Sy-Yen Kuo

Orcid: 0000-0002-3021-8321

According to our database1, Sy-Yen Kuo authored at least 382 papers between 1987 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2001, "For contributions to dependable computing and software reliability engineering.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Accelerating Maximal Biclique Enumeration on GPUs.
CoRR, 2024

2023
Evo-Panel: Dynamic Visualization Tool for Optimization Process.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2023

Missing Recovery: Single Image Reflection Removal Based on Auxiliary Prior Learning.
IEEE Trans. Image Process., 2023

Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications.
IEEE Trans. Ind. Informatics, 2023

Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective.
CoRR, 2023

DehazeNeRF: Multiple Image Haze Removal and 3D Shape Reconstruction using Neural Radiance Fields.
CoRR, 2023

Counting Crowds in Bad Weather.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Certified Robustness of Quantum Classifiers Against Adversarial Examples Through Quantum Noise.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Decentralized Frontier Queue for Improving Scalability of Breadth-First-Search on GPUs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023


Semantic Guidance Learning for High-Resolution Non-homogeneous Dehazing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

NTIRE 2023 Challenge on Stereo Image Super-Resolution: Methods and Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

NTIRE 2023 Image Shadow Removal Challenge Report.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

NTIRE 2023 Challenge on Efficient Super-Resolution: Methods and Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023


TSRFormer: Transformer Based Two-stage Refinement for Single Image Shadow Removal.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023



Boomerang: Physical-Aware Design Space Exploration Framework on RISC-V SonicBOOM Microarchitecture.
Proceedings of the 34th IEEE International Conference on Application-specific Systems, 2023

2022
A Weighted Portfolio Optimization Model Based on the Trend Ratio, Emotion Index, and ANGQTS.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

DesmokeNet: A Two-Stage Smoke Removal Pipeline Based on Self-Attentive Feature Consensus and Multi-Level Contrastive Regularization.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Novel Hypercube-Based Heuristic for Quantum Boolean Circuit Synthesis.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2022

A Hardware Trojan Insertion Framework against Gate-Level Netlist Structural Feature-based and SCOAP-based Detection.
Proceedings of the 65th IEEE International Midwest Symposium on Circuits and Systems, 2022

Semi-supervised Trojan Nets Classification Using Anomaly Detection Based on SCOAP Features.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

Learning Scheme for Adaptive Modulation and Coding in 5G New Radio.
Proceedings of the 6th International Conference on System Reliability and Safety, 2022

Single Image Reflection Removal Based on Bi-Channels Prior.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

RVSL: Robust Vehicle Similarity Learning in Real Hazy Scenes Based on Semi-supervised Learning.
Proceedings of the Computer Vision - ECCV 2022, 2022




Learning Multiple Adverse Weather Removal via Two-stage Knowledge Learning and Multi-contrastive Regularization: Toward a Unified Model.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022


SJDL-Vehicle: Semi-supervised Joint Defogging Learning for Foggy Vehicle Re-identification.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
An Efficient Single Image Enhancement Approach Using Luminance Perception Transformation.
IEEE Trans. Emerg. Top. Comput., 2021

DesnowGAN: An Efficient Single Image Snow Removal Framework Using Cross-Resolution Lateral Connection and GANs.
IEEE Trans. Circuits Syst. Video Technol., 2021

ContourletNet: A Generalized Rain Removal Architecture Using Multi-Direction Hierarchical Representation.
CoRR, 2021

Image Dehazing in Disproportionate Haze Distributions.
IEEE Access, 2021

All Characteristics Preservation: Single Image Dehazing based on Hierarchical Detail Reconstruction Wavelet Decomposition Network.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

ALL Snow Removed: Single Image Desnowing Algorithm Using Hierarchical Dual-tree Complex Wavelet Representation and Contradict Channel Loss.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

LRG-Net: Lightweight Residual Grid Network for Modeling Electrical Induction Motor Dynamics.
Proceedings of the 29th European Signal Processing Conference, 2021

Multi-Modal Bifurcated Network for Depth Guided Image Relighting.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

