Mobile monitoring and control framework with active-push and plug-and-play capabilities
Y. Chang, Allen, Li, Yu-Yung, Hung, Min-Hsiung, Yen, Ting-Fan
Published in Assembly automation (01.01.2013)
Published in Assembly automation (01.01.2013)
Get full text
Journal Article
Parallel Large-scale MOSFET Circuit Simulation using Multi-core CPU and Time-saving Techniques
Chen, Chun-Jung, Yang, Tai-Ning, Lee, Chih-Jen, Chou, Li-Ping, Hsu, Sheng-Hsuan, Chang, Allen Y., Liu, Chung-Hsin
Published in Journal of physics. Conference series (01.07.2021)
Published in Journal of physics. Conference series (01.07.2021)
Get full text
Journal Article
Visual Development Platform for White-Box Algorithmic Trading
Chia-Han Chou, Chang, Allen Y
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Get full text
Conference Proceeding
Early Warning System for DDoS Attacking Based on Multilayer Deployment of Time Delay Neural Network
Chang-Lung Tsai, Chang, Allen Y, Huang Ming-Szu
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Published in 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01.10.2010)
Get full text
Conference Proceeding
Methods to enhance the performance of Iterated Timing Analysis algorithm
Chun-Jung Chen, Bin-Cheng Chen, Chih-Jen Lee, Chang-Lung Tsai, Li-Ping Chou, Chang, Allen Y
Published in The 2010 IEEE International Conference on Information and Automation (01.06.2010)
Published in The 2010 IEEE International Conference on Information and Automation (01.06.2010)
Get full text
Conference Proceeding
Cost prediction for ray shooting in octrees
Aronov, Boris, Brönnimann, Hervé, Chang, Allen Y., Chiang, Yi-Jen
Published in Computational geometry : theory and applications (01.07.2006)
Published in Computational geometry : theory and applications (01.07.2006)
Get full text
Journal Article
A proxy-based real-time protection mechanism for social networking sites
Dwen-Ren Tsai, Chang, A Y, Sheng-Chieh Chung, You Sheng Li
Published in 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (01.10.2010)
Published in 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (01.10.2010)
Get full text
Conference Proceeding
An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone
Chang, A.Y., Dwen-Ren Tsai, Chang-Lung Tsai, Yong-Jiang Lin
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Get full text
Conference Proceeding
Optimum tuning of defense settings for common attacks on the web applications
Dwen-Ren Tsai, Chang, A.Y., Peichi Liu, Hsuan-Chang Chen
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Get full text
Conference Proceeding
The multi-rate Iterated Timing Analysis algorithm for circuit simulation
Chun-Jung Chen, Chun-Chia Chang, Chih-Jen Lee, Chang-Lung Tsai, Chang, A Y, Jenn-Dong Sun
Published in 2010 53rd IEEE International Midwest Symposium on Circuits and Systems (01.08.2010)
Published in 2010 53rd IEEE International Midwest Symposium on Circuits and Systems (01.08.2010)
Get full text
Conference Proceeding
Cost-driven octree construction schemes: an experimental study
Aronov, Boris, Brönnimann, Hervé, Chang, Allen Y., Chiang, Yi-Jen
Published in Computational geometry : theory and applications (01.05.2005)
Published in Computational geometry : theory and applications (01.05.2005)
Get full text
Journal Article
Dynamic intrusion detection system based on feature extraction and multidimensional hidden Markov model analysis
Chang-Lung Tsai, Chang, A.Y., Chun-Jung Chen, Wen-Jieh Yu, Ling-Hong Chen
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Published in 43rd Annual 2009 International Carnahan Conference on Security Technology (01.10.2009)
Get full text
Conference Proceeding
A future application environment for BC Hydro's EMS
Vaahedi, E., Chang, A.Y., Mokhtari, S., Muller, N., Irisarri, G.
Published in IEEE transactions on power systems (01.02.2001)
Published in IEEE transactions on power systems (01.02.2001)
Get full text
Journal Article
Combining Gradientfaces, principal component analysis, and Fisher linear discriminant for face recognition
Chih-Jen Lee, Tzu-Yin Chen, Jenn-Dong Sun, Tai-Ning Yang, Chang, Allen Y
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Get full text
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Conference Proceeding
Information security issue of enterprises adopting the application of cloud computing
Chang-Lung Tsai, Uei-Chin Lin, Chang, Allen Y, Chun-Jung Chen
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Get full text
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Conference Proceeding
Fingerprint identification using local Gabor filters
Chih-Jen Lee, Tai-Ning Yang, Chun-Jung Chen, Chang, Allen Y, Sheng-Hsuan Hsu
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Get full text
Published in The 6th International Conference on Networked Computing and Advanced Information Management (01.08.2010)
Conference Proceeding