Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Driven Policy Management for Autonomous Networks., , and . ICIN, page 210-215. IEEE, (2024)A Study on Development of Local Culture Industry: The Case Study of Community Colleges and Community Development Associations in Taiwan., , , and . MISNC, volume 473 of Communications in Computer and Information Science, page 60-75. Springer, (2014)Optimality of (s, S) Policies in Inventory Models with Markovian Demand., and . Operations Research, 45 (6): 931-939 (1997)Lock-Keeper: A New Implementation of Physical Separation Technology., and . ISSE, page 275-286. Vieweg, (2006)BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes., , and . Integrated Network Management, page 399-406. IEEE, (2011)Bose–Einstein condensation on an atom chip, , , , , and . Chinese Physics B, 18 (10): 4259+ (Oct 1, 2009)Automatic vulnerability detection for weakness visualization and advisory creation., , , and . SIN, page 229-236. ACM, (2015)An Integrated Network Scanning Tool for Attack Graph Construction., , and . GPC, volume 6646 of Lecture Notes in Computer Science, page 138-147. Springer, (2011)A Virtual Machine Dynamic Adjustment Strategy Based on Load Forecasting., , , , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 538-550. Springer, (2018)Adult Image Classification by a Local-Context Aware Network., , , , , and . ICIP, page 2989-2993. IEEE, (2018)