Huey-Ming Lee

According to our database1, Huey-Ming Lee authored at least 52 papers between 1996 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Fuzzy Nonlinear Programming for Production Inventory Based on Statistical Data.
J. Adv. Comput. Intell. Intell. Informatics, 2016

2012
Fuzzy Decision Making for Diagnosing Machine Fault.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Designing and analyzing resource allocation based on grouped grid nodes.
Proceedings of the IEEE International Conference on Systems, 2011

C&C tracer: Botnet command and control behavior tracing.
Proceedings of the IEEE International Conference on Systems, 2011

2010
Fuzzy assessment for sampling survey defuzzification by signed distance method.
Expert Syst. Appl., 2010

Fuzzy Group Evaluating the Aggregative Risk Rate of Software Development.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

Fuzzy evaluating the rate of aggregative risk in software development.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Fuzzy Decision Making for IJV Performance Based on Statistical Confidence-Interval Estimates.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Designing a Learning System Based on Voice Mail - A Case Study of English Oral Training.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

Processing Certificate of Authorization with Watermark Based on Grid Environment.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

A System for Assisting English Oral Proficiency - A Case Study of the Elementary Level of General English Proficiency Test (GEPT) in Taiwan.
Proceedings of the Intelligent Information and Database Systems, 2010

Verification of Stored Security Data in Computer System.
Proceedings of the Intelligent Information and Database Systems, 2010

2009
Fuzzy assessment method on sampling survey analysis.
Expert Syst. Appl., 2009

The IEEE802.11n Capability Analysis Model Based on Mobile Networking Architecture.
Proceedings of the IEEE International Conference on Systems, 2009

Finding Abnormal Events in Home Sensor Network Environment Using Correlation Graph.
Proceedings of the IEEE International Conference on Systems, 2009

A Fuzzy Risk Assessment in Software Development Defuzzified by Signed Distance.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

Collect and broadcast news in security.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A Process Scheduling Analysis Model Based on Grid Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

Optimal revenue for fuzzy price based on interval-valued fuzzy numbers.
Proceedings of the FUZZ-IEEE 2009, 2009

An evaluation of survey by fuzzy linguistics based on the signed distance method.
Proceedings of the FUZZ-IEEE 2009, 2009

2008
Processing Logical Access Control Command in Computer System.
J. Digit. Content Technol. its Appl., 2008

Consumer Behaviors in Taiwan Online Shopping - Case Study of A Company.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

A New Fuzzy Risk Assessment Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Fuzzy Multiple Objective Programming Based on Interval-Valued Fuzzy Sets.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Fuzzy Production Inventory Based on Signed Distance.
J. Inf. Sci. Eng., 2007

Comparison of Consumer Behaviors in Taiwan Non-store Channels.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Fuzzy Group Assessment for Facility Location Decision.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Certificate and Authority Application Based on Grid Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
A Process Schedule Analyzing Model Based on Grid Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Self-tuning Emergency Model of Home Network Environment.
Proceedings of the Advances in Applied Artificial Intelligence, 2006

A Virtual Reality System on Grid Computing Architecture.
Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications, 2006

2005
Fuzzy Inventory with Backorder Deffuzzificaiton by Signed Distance Method.
J. Inf. Sci. Eng., 2005

A Chinese Text Mining Application: An Automatic Answer Reply to Customers' E-mail Queries Model.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

The Parallel Algorithm for an Improved SUMT Method for Equality Constrained Optimization.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

A Distributed Backup Agent Based on Grid Computing Architecture.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Emergency Model of Home Network Environment Based on Genetic Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Dynamic Supervising Model Based on Grid Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

An Intelligent Extracting Web Content Agent on the Internet.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Gene-based Early Warning Model in Home Network Control.
Proceedings of the IASTED International Conference on Computational Intelligence, 2005

2004
Intelligent Control Model of Information Appliances.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

2003
A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development.
Inf. Sci., 2003

Assessment of the Rate of Aggregative Risk in Software Development using a Fuzzy Group Model.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

The Defuzzification by the Median and Centroid Rules.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003

1999
Generalization of the Group Decision Making Using Fuzzy Sets Theory for Evaluating the Rate of Aggregative Risk in Software Development.
Inf. Sci., 1999

Fuzzy inventory with or without backorder for fuzzy order quantity with trapezoid fuzzy number.
Fuzzy Sets Syst., 1999

Economic order quantity in fuzzy sense for inventory without backorder model.
Fuzzy Sets Syst., 1999

1998
Economic production quantity for fuzzy demand quantity, and fuzzy production quantity.
Eur. J. Oper. Res., 1998

Economic reorder point for fuzzy backorder quantity.
Eur. J. Oper. Res., 1998

1996
Fuzzy Inventory with Backorder for Fuzzy Order Quantity.
Inf. Sci., 1996

Applying fuzzy set theory to evaluate the rate of aggregative risk in software development.
Fuzzy Sets Syst., 1996

Group decision making using fuzzy sets theory for evaluating the rate of aggregative risk in software development.
Fuzzy Sets Syst., 1996


  Loading...