Chou Chi, Hsi-Che Tseng, Kun-Lin Tsai, “Design of Timing-Error-Resilient Systolic Arrays for Matrix Multiplication,”Proc. International SoC Design Conference, Jeju, Nov. 2011.
Hsin-Chou Chi, Hsi-Che Tseng, and Chih-Ling Yang, “Efficient Diagnosable Design of IEEE P1500 for Soc Testing,”Proc. IEEE International Conference on Networked Embedded Systems for Enterprise Applications, Dec. 2011.
Ming-Hung Bai and Hsin-Chou Chi, “Efficient Table-Based Routing for On-Chip Networks with Faulty Components,”Proc. Global Congress on Science and Engineering, Dubai, Dec. 2011.
S. J. Yen, J. K. Yang, “2-Stage Monte Carlo Tree Search for Connect6,” IEEE Transactions on Computational Intelligence and AI in Games, VOL. 3, NO. 2, JUNE 2011. DOI: 10.1109/TCIAIG.2011.2134097(SCI)
Cheng-Wei Chou, Shi-Jim Yen, and I-Chen Wu, “TAAI 2011 Computer Go Tournaments,” ICGA Journal, vol. 34, no.4, 2011, pp. 251-252
Shi-Jim Yen, Jung-Kuei Yang and I-Chen Wu, “2010 WORLD COMPUTER CHINESE CHESS CHAMPIONSHIP,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 45-47. (SCI)
Shi-Jim Yen, Tsan-Cheng Su and I-Chen Wu, “SHIGA Wins Chinese Chess Tournament,” ICGA Journal, vol. 34, no. 2, 2011, pp. 94–95.
Shi-Jim Yen, Cheng-Wei Chou, Chang-Shing Lee, Hassen Doghmen and Olivier Teytaud, “THE IEEE SSCI 2011 HUMAN VS. COMPUTER-GO COMPETITION,” ICGA Journal, vol. 34, no. 2, 2011, pp. 106–107.
Shi-Jim Yen, Cheng-Wei Chou and I-Chen Wu, “TAAI 2010 COMPUTER GO TOURNAMENTS,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 48-50. (SCI)
Hung-Hsuan, Lin, Der-Johng Sun, I-Chen Wu and Shi-Jim Yen, “TAAI COMPUTER GAME TOURNAMENT REPORT IN 2010,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 51-54. (SCI)
Cheng-Wei Chou, Shi-Jim Yen and Hideki Kato, “THE 4th GPW CUP 9×9 AND 13×13 COMPUTER GO TOURNAMENTS,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 43-45. (SCI)
Shi-Jim Yen, Shih-Yuan Chiu Cheng-Wei Chou and Jr-Chang Chen, “CPUZZLER WINS NONOGRAM TOURNAMENT,” ICGA Journal, vol. 34, no. 1, March 2011, pp. 34-35. (SCI)
Shi-Jim Yen, Tsan-Cheng Su and I-Chen Wu, “The TCGA 2011 Computer-Games Tournament,” ICGA Journal, vol. 34, no. 2, 2011, pp. 108–110.
Olivier Teytaud, Cheng-Wei Chou, Ping-Chiang Chou, Hassen Doghmen, Chang-Shing Lee, Tsan-Cheng Su, Fabien Teytaud, Olivier Teytaud, Hui-Min Wang, Mei-Hui Wang, Li-Wen Wu, Shi-Jim Yen, “Towards a solution of 7×7 Go with Meta-MCTS,” Advances in Computer Games 13, November 20-23, 2011, Tilburg University, The Netherlands.
Jung-Kuei Yang and Shi-Jim Yen, “Conservative Relevance Zone Search in Connect6,” The 2010 Conference on Technologies and Applications of Artificial Intelligence TAAI 2011, November 11-13, 2011. Taoyuan, Taiwan.
Shi-Jim Yen, Cheng-Wei Chou, Tsan-Cheng Su, Shun-Chin Hsu, Hsin-Hung Chou and Jr-Chang Chen, “Monte Carlo Tree Search in Chinese Dark Chess ,” the 16th Game Programming Workshop (GPW-2011), November 4-6, 2011, Hakone Seminar House, Kanagawa, Japan. GPW-2011.
