Chi-Chun Lo

According to our database1, Chi-Chun Lo authored at least 100 papers between 1988 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Application of the artificial bee colony algorithm to power contract capacity optimization.
Microprocess. Microsystems, September, 2022

2019
Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks.
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019

2018
An Exercise Fatigue Detection Model Based on Machine Learning Methods.
CoRR, 2018

A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices.
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018

2017
Novel non-contact control system of electric bed for medical healthcare.
Medical Biol. Eng. Comput., 2017

Using ontologies to perform threat analysis and develop defensive strategies for mobile security.
Inf. Technol. Manag., 2017

An Augmented Reality Question Answering System Based on Ensemble Neural Networks.
IEEE Access, 2017

A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

2016
A Wearable Channel Selection-Based Brain-Computer Interface for Motor Imagery Detection.
Sensors, 2016

Using malware for software-defined networking-based smart home security management through a taint checking approach.
Int. J. Distributed Sens. Networks, 2016

Novel Non-Contact Control System for Medical Healthcare of Disabled Patients.
IEEE Access, 2016

Vehicle Localization and Velocity Estimation Based on Mobile Phone Sensing.
IEEE Access, 2016

An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine.
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016

2015
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory.
Inf. Syst. Frontiers, 2015

A reputation-based computing approach in trusted web service provisions.
Comput. Syst. Sci. Eng., 2015

Design of novel non-contact multimedia controller for disability by using visual stimulus.
Comput. Methods Programs Biomed., 2015

Using Dynamic Taint Approach for Malware Threat.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

2014
A trustworthy QoS-based collaborative filtering approach for web service discovery.
J. Syst. Softw., 2014

Using Taint Analysis for Threat Risk of Cloud Applications.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

2013
Traffic speed estimation based on normal location updates and call arrivals from cellular networks.
Simul. Model. Pract. Theory, 2013

A Social Trust Based Recommendation Mechanism for Web Service Dynamic Collaboration.
Proceedings of the 2013 IEEE 6th International Conference on Service-Oriented Computing and Applications, 2013

Distributed dynamic data driven prediction based on reinforcement learning approach.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Research of Ontology and Semantic Web Apply for Building Information Model.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2012
A green positioning algorithm for Campus Guidance System.
Int. J. Mob. Commun., 2012

A hybrid information security risk assessment procedure considering interdependences between controls.
Expert Syst. Appl., 2012

2011
A user centric service-oriented modeling approach.
World Wide Web, 2011

Multi-group QoS consensus for web services.
J. Comput. Syst. Sci., 2011

An evidence-based scheme for web service selection.
Inf. Technol. Manag., 2011

Ubiquitous Healthcare Service System with Context-awareness Capability: Design and Implementation.
Expert Syst. Appl., 2011

Mobile merchandise evaluation service using novel information retrieval and image recognition technology.
Comput. Commun., 2011

Service-oriented dynamic data driven application systems to potential field method vehicle navigation.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A Consumer Trust-Based Approach in Web Services Selection.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Intelligent interactive system for collaborative green computing.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

A channel-based key management protocol for IPTV service.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Mitigating routing misbehavior in Dynamic Source Routing protocl using trust-based reputation mechanism for wireless ad-hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Consensus Issues for Service Advertisement and Selection.
Proceedings of the Agent-Based Service-Oriented Computing, 2010

Personalized blog content recommender system for mobile phone users.
Int. J. Hum. Comput. Stud., 2010

On optimal decision for QoS-aware composite service selection.
Expert Syst. Appl., 2010

Service-oriented dynamic data driven application systems to traffic signal control.
Proceedings of the IEEE International Conference on Systems, 2010

A Cooperative Intrusion Detection System Framework for Cloud Computing Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer Applications.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Dynamic data driven smart home system based on a Service Component Architecture.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Threshold Based Group-Oriented Nominative Proxy Signature Scheme for Digital Rights Management.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Service Selection Based on Fuzzy TOPSIS Method.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Integrating Semantic Web and Object-Oriented Programming for Cooperative Design.
J. Univers. Comput. Sci., 2009

A reputation scheme with witness reasoning for service selection.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

A Reputation-Based Service Selection Scheme.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Fuzzy Similarity Clustering for Consumer-Centric QoS-Aware Selection of Web Services.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Consumer-centric QoS-aware selection of web services.
J. Comput. Syst. Sci., 2008

A study on e-Taiwan information system security classification and implementation.
Comput. Stand. Interfaces, 2008