S3Net: A Single Stream Structure for Depth Guided Image Relighting.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

ContourletNet: A Generalized Rain Removal Architecture Using Multi-Direction Representation and Hierarchical Decomposition.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
Surgical Wounds Assessment System for Self-Care.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Single Image Snow Removal Using Sparse Representation and Particle Swarm Optimizer.
ACM Trans. Intell. Syst. Technol., 2020

PMHLD: Patch Map-Based Hybrid Learning DehazeNet for Single Image Haze Removal.
IEEE Trans. Image Process., 2020

Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications.
IEEE Trans. Ind. Informatics, 2020

Clock-Aware Placement for Large-Scale Heterogeneous FPGAs.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

SPARR: Spintronics-based private aggregatable randomized response for crowdsourced data collection and analysis.
Comput. Commun., 2020

DPARM: Differentially Private Association Rules Mining.
IEEE Access, 2020

Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications.
IEEE Access, 2020

JSTASR: Joint Size and Transparency-Aware Snow Removal Algorithm Based on Modified Partial Convolution and Veiling Effect Removal.
Proceedings of the Computer Vision - ECCV 2020, 2020

Association Rule Mining with Differential Privacy.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

2019
Data Prefetching and Eviction Mechanisms of In-Memory Storage Systems Based on Scheduling for Big Data Processing.
IEEE Trans. Parallel Distributed Syst., 2019

Dependability in Cyber-Physical Systems and Applications.
ACM Trans. Cyber Phys. Syst., 2019

Chronic wound assessment and infection detection method.
BMC Medical Informatics Decis. Mak., 2019

Special issue on Internet of Things (IoT) for in-vehicle systems.
Eng. Appl. Artif. Intell., 2019

NV-DNN: Towards Fault-Tolerant DNN Systems with N-Version Programming.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

PMS-Net: Robust Haze Removal Based on Patch Map for Single Images.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

MDP-trees: multi-domain macro placement for ultra large-scale mixed-size designs.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

Path controllability analysis for high quality designs.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Haze Removal Using Radial Basis Function Networks for Visibility Restoration Applications.
IEEE Trans. Neural Networks Learn. Syst., 2018

Removing Haze Particles From Single Image via Exponential Inference With Support Vector Data Description.
IEEE Trans. Multim., 2018

MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems.
IEEE Trans. Cloud Comput., 2018

FDD-RT: A Simple CSI Acquisition Technique via Channel Reciprocity for FDD Massive MIMO Downlink.
IEEE Syst. J., 2018

Using Tree-Based Approaches to Analyze Dependability and Security on I&C Systems in Safety-Critical Systems.
IEEE Syst. J., 2018

Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

VENUS: Verifiable range query in data streaming.
Proceedings of the IEEE INFOCOM 2018, 2018

Color Channel-Based Smoke Removal Algorithm Using Machine Learning for Static Images.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

Efficient Reflection Removal Algorithm for Single Image by Pixel Compensation and Detail Reconstruction.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

Foreword for the Industry Track.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Error-Optimized Sparse Representation for Single Image Rain Removal.
IEEE Trans. Ind. Electron., 2017

Interfered Users Protection Algorithm for Self-Organizing Networks.
J. Commun., 2017

Special issue on dependability in parallel and distributed systems and applications.
Inf. Sci., 2017

Quality of Service Management for Home Networks Using Online Service Response Prediction.
IEEE Internet Things J., 2017

SER: Secure and efficient retrieval for anonymous range query in wireless sensor networks.
Comput. Commun., 2017

Front-Door Event Classification Algorithm for Elderly People Living Alone in Smart House Using Wireless Binary Sensors.
IEEE Access, 2017

Device-free non-invasive front-door event classification algorithm for forget event detection using binary sensors in the smart house.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Key Management in Internet of Things via Kronecker Product.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Toward Fog-Based Event-Driven Services for Internet of Vehicles: Design and Evaluation.
Proceedings of the Internet of Vehicles. Technologies and Services for Smart Cities, 2017