Rou-Yu Lai, Hsin-Hung Chou, Shun-Chin Hsu and Shi-Jim Yen, “The Design and Implementation of a Pattern-directed MCTS-based Computer Go Program — WINGO ,” the 16th Game Programming Workshop (GPW-2011), November 4-6, 2011, Hakone Seminar House, Kanagawa, Japan. GPW-2011.
Bernard Helmstetter, Chang-Shing Lee, Mei-Hui Wang, Fabien Teytaud, Olivier Teytaud, Shi-Jim Yen, “Random positions in Go,” 2011 IEEE Conference on Computational Intelligence and Games( IEEE CIG 2011), August 31- September, 2011, Seoul, South Korea.
Ping-Chiang Chou, Hassen Doghmen, Chang-Shing Lee, Fabien Teytaud, Olivier Teytaud, Hui-Ming Wang, Mei-Hui Wang, Li-Wen Wu and Shi-Jim Yen, “Computational and Human Intelligence in Blind Go,” 2011 IEEE Conference on Computational Intelligence and Games( IEEE CIG 2011), August 31- September, 2011, Seoul, South Korea.
Shi-Jim Yen, Tsan-Cheng Su and Shun-Chin Hsu, “An efficient algorithm for solving Fillomino,” 2011 IEEE International Conference on Fuzzy Systems, June 27-30, 2011.
Shi-Jim Yen, Shih-Yuan Chiu, Cheng-Wei Chou and Tsan-Cheng Su, “Elimination Search for puzzle games : An Application for Hashi Solver,” 2011 IEEE International Conference on Fuzzy Systems, June 27-30, 2011.
Sheng-Ta Hsieh, Shih-Yuan Chiu and Shi-Jim Yen, “Sharing Mutation Genetic Algorithm for Solving Multi-objective Optimization Problems,” 2011 IEEE Congress on Evolutionary Computation(2011 IEEE CEC), June 5-8, 2011, New Orleans, USA.
S.-L. Peng* and Y.-W. Tsay, On the usage of graph spectra in protein structural similarity, Journal of Computers 23 (2012) 95-102. (EI) (A preliminary version appears in Proceedings of the 2011 International Computer Science and Engineering Conference, 209-214, September 7-9, 2011, Thailand. (Best paper award))
M.-S. Chang, L.-J. Hung, T. Kloks, and S.-L. Peng, On the threshold-width of graphs, Journal of Graph Algorithms and Applications 15 (2011) 253-268.
C.-H. Hsu, S.-L. Peng*, Y.-W. Tsay, An improved algorithm for protein structural comparison based on graph theoretical approach, Chiang Mai Journal of Science 38 (2011) 71-81. (SCI)
M.-S. Chang, L.-J. Hung, T. Kloks, and S.-L. Peng*, Block-graph width, Theoretical Computer Science 412 (2011) 2496-2502. (Extended abstract appeared in TAMC 2009, Lecture Notes in Computer Science, 5532 (2009), 150-157. (EI))
G. Lee, Y.-C. Chen, S.-L. Peng, and J.-H. Lin, Solving the sensitive itemset hiding problem whilst minimizing side effects on a sanitized database, SUComS 2011, Communications in Computer and Information Science, 223 (2011) 104-113. (EI)
S.-L. Peng* and Y.-W. Tsay, On the usage of graph spectra in protein structural similarity, Proceedings of the 2011 International Computer Science and Engineering Conference, 209-214, September 7-9, 2011, Thailand. (Best paper award)
S.-L. Peng* and Y.-W. Tsay, A fast algorithm for protein structural comparison, Proceedings of the 28th Workshop on Combinatorial Mathematics and Computation Theory, 59-66, May 27-28, 2011.
R.-Y. Chang and S.-L. Peng*, Minimum edge ranking spanning tree problem on interval graphs, Proceedings of the 28th Workshop on Combinatorial Mathematics and Computation Theory, 200-203, May 27-28, 2011.
