Eric Jui-Lin Lu

Orcid: 0000-0001-7953-5486

According to our database1, Eric Jui-Lin Lu authored at least 41 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing SPARQL Query Performance With Recurrent Neural Networks.
IEEE Access, 2023

2022
SPARQL Generation with an NMT-based Approach.
J. Web Eng., 2022

Efficient SPARQL Queries Generator for Question Answering Systems.
IEEE Access, 2022

2021
Intelligent SPARQL Query Generation for Natural Language Processing Systems.
IEEE Access, 2021

2020
Categorization of Multiple Documents Using Fuzzy Overlapping Clustering Based on Formal Concept Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2020

Ontology-based Dynamic Semantic Annotation for Social Image Retrieval.
Proceedings of the 21st IEEE International Conference on Mobile Data Management, 2020

2018
The Virtues of Taiwanese Internet-Using Adolescents: The Development and Validation of the Cyber Virtues Scale.
J. Educ. Technol. Soc., 2018

2016
RDF-Chord: A hybrid PDMS for P2P systems.
Comput. Stand. Interfaces, 2016

Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2014
An RDF-based P2P overlay network supporting range and wildcard queries.
J. Netw. Comput. Appl., 2014

Finding keywords in blogs: Efficient keyword extraction in blog mining via user behaviors.
Expert Syst. Appl., 2014

Classify Blog Articles Using Queried Keywords.
Proceedings of the Intelligent Systems and Applications, 2014

Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpedia.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Secret Hiding Mechanism Using QR Barcode.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

A Blog Clustering Approach Based on Queried Keywords.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Privacy image protection using fine-grained mosaic technique.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2010
Extended Relation Metadata for SCORM-based Learning Content Management Systems.
J. Educ. Technol. Soc., 2010

2009
ML-Chord: A multi-layered P2P resource sharing model.
J. Netw. Comput. Appl., 2009

A relation metadata extension for SCORM Content Aggregation Model.
Comput. Stand. Interfaces, 2009

2007
A Web-Based Authoring System Supporting Metadata.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

2006
An empirical study of XML data management in business information systems.
J. Syst. Softw., 2006

Design of a delegable SCORM conformant learning management system.
J. Comput. Assist. Learn., 2006

A Time-stamping Proxy Signature Scheme Using Time-stamping Service.
Int. J. Netw. Secur., 2006

The Design of a P2P Application Routing Protocol for Heterogeneous Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
X-RDR: a role-based delegation processor for web-based information systems.
ACM SIGOPS Oper. Syst. Rev., 2005

A flexible delegation processor for web-based information systems.
Comput. Stand. Interfaces, 2005

A new proxy signature scheme with revocation.
Appl. Math. Comput., 2005

2004
A ReScUE XML/EDI model.
Softw. Pract. Exp., 2004

Design and implementation of a mobile database for Java phones.
Comput. Stand. Interfaces, 2004

An XML multisignature scheme.
Appl. Math. Comput., 2004

An Enhanced EDCG Replica Allocation Method in Ad Hoc Networks.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng., 2003

Design and implementation of a fine-grained menu control processor for web-based information systems.
Future Gener. Comput. Syst., 2003

XDSearch: an efficient search engine for XML document schemata.
Expert Syst. Appl., 2003

2002
Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng., 2002

2001
An empirical study of XML/EDI.
J. Syst. Softw., 2001

A distributed EDI model.
J. Syst. Softw., 2001

2000
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2000

1997
An Efficient Load Balancing Technique for Parallel FMA in Message Passing Environment.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

1996
A Massively Parallel Fast Multipole Algorithm in Three Dimensions.
Proceedings of the 5th International Symposium on High Performance Distributed Computing (HPDC '96), 1996


  Loading...