Dawei Wang

Affiliations:
  • Academia Sinica, Institute of Information Science, Taipei, Taiwan
  • National Taiwan University, Data Science Degree Program, Taipei, Taiwan


According to our database1, Dawei Wang authored at least 62 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Building Commuting Flows for an Agent Based Disease Spreading Simulation System Based on Aggregated Information.
Proceedings of the 13th International Conference on Simulation and Modeling Methodologies, 2023

2022
Household Structure Projection: A Monte-Carlo based Approach.
Proceedings of the 12th International Conference on Simulation and Modeling Methodologies, 2022

2021
Changing of Spreading Dynamics for Infectious Diseases in an Aging Society: A Simulation Case Study on Flu Pandemic.
Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, 2021

Optimal Branch Location for Cost-effective Inference on Branchynet.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2019
Study Simulated Epidemics with Deep Learning.
Proceedings of the 9th International Conference on Simulation and Modeling Methodologies, 2019

2017
Implementation of a cloud-based electronic medical record exchange system in compliance with the integrating healthcare enterprise's cross-enterprise document sharing integration profile.
Int. J. Medical Informatics, 2017

Soft Methodology for Cost-and-error Sensitive Classification.
CoRR, 2017

Applying Deep Learning for Surrogate Construction of Simulation Systems.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2017

Learning from Simulated World - Surrogates Construction with Deep Neural Network.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

Toward Automatic Reporting of Infectious Diseases.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

2016
The Power of Surrogate-Assisted Evolutionary Computing in Searching Vaccination Strategy.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Searching Vaccination Strategy with Surrogate-assisted Evolutionary Computing.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

2015
The Impact of Household Structures on Pandemic Influenza Vaccination Priority.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015

2014
A logical framework for privacy-preserving social network publication.
J. Appl. Log., 2014

A comparison between a deterministic, compartmental model and an individual based-stochastic model for simulating the transmission dynamics of pandemic influenza.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

An Information-Theoretic Approach for Secure Protocol Composition.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Privacy-Preserving Social Network Publication Based on Positional Indiscernibility.
Proceedings of the Scalable Uncertainty Management - 7th International Conference, 2013

Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

A Scripting Language for Automating Secure Multiparty Computation.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
A Probabilistic Hybrid Logic for Sanitized Information Systems.
Proceedings of the Scalable Uncertainty Management - 6th International Conference, 2012

Simple and Efficient Algorithms to Get a Finer Resolution in a Stochastic Discrete Time Agent-Based Simulation.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2012

A Simple Efficient Technique to Adjust Time Step Size in a Stochastic Discrete Time Agent-based Simulation.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

A simple methodology for soft cost-sensitive classification.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Logic, Probability, and Privacy: A Framework for Specifying Privacy Requirements.
Proceedings of the Turing-100, 2012

2011
Cost-Sensitive Classification on Pathogen Species of Bacterial Meningitis by Surface Enhanced Raman Scattering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

2010
Privacy-Preserving Collaborative Recommender Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Heterogeneous Subset Sampling.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Hybrid SVM/CART classification of pathogenic species of bacterial meningitis with surface-enhanced Raman scattering.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine, 2010

2009
Exploiting Spectral Reuse in Routing, Resource Allocation, and Scheduling for IEEE 802.16 Mesh Networks.
IEEE Trans. Veh. Technol., 2009

Toward Empirical Aspects of Secure Scalar Product.
IEEE Trans. Syst. Man Cybern. Part C, 2009

Optimizing server placement for parallel I/O in switch-based clusters.
J. Parallel Distributed Comput., 2009

An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments.
Algorithmica, 2009

An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Towards Efficient Privacy-preserving Collaborative Recommender Systems.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Scalar-product based Secure Two-party Computation.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Logical Definability in Social Position Analysis.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Granulation as a Privacy Protection Mechanism.
Trans. Rough Sets, 2007

An epistemic framework for privacy protection in database linking.
Data Knowl. Eng., 2007

Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

2006
Value versus damage of information release: A data privacy perspective.
Int. J. Approx. Reason., 2006

Bounds on the Client-Server Incremental Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A GrC-Based Approach to Social Network Data Protection.
Proceedings of the Rough Sets and Current Trends in Computing, 2006

Generalized Edge Coloring for Channel Assignment in Wireless Networks.
Proceedings of the 2006 International Conference on Parallel Processing (ICPP 2006), 2006

Attribute-oriented Granulation for Privacy Protection.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Privacy Protection in Social Network Data Disclosure Based on Granular Computing.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

Information Theoretical Analysis of Two-Party Secret Computation.
Proceedings of the Data and Applications Security XX, 2006

2005
Two Variations of the Minimum Steiner Problem.
J. Comb. Optim., 2005

Secrecy of Two-Party Secure Computation.
Proceedings of the Data and Applications Security XIX, 2005

2004
Medical privacy protection based on granular computing.
Artif. Intell. Medicine, 2004

On The Damage and Compensation of Privacy Leakage.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Preserving confidentiality when sharing medical database with the Cellsecu system.
Int. J. Medical Informatics, 2003

An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters.
Proceedings of the Real-Time and Embedded Computing Systems and Applications, 2003

Placement of I/O servers to improve parallel I/O performance on switch-based clusters.
Proceedings of the 17th Annual International Conference on Supercomputing, 2003

Efficient Parallel I/O Scheduling in the Presence of Data Duplication.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003

2002
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.
Proceedings of the Rough Sets and Current Trends in Computing, 2002

Quantifying Privacy Leakage through Answering Database Queries.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Lower bounds for wide-sense nonblocking Clos network.
Theor. Comput. Sci., 2001

A Logical Model for Privacy Protection.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Reduction Optimization in Heterogeneous Cluster Environments.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1996
Steiner Problems on Directed Acyclic Graphs.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

1994
Reliable Communication Over Unreliable Channels.
J. ACM, 1994


  Loading...