Clock-aware placement for large-scale heterogeneous FPGAs.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Outage Users First Cell Outage Compensation Algorithm for Self-Organizing Networks.
Proceedings of the International Conference on High Performance Compilation, 2017

Towards a Privacy Rule Conceptual Model for Smart Toys.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

MAS: Mobile-Apps Assessment and Analysis System.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Memory forensics using virtual machine introspection for Malware analysis.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

An effective legalization algorithm for mixed-cell-height standard cells.
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017

Scheduling-Aware Data Prefetching for Data Processing Services in Cloud.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Compressed Sensing-Based Clone Identification in Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Coding-Aided K-Means Clustering Blind Transceiver for Space Shift Keying MIMO Systems.
IEEE Trans. Wirel. Commun., 2016

Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants.
IEEE Trans. Syst. Man Cybern. Syst., 2016

Improved global motion estimation via motion vector clustering for video stabilization.
Eng. Appl. Artif. Intell., 2016

Handling Nondeterminism in Logic Simulation so That Your Waveform Can Be Trusted Again.
IEEE Des. Test, 2016

Moving Object Counting Using a Tripwire in H.265/HEVC Bitstreams for Video Surveillance.
IEEE Access, 2016

Integrated Heterogeneous Infrastructure for Indoor Positioning.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Timing-driven cell placement optimization for early slack histogram compression.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Design and application of novel morphological filter used in vehicle detection.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
ICI Self-Cancellation With Cosine Windowing in OFDM Transmitters Over Fast Time-Varying Channels.
IEEE Trans. Wirel. Commun., 2015

On the Banded Approximation of the Channel Matrix for Mobile OFDM Systems.
IEEE Trans. Veh. Technol., 2015

Fault-Tolerant Operations for Universal Blind Quantum Computation.
ACM J. Emerg. Technol. Comput. Syst., 2015

SFTopk: Secure Functional Top-k Query via Untrusted Data Storage.
IEEE Access, 2015

A block restriction method using guided image filter for Local Histogram Equalization.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Privacy-Preserving Power Request in Smart Grid Networks.
IEEE Syst. J., 2014

Smart and Cooperative Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Parametric Representation of Objects in Color Space Using One-Class Classifiers.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2014

Deadline-Constrained MapReduce Scheduling Based on Graph Modelling.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Wireless local area network cards identification based on transient fingerprinting.
Wirel. Commun. Mob. Comput., 2013

MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013

Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2013

Dynamic software update model for remote entity management of machine-to-machine service capability.
IET Commun., 2013

Enhancing Data Integrity and Privacy in the Cloud: An Agenda.
Computer, 2013

Multi-element antenna with close spacing for highly mobile OFDM systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Reduced-Complexity Blind Detector for MIMO System Using K-Means Clustering Algorithm.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Visibility Enhancement of Single Hazy Images Using Hybrid Dark Channel Prior.
Proceedings of the IEEE International Conference on Systems, 2013

Mining Large Network Reconnaissance Data.
Proceedings of the IEEE 19th Pacific Rim International Symposium on Dependable Computing, 2013

An automatic motion detection algorithm for transport monitoring systems.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

Top-k query result completeness verification in sensor networks.
Proceedings of the IEEE International Conference on Communications, 2013

Dependable Architecture of RFID Middleware on Networked RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Mobile IMS Integration of the Internet of Things in Ecosystem.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Investigating DNS traffic anomalies for malicious activities.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Design of event-based Intrusion Detection System on OpenFlow Network.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Resource Allocation with Interference Avoidance in OFDMA Femtocell Networks.
IEEE Trans. Veh. Technol., 2012

Obstacle-Avoiding Rectilinear Steiner Tree Construction: A Steiner-Point-Based Algorithm.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2012

Holography: a behavior-based profiler for malware analysis.
Softw. Pract. Exp., 2012

An efficient code gateway for RFID seamless applications.
Int. J. Netw. Manag., 2012

Capacity analysis for multiple-input multiple-output relay system in a low-rank line-of-sight environment.
IET Commun., 2012

Compressed Sensing Detector Design for Space Shift Keying in MIMO Systems.
IEEE Commun. Lett., 2012