S. C. Lo and Wei-Kun Lu, “Packet Routing Schemes in Vehicular Ad Hoc Networks” Journal of Internet Technology, Vol. 12, No. 6, pp. 931-940, November. 2011. (SCI)
C. C. Tseng, H. H. Chen, K. C. Chen, S. C. Lo and M. Y. Liu, “On QoS Guaranteed Cluster-based Multihop Wireless Ad Hoc Networks,” IET Communications, vol. 5, no. 12, pp. 1698-1710, August 2011. (SCI)
S. C. Lo and L. C. Ou, “Efficient Routing and Centralized Scheduling Algorithms for IEEE 802.16 Mesh Networks,” International Journal of Network Management, Vol. 21, No. 6, pp. 494-512, December 2011. (EI)
S. C. Lo, M. H. Chiang, J. H. Liou, and J. S. Gao, “Routing and Buffering Strategies in Delay-Tolerant Networks: Survey and Evaluation,” Proc. IEEE ICPP Workshop, Sept. 2011.
Y. J. Lin, J. S. Gao, and S. C. Lo, “A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks,” IEEE International Conference on Computer Science and Information Technology, June, 2011.
呂權龍、羅壽之,”延遲容忍網路下具壅塞控制之動態路由”,The16th Mobile Computing Workshop, June 2011.
H.-Y. Kao* & C.-L. Hsu, (2011), “Modeling users’ attitudes toward ERP systems with a Bayesian network”, International Journal of Industrial Engineering- Theory, Applications and Practice, Vol. 18, No. 11, 559-567 (SCI-e).
H.-Y. Kao* , C.-H. Huang & C.-L. Hsu, C.-L. Huang (2011), “Diagnosis from Bayesian Networks with Fuzzy Parameters–A Case in Supply Chains”, Journal of Internet Technology, Vol. 12, No. 1, 49-56 (NSC 98-2410-H-259-006-) (SCI-e).
H.-Y. Kao* , C.-H. Huang & C.-L. Hsu (2011), “Learning from Supply Chains with Probabilistic Network Models”, International Journal of Industrial Engineering- Theory, Applications and Practice, Vol. 18, No. 6, 317-322 (SCI-e).
H.-Y. Kao*, M.-C. Liu, C.-L. Huang & Y.-C. Chang (2011), “Evaluation and classification of e-learning systems from design perspectives”, ICIC Express Letters, Part B: Applications- An International Journal of Research and Surveys, Vol. 2, No. 4, 873-878 (EI).
C.-H. Huang* & H.-Y. Kao (2011), “Learning Influence Diagram with Rough Sets for Bacterial Infection Treatments”, 2011 International Conference on Information Communication and Management, Singapore, October 14-15, 2011.
H.-Y. Kao* & C.-H. Huang (2011), “Competency Analysis with DEA and DBN: The Case Study of Higher Education in Taiwan”, International Conference on Business and Information, Bangkok, Thailand, July 4-6, 2011 (NSC 99-2410-H-259-045-MY2).
C.-H. Huang & H.-Y. Kao (2011), “Supply Chain Management using Rough Sets and Influence Diagrams”, International Conference on Business and Information, Bangkok, Thailand, July 4-6, 2011 (NSC 99-2410-H-259-045-MY2).
H.-Y. Kao*, J.-Y. Chen & Y.-C. Lai (2011), “Causal analysis on R&D and financial efficiencies for universities ranking by the DEA approach”, The International Conference on Electronic Commerce, Administration, Society, and Education (e-CASE), Tokyo, Japan, January 18-20, 2011 (NSC 99-2410-H-259-045-MY2).
I-Cheng Chang* and Chieh-Jung Hsieh, “Image Forgery Using An Enhanced Bayesian-based Matting Algorithm”,Intelligent Automation and Soft Computing, to be published in Vol. 17, No. 2, pp. 269-281, 2011. [2009 IF = 0.349][5-Year IF = 0.301]
Pao-Lien Lai*, “Geodesic pancyclicity of twisted cubes,” Information Sciences, vol. 181, no. 23, pp. 5,321-5,332, 2011.
Po-Chang Li*, Zheng-Da Liu, and Pao-Lien Lai, “Three-round adaptive diagnosis in crossed cubes,” in Proceeding of the 28th Workshop on Combinatorial Mathematics and Computation Theory, p. 254-259, Penghu, Taiwan, May 2011.
