Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Development of Local Culture Industry: The Case Study of Community Colleges and Community Development Associations in Taiwan., , , and . MISNC, volume 473 of Communications in Computer and Information Science, page 60-75. Springer, (2014)Knowledge Driven Policy Management for Autonomous Networks., , and . ICIN, page 210-215. IEEE, (2024)Lock-Keeper: A New Implementation of Physical Separation Technology., and . ISSE, page 275-286. Vieweg, (2006)Optimality of (s, S) Policies in Inventory Models with Markovian Demand., and . Operations Research, 45 (6): 931-939 (1997)BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes., , and . Integrated Network Management, page 399-406. IEEE, (2011)A Virtual Machine Dynamic Adjustment Strategy Based on Load Forecasting., , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 538-550. Springer, (2018)An Integrated Network Scanning Tool for Attack Graph Construction., , and . GPC, volume 6646 of Lecture Notes in Computer Science, page 138-147. Springer, (2011)Bose–Einstein condensation on an atom chip, , , , , and . Chinese Physics B, 18 (10): 4259+ (Oct 1, 2009)Automatic vulnerability detection for weakness visualization and advisory creation., , , and . SIN, page 229-236. ACM, (2015)Adult Image Classification by a Local-Context Aware Network., , , , , and . ICIP, page 2989-2993. IEEE, (2018)