Bi-Space Shift Keying Modulation for MIMO Systems.
IEEE Commun. Lett., 2012

Throughput improvement of multi-hop wireless mesh networks with cooperative opportunistic routing.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A parallel processing algorithm for Schnorr-Euchner sphere decoder.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Optimal self boundary recognition with two-hop information for ad hoc networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Optimal Frequency Offsets with Doppler Spreads in Mobile OFDM System.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Resource Block Assignment for Interference Avoidance in Femtocell Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

CSI: Compressed sensing-based clone identification in sensor networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

An efficient approach to extract moving objects by the H.264 compressed-domain features.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

Video-based on-road driving safety system with lane detection and vehicle detection.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

Visual saliency-aware radio resource allocation for image transmission in SC-FDMA systems.
Proceedings of the 12th International Conference on ITS Telecommunications, 2012

Quantum Blind Computation with Teleportation-based Computation.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

A self-configurable power control algorithm for cognitive radio-based industrial wireless sensor networks with interference constraints.
Proceedings of IEEE International Conference on Communications, 2012

Privacy- and integrity-preserving range query in wireless sensor networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Socio-organism inspired model forming multi-level computational scheme for integrated IoT service architecture.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

Moving Object Extraction Using Compressed Domain Features of H.264 INTRA Frames.
Proceedings of the Ninth IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2012

Civil UAV Path Planning Algorithm for Considering Connection with Cellular Data Network.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Editorial: Special Issue on Intelligent RFID Network and Innovative Applications.
Wirel. Pers. Commun., 2011

Constrained Function-Based Message Authentication for Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

An Extended XQDD Representation for Multiple-Valued Quantum Logic.
IEEE Trans. Computers, 2011

An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks.
Int. J. Sens. Networks, 2011

On the convergence condition and convergence time of BGP.
Comput. Commun., 2011

Real-Time Video-Based Lane Tracing System with the Sliding Focus Window.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Order-Based Localization Scheme for Ad Hoc Sensor Networks.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

uFlow: Dynamic Software Updating in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

An Efficient Earthquake Early Warning Message Delivery Algorithm Using an in Time Control-Theoretic Approach.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Malware Profiler Based on Innovative Behavior-Awareness Technique.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Interference mitigation through self-organization in OFDMA femtocells.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimization.
Proceedings of the 12th International Symposium on Quality Electronic Design, 2011

Reactor Containment Dependability Analysis in Safety Critical Nuclear Power Plants: Design, Implementation and Experience.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

Quantum signature scheme for vehicular networks using entangled states.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Quantum circuits and quantum message integrity.
Proceedings of the International Carnahan Conference on Security Technology, 2011

Applying verification intention for design customization via property mining under constrained testbenches.
Proceedings of the IEEE 29th International Conference on Computer Design, 2011

Formal reset recovery slack calculation at the register transfer level.
Proceedings of the Design, Automation and Test in Europe, 2011

Facilitating unreachable code diagnosis and debugging.
Proceedings of the 16th Asia South Pacific Design Automation Conference, 2011

2010
Noninteractive pairwise key establishment for sensor networks.
IEEE Trans. Inf. Forensics Secur., 2010

Accurately Handle Don't-Care Conditions in High-Level Designs and Application for Reducing Initialized Registers.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2010

Acquiring Authentic Data in Unattended Wireless Sensor Networks.
Sensors, 2010

Effective design-for-testability techniques for H.264 all-binary integer motion estimation.
IET Circuits Devices Syst., 2010

A network-based mobility management scheme for future Internet.
Comput. Electr. Eng., 2010

Performance assessment and reliability analysis of dependable and distributed computing systems based on BDD and recursive merge.
Appl. Math. Comput., 2010

Finding reset nondeterminism in RTL designs - scalable X-analysis methodology and case study.
Proceedings of the Design, Automation and Test in Europe, 2010

iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Optimizing blocks in an SoC using symbolic code-statement reachability analysis.
Proceedings of the 15th Asia South Pacific Design Automation Conference, 2010