Hong-Chun Hsu*, Pao-Lien Lai, Tseng-Kuei Li, and Chang-Hsiung Tsai, “Fault diagnosis algorithm for biswapped networks under the PMC model,” in Proceeding of the 28th Workshop on Combinatorial Mathematics and Computation Theory, p. 144-151, Penghu, Taiwan, May 2011.
Pao-Lien Lai*, Hong-Chun Hsu, and Chang-Hsiung Tsai, “A systematic algorithm for embedding Hamiltonian cycle in hierarchical crossed cubes,” in the 11th International Symposium on Parallel Architecture, Algorithms and Networks (ISPAN 2011), p. 358-365, Dalian, China, Aug. 2011.
Pao-Lien Lai* and Ming-Yi Chiu, “Uniform disjoint cycle covers on a hierarchical multicomputer system,”Communications in Computer and Information Science, vol. 223, pp. 141-148, 2011.
Min-Xiou Chen, and Tze-Chin Tzeng, 2011, “Integrating Service Discovery Technologies in OSGi platform”, Computer Standards & Interfaces, Vol. 33, No. 3, pp. 271-279. (SCI)
Min-Xiou Chen, Bing-Yang Lin, and Yung-Cheng Chuang, 2011, June, “Design Remote Monitor System based on OSGi platform in Vehicle Gateway for Vehicle Network”, 7th International Conference on Networked Computing and Advanced Information Management, June, Gyeongju, Korea.(IEEE)
Chung Yung, Yen-Chang Lai, and Qin-Xin Tu, “Local Independence Transformation and Its Application to Removing Nonduplicate Statements in Code Clones”, Proceedings of the 2011 International Conference on Software Engineering Research and Practice (SERP’11), pp. 571-577, Las Vegas NV, U.S.A., July 2011.
Tao-Ku Chang and Gwan-Hwan Hwang, “Developing an Efficient Query System for Encrypted XML Documents.” Accepted for publication in Journal of Systems and Software, 2011. (SCI journal; Supported in part by NSC of Taiwan under grant no. NSC 98-2221-E-259-011and NSC 97-2221-E-026 -001)
Tao-Ku Chang and Te-Feng Chiu, “A Secure Web Services-Based Workflow Management System,” The 2011 International Conference on Electric Information and Control Engineering (ICEICE): 1108-1111, Wuhan, China.
張至豪、王子源、賴志宏、劉蓁蓁(2011 年 10月)。即時通訊代理人對外語課程學習成效影響之實證研究。台灣數位學習發展研討會。台北福華會館,台北,台灣。
book
Book Editor- Y.Q. Shi, H.J. Kim, H.J., F. Pérez-González, and C.N. Yang, Digital-Forensics and Watermarking (Springer, ISBN: 978-3-319-19320-5), 2015.
Shinfeng Lin, Chih-Cheng Wang, Chih-Yao Chuang, and Kuan-Ru Fu, A Hybrid Error Concealment Technique for H.264/AVC Based on Boundary Distortion Estimation, INTECH-“Recent Advances on Video Coding “, ISBN 978-953-307-181-7, Chapter 11, P.243-P.258, July 2011.
Shinfeng D. Lin* and Shih-Chieh Shie, Digital Steganographic Schemes based on Image Vector Quantization, Accepted by Multimedia Security and Steganography, September 22, 2011.
Wen-Kai Tai, “Chapter 8. The state-of-the-art Steganography for 3D Meshes,” Book chapter of “Steganography and Watermarking,” Nova Science Publishers, Inc., 2011/12
H.-Y. Kao*, C.-H. Huang, C.-L. Hsu and C.-L. Huang (2010), “Diagnosis from Bayesian Networks with Fuzzy Parameters–A Case in Supply Chains”, Lecture Notes in Computer Science, Vol. 6104, to appear (GPC 2010) (NSC 97-2410-H-259-065-) (EI).
C.-H. Huang and H.-Y. Kao (2009), “Interval Regression Analysis with Soft-Margin Reduced Support Vector Machine“, Lecture Notes in Computer Science, Vol. 5579, 826-835 (IEA-AIE 2009) (EI)
C.-H. Huang, H.-Y. Kao, “An Effective Linear Approximation Method for Geometric Programming Problems”, 2009 IEEE International Conference on Industrial Engineering and Engineering Management, Hong Kong, December 8-11, 2009 (NSC 97-2410-H-259-065-) (EI).