QoS-Aware Service Selection under Consumer's Reputation.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Study on Representation of QoS in UDDI for Web Services Composition.
Proceedings of the Second International Conference on Complex, 2008

2007
Applying Semi-Order Preference Model in Content-Based Service Discovery.
Int. J. Electron. Bus. Manag., 2007

A fuzzy outranking approach in risk analysis of web service security.
Clust. Comput., 2007

2006
Reaching consensus: A moderated fuzzy web services discovery method.
Inf. Softw. Technol., 2006

The proactive intrusion prevention for Wireless Local Area Network.
Int. J. Mob. Commun., 2006

A fuzzy group-preferences analysis method for new-product development.
Expert Syst. Appl., 2006

Service discovery through consensus based preferences.
Comput. Syst. Sci. Eng., 2006

Location-based incentive pricing for tree-based relaying in multi-hop cellular networks.
Comput. Commun., 2006

Exception Diagnosis for Agent-Oriented Services.
Proceedings of the IEEE International Conference on Systems, 2006

A Fuzzy Model for Selection of QoS-Aware Web Services.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

An Efficient Transaction Commit Protocol for Composite Web Services.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Fuzzy Consensus on QoS in Web Services Discovery.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Service discovery through multi-agent consensus.
Proceedings of the 2005 IEEE International Workshop on Service-Oriented System Engineering (SOSE 2005), 2005

A Quality of Relay-Based Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks.
Proceedings of the Information Networking, 2005

Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

Fuzzy Matchmaking for Web Services.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

A Moderated Fuzzy Matchmaking for Web Services.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Diminishing Capacity Requirement For Mobility Database In Wireless ATM.
J. Circuits Syst. Comput., 2004

Diminishing signalling traffic for authentication in mobile communication system.
Int. J. Electron. Bus., 2004

Video retrieval using successive modular operations on temporal similarity.
Comput. Stand. Interfaces, 2004

An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

A Dynamic Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks.
Proceedings of the Information Networking, 2004

The Implementation of an Intelligent Logistics Tracking System Utilizing RFID.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Using fuzzy distance to evaluate the consensus of group decision-making an entropy-based approach.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004

The Implementation of a Proactive Wireless Intrusion Detection System.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
A histogram-based moment-preserving clustering algorithm for video segmentation.
Pattern Recognit. Lett., 2003

An adaptive survivability admission control algorithm using backup path for high-speed networks.
Int. J. Netw. Manag., 2003

A novel approach of backup path reservation for survivable high-speed networks.
IEEE Commun. Mag., 2003

A Flexible Time-based Pricing Policy for Charging Internet Services.
Proceedings of the 15th Conference on Advanced Information Systems Engineering (CAiSE '03), 2003

2002
An adaptive survivability admission control mechanism using backup VPs for self-healing ATM networks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Second chance replacement policy for mobile database overflow.
Proceedings of the Global Telecommunications Conference, 2002

2001
Video segmentation using a histogram-based fuzzy c-means clustering algorithm.
Comput. Stand. Interfaces, 2001

Stream ciphers for GSM networks.
Comput. Commun., 2001

2000
A multiobjective hybrid genetic algorithm for the capacitated multipoint network design problem.
IEEE Trans. Syst. Man Cybern. Part B, 2000

Coding-based schemes for fault identification in communication networks.
Int. J. Netw. Manag., 2000

Authentication protocols for the broadband ISDN billing system.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

1999
Secure communication mechanisms for GSM networks.
IEEE Trans. Consumer Electron., 1999

Robust event correlation scheme for fault identification in communication networks.
Int. J. Commun. Syst., 1999

A fault-tolerant architecture for ATM networks.
Comput. Commun., 1999

A scheduling-based event correlation scheme for fault identification in communications network.
Comput. Commun., 1999

Building and managing virtual private network; by D. Kosiur.
Comput. Commun., 1999

1998
Security issues on B-ISDN billing system.
Proceedings of the 1998 Network Operations and Management Symposium, 1998

1996
Alarm correlation for congestion diagnosis in ATM networks.
Proceedings of the 1996 Network Operations and Management Symposium, 1996

1991
An expert integrator for communication networks management.
Proceedings of the 16th Conference on Local Computer Networks, 1991

1989
A two-phase algorithm and performance bounds for the star-star concentrator location problem.
IEEE Trans. Commun., 1989

1988
A two-phase algorithm for the star-star concentrator location problem.
Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?, 1988


  Loading...