2009
High-performance obstacle-avoiding rectilinear steiner tree construction.
ACM Trans. Design Autom. Electr. Syst., 2009

Design-for-testability techniques for CORDIC design.
Microelectron. J., 2009

Service integration with UPnP agent for an ubiquitous home environment.
Inf. Syst. Frontiers, 2009

Scalable and bijective cells for C-testable iterative logic array architectures.
IET Circuits Devices Syst., 2009

Constrained Function Based En-Route Filtering for Sensor Networks
CoRR, 2009

Secure Multidimensional Queries in Tiered Sensor Networks
CoRR, 2009

Increasing Service Availability in a Wireless Home Network Environment.
Comput. J., 2009

A constrained function based message authentication scheme for sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

MemoIcon: using everyday objects as physical icons.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2009

A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Holography: A Hardware Virtualization Tool for Malware Analysis.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

A DoS-resilient en-route filtering scheme for sensor networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Ubiquitous IMS emergency services over cooperative heterogeneous networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Service unaware handover using API hooking in all-IP networks.
Proceedings of the 2009 International Conference on Information Networking, 2009

Quantum Transmission Integrity Mechanism for Indirect Communication.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Obstacle-avoiding rectilinear Steiner tree construction based on Steiner point selection.
Proceedings of the 2009 International Conference on Computer-Aided Design, 2009

Enhancing bug hunting using high-level symbolic simulation.
Proceedings of the 19th ACM Great Lakes Symposium on VLSI 2009, 2009

Xprobe2++: Low volume remote network information gathering tool.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction.
Proceedings of the 46th Design Automation Conference, 2009

Handling don't-care conditions in high-level synthesis and application for reducing initialized registers.
Proceedings of the 46th Design Automation Conference, 2009

2008
An Efficient Graph-Based Algorithm for ESD Current Path Analysis.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008

Optimization of Hybridized Error Concealment for H.264.
IEEE Trans. Broadcast., 2008

An XQDD-Based Verification Method for Quantum Circuits.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

QBIST: Quantum Built-in Self-Test for any Boolean Circuit.
Proceedings of the 26th IEEE VLSI Test Symposium (VTS 2008), April 27, 2008

Mobile Sensor Network Resilient Against Node Replication Attacks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Towards Adaptive Covert Communication System.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Implementation of OpenWrt-based IP PnP gateway.
Proceedings of the 5th International Conference on Mobile Technology, 2008

A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Temporal Error Concealment for H.264 Using Optimum Regression Plane.
Proceedings of the Advances in Multimedia Modeling, 2008

Optimization of Spatial Error Concealment for H.264 Featuring Low Complexity.
Proceedings of the Advances in Multimedia Modeling, 2008

A 1V 16.9ppm/°C 250nA Switched-Capacitor CMOS Voltage Reference.
Proceedings of the 2008 IEEE International Solid-State Circuits Conference, 2008

Efficient multilayer routing based on obstacle-avoiding preferred direction steiner tree.
Proceedings of the 2008 International Symposium on Physical Design, 2008

2007
Self-Healing Spyware: Detection, and Remediation.
IEEE Trans. Reliab., 2007

Efficient and Exact Reliability Evaluation for Networks With Imperfect Vertices.
IEEE Trans. Reliab., 2007

An Assessment of Testing-Effort Dependent Software Reliability Growth Models.
IEEE Trans. Reliab., 2007

A Low Complexity Design of Reed Solomon Code Algorithm for Advanced RAID System.
IEEE Trans. Consumer Electron., 2007

Quantum Circuit Design and Analysis for Database Search Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

Fast-Transient DC-DC Converter With On-Chip Compensated Error Amplifier.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

Dithering Skip Modulation, Width and Dead Time Controllers in Highly Efficient DC-DC Converters for System-On-Chip Applications.
IEEE J. Solid State Circuits, 2007

On the fundamental performance limits of peer-to-peer data replication in wireless ad hoc networks.
IEEE J. Sel. Areas Commun., 2007

Guest editorial peer-to-peer communications and applications.
IEEE J. Sel. Areas Commun., 2007

