Chi-Wei Wang

Orcid: 0000-0003-3711-2316

According to our database1, Chi-Wei Wang authored at least 24 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Demonstration on Warpage Estimation Approach Utilized in Fan-Out Panel-Level Packaging Enabled by Multi-Scale Process-Oriented Simulation.
Proceedings of the IEEE International Reliability Physics Symposium, 2023

2022
Analyzing discourse functions with acoustic features and phone embeddings: non-lexical items in Taiwan Mandarin.
Proceedings of the 34th Conference on Computational Linguistics and Speech Processing, 2022

2019
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Classification of Dementia Based on Over-Sampling Approach and Decision Tree.
Proceedings of the 2018 International Conference on Big Data and Education, 2018

2017
DROIT+: Taint Tracking for Storage Access on Android.
J. Inf. Sci. Eng., 2017

2016
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction.
IEEE Trans. Dependable Secur. Comput., 2016

2015
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations.
J. Inf. Sci. Eng., 2015

DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis.
J. Inf. Sci. Eng., 2015

MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern.
J. Inf. Sci. Eng., 2015

Combating Software Piracy in Public Clouds.
Computer, 2015

An efficient sky detection algorithm based on hybrid probability model.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Haze detection and haze degree estimation using dark channels and contrast histograms.
Proceedings of the 10th International Conference on Information, 2015

2014
Can Malware Be Exterminated by Better Understanding Its Roots?
IT Prof., 2014

Cloudebug: A Programmable Online Malware Testbed.
Computer, 2014

2013
Light-Weight CSRF Protection by Labeling User-Created Contents.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

2009
An Automated Image-Based Cell Counter.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2007
A wire delay-tolerant reconfigurable unit for a clustered programmable-reconfigurable processor.
Microprocess. Microsystems, 2007

2006
Deploying Scientific Applications to the PRAGMA Grid Testbed: Strategies and Lessons.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Exploiting Pipelining to Tolerate Wire Delays in a Programmable-Reconfigurable Processor.
Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), 2005

2004
A reconfigurable unit for a clustered programmable-reconfigurable processor.
Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, 2004

2002
Clustered programmable-reconfigurable processors.
Proceedings of the 2002 IEEE International Conference on Field-Programmable Technology, 2002

The Design of the Amalgam Reconfigurable Cluster.
Proceedings of the 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 2002

Mapping Algorithms to the Amalgam Programmable-Reconfigurable Processor.
Proceedings of the 10th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2002), 2002


  Loading...