C.-H. Huang, H.-Y. Kao*& H.-L. Li (2007), “Intelligent Decision Support based on Influence Diagrams with Rough Sets,” Lecture Notes in Computer Science, Vol. 4482, 518-525 (JRS 2007) (TMS-094 -2-B-009) (EI).
Yung-Sheng Chen, I-Cheng Chang, Bor-Tow Chen and Ching-Long Huang, Three-Dimensional Digital colour Camera, Image Processing, ISBN 978-953-307-026-1, IN-TECH, 2009.
Min-Xiou Chen, 2009, December, ” Design and Implementation of Vehicle Navigation Systems,” a book chapter in Handbook of Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications, IGI Global.
陳旻秀, 2011, “車載服務取得與應用”, 車載通訊原理、服務與應用, pp. 487-514, 東華書局
陳旻秀, 2011, “智慧型車載資通訊環境設計”, 行動裝置應用程式設計, pp. 153-172, 東華書局
other
l 戴文凱, 經濟部工業局文化創意產業年報-數位休閒文化產業章節,2007。
l 戴文凱, 經濟部工業局文化創意產業年報-數位休閒文化產業章節,2006。
l 黃俊彥、戴文凱,”中式涼亭建模系統,” 2012。
l 吳國維、戴文凱,”Pac-Man AI 系統,” 2012。
l 許紘瑋、陳泰運、戴文凱,“賽車遊戲貼地點群組管理系統,”2011。
l GameLab、戴文凱,“Arcade Game Development kit- GDK,”2011。
l 邱家存、戴文凱,“立體顯示內容製作與控制軟體,”2011。
l GameLab、戴文凱,“駕駛安全評估遊戲,” 2011。
l 吳以尋、戴文凱,“跳舞遊戲自動編譜系統,”2010。
l 陳泰運、楊宗翰、戴文凱,“鬥地主- 棋牌類遊戲 AI 引擎系統,”2010。
l 蕭孝帆、戴文凱,”碎型領地遊戲 Fractal Territory Board Game, “ 2009。
l GameLab、戴文凱,“Go On-Lne,圍棋線上遊戲,” 2010。
l GameLab、戴文凱,“競速類賽馬引擎與遊戲- Fantasy Horse,”2009。
l GameLab、戴文凱,“東華 On-Line,東華大學線上遊戲,”2008。
l GameLab、戴文凱,“太魯閣國家公園園區急難處理系統,”2008。
l GameLab、戴文凱,“腳本式之 3D 場景即時描繪系統,”2007。
l GameLab、戴文凱,“Open Source Game Engine,”2006。
l 黃怡錚、任偉成、許祥旭、劉家賢、周彥圻、詹國宏、沈良翰、李思妏,戴文凱,“溫米澳”(4C 數位創作競賽─遊戲創作組PC類組程式技術獎、廠商贊助獎) 2006。
l 陳裕豐、蕭惟中、林信孝、戴嘉賢、戴文凱,“CROSS HARMONIA” (4C 數位創作競賽─遊戲創作組 PC 類組程式 技術獎、廠商贊助獎),2005
l 曾世威、彭安國、陳潔如、林峻民、戴文凱,“Scan Area” (4C 競賽-遊戲創作組程式技術獎),2004
l 陳勇誠、陳冠逸、曾亞侖、李彥廷、黃俊彥、戴文凱、顏雲生、陳威良、紀廷運、彭一高、趙涵捷,“Campus Hunter On-Line”(中華電信加值軟體大賽(網際網路組)第二名),2004。
l 陳勇誠、陳冠逸、曾亞侖、李彥廷、黃俊彥、戴文凱、彭勝龍,“Campus Hunter”(4C競賽-遊戲創作組冠軍),2003。
l 彭任右、張延聖、林琮凱、簡國斌、劉芳君、謝詩婉、戴文凱、彭勝龍,“Monster Fantasy”(中華盃遊戲創作競賽第三名), 2002。