Randomised and distributed methods for reliable peer-to-peer data communication in wireless ad hoc networks.
IET Commun., 2007

Editorial Wireless Mobile Networks: Cross-Layer Communication.
IET Commun., 2007

Adaptive Low-Error Fixed-Width Booth Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

MAPMon: A Host-Based Malware Detection Tool.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Enhanced UPnP Control and Management in a Campus Network.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Dependabilities in a High-performance Quantum Real-time Distributed System.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Quantum Entanglement, Non-Locality and Secure Computation.
Proceedings of the First International Conference on Quantum, Nano, and Micro Technologies, 2007

Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Adaptive frequency control technique for enhancing transient performance of DC-DC converters.
Proceedings of the 33rd European Solid-State Circuits Conference, 2007

2006
An efficient algorithm for spare allocation problems.
IEEE Trans. Reliab., 2006

An Algorithm for Minimum Space Quantum Boolean Circuits Construction.
J. Circuits Syst. Comput., 2006

Fuzzy preserving virtual polar coordinate space sensor networks for mobility performance consideration.
Int. J. Sens. Networks, 2006

Signaling Overhead Analysis of Distributed Control for Partition-Based Protection in WDM Mesh Networks.
IEICE Trans. Inf. Syst., 2006

An SPT-based topology control algorithm for wireless ad hoc networks.
Comput. Commun., 2006

Extension headers for IPv6 anycast.
Comput. Commun., 2006

IPv6: More than protocol for next generation Internet.
Comput. Commun., 2006

A Scalable Port Forwarding for P2P-Based Wi-Fi Applications.
Proceedings of the Wireless Algorithms, 2006

A Stateful Approach to Spyware Detection and Removal.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Quantum Oblivious Transfer and Fair Digital Transactions.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

The Survivability of the Augmented Logical Ring Topology in WDM Networks.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Dithering skip modulator with a novel load sensor for ultra-wide-load high-efficiency DC-DC converters.
Proceedings of the 2006 International Symposium on Low Power Electronics and Design, 2006

Current path analysis for electrostatic discharge protection.
Proceedings of the 2006 International Conference on Computer-Aided Design, 2006

A Functional Verification Environment for Advanced Switching Architecture.
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006

Ditherng Skip Modulator with a Width Controller for Ultra-wide-load High-Efficiency DC-DC Converters.
Proceedings of the IEEE 2006 Custom Integrated Circuits Conference, 2006

2005
OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage.
IEEE Trans. Dependable Secur. Comput., 2005

Reliability assessment and sensitivity analysis of software reliability growth modeling based on software module structure.
J. Syst. Softw., 2005

OSA-based service platform for all-IPv6 network environments.
IEEE J. Sel. Areas Commun., 2005

More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability.
J. Inf. Sci. Eng., 2005

All-IPv6 service interworking gateway.
Int. J. Netw. Manag., 2005

A testing framework for Web application security assessment.
Comput. Networks, 2005

A Secure Quantum Communication Protocol Using Insecure Public Channels.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

A Multi-Faceted Approach towards Spam-Resistible Mail.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Dynamic survivable RWA strategy on IP over WDM networks.
Proceedings of the ITRE 2005, 2005

A framework for the design of error-aware power-efficient fixed-width Booth multipliers.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Multiple Failures Restoration by Group Protection in WDM Networks.
Proceedings of the Networking, 2005

Automatic Partitioner for Behavior Level Distributed Logic Simulation.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

A scheme to enhance the error-correcting capability of encoded quantum information.
Proceedings of the 2005 European Conference on Circuit Theory and Design, 2005

Efficient Exact Spare Allocation via Boolean Satisfiability.
Proceedings of the 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 2005

Group Partition and Restoration Strategies for Survivable WDM Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Computing System Failure Frequencies and Reliability Importance Measures Using OBDD.
IEEE Trans. Computers, 2004

A reservation-based multicast protocol for WDM optical star networks.
IEEE J. Sel. Areas Commun., 2004

Distributed Fault-Tolerant Embedding of Several Topologies in Hypercubes.
J. Inf. Sci. Eng., 2004

Adaptive Communication-Induced Checkpointing Protocols with Domino-Effect Freedom.
J. Inf. Sci. Eng., 2004

SPT-based topology algorithm for constructing power efficient wireless ad hoc networks.
Proceedings of the 13th international conference on World Wide Web, 2004

Securing web application code by static analysis and runtime protection.
Proceedings of the 13th international conference on World Wide Web, 2004

Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-Effort.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDD.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

Non-Detrimental Web Application Security Scanning.
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2004

Dependable WDM Networks with Edge-Disjoint P-Cycles.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Load-Balanced Anycast Routing.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Improvments for Dynamic Sub-mesh Restoration Scheme in Dense WDM Networks.
Proceedings of the Information Networking, 2004

An Efficient Algorithm for Reconfiguring Shared Spare RRAM.
Proceedings of the 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 2004

Verifying Web Applications Using Bounded Model Checking.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

IC HTOL Test Stress Condition Optimization.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004

An Efficient Perfect Algorithm for Memory Repair Problems.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004

An XOR Based Reed-Solomon Algorithm for Advanced RAID Systems.
Proceedings of the 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 2004

Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

A Temporal Assertion Extension to Verilog.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

Dynamic Sub-mesh Protection under Dynamic Traffic Demands in Dense WDM Networks.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A Unified Scheme of Some Nonhomogenous Poisson Process Models for Software Reliability Estimation.
IEEE Trans. Software Eng., 2003

Design and Analysis of a Multicasting and Fault-Tolerant Optical Crossconnect for All-Optical Networks.
Photonic Netw. Commun., 2003

An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Mobile IP.
Mob. Networks Appl., 2003

Guest Editors' Introduction.
Mob. Networks Appl., 2003

Efficient Algorithms For Selection And Sorting Of Large Distributed Files On De Bruijn And Hypercube Structures.
Int. J. Found. Comput. Sci., 2003

A Localized Topology Control Algorithm for Constructing Power Efficient Wireless Ad Hoc Networks.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

Minimal Cutset Enumeration and Network Reliability Evaluation by Recursive Merge and BDD.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A Two-level TDM Access Protocol for IP Support in WDM Optical Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

An Efficient Restoration Scheme Using Protection Domain for Dynamic Traffic Demands in WDM Networks.
Proceedings of the Information Networking, 2003

A topology control algorithm for constructing power efficient wireless ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

Communication Strategies for Heartbeat-Style Failure Detectors in Wireless Ad Hoc Networks.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Sensitivity Analysis of Software Reliability for Component-Based Software Applications.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

A Cut-Based Algorithm for Reliability Analysis of Terminal-Pair Network Using OBDD.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
OBDD-based evaluation of k-terminal network reliability.
IEEE Trans. Reliab., 2002

Analysis of incorporating logistic testing-effort function into software reliability modeling.
IEEE Trans. Reliab., 2002

Efficient Selection and Sorting Schemes Using Coteries for Processing Large Distributed Files.
J. Parallel Distributed Comput., 2002

Analysis and Design of a backbone Architecture with TDMA Mechanism for IP Optical Networking.
J. Netw. Syst. Manag., 2002

An Optimistic-Based Partition-Processing Approach for Distributed Shared Memory Systems.
J. Inf. Sci. Eng., 2002

An Optimization-Based Multiple-Voltage Scaling Technique for Low-Power CMOS Digital Design.
J. Circuits Syst. Comput., 2002

Analyzing Network Reliability With Imperfect Nodes Using OBDD.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

A Low Overhead heckpointing Protocol for Mobile Computing Systems.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDD.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Optimal Allocation of Testing Resources for Modular Software Systems.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

Reliable Multicast based on k-Connected Graph.
Proceedings of the Internet and Multimedia Systems and Applications, 2002

Multicasting Optical Crossconnects with Fault Tolerance Mechanism and Wavelength Routing in All-Optical Networks.
Proceedings of the Information Networking, 2002

A reservation based medium access control protocol with multicast support for optical star networks.
Proceedings of the Global Telecommunications Conference, 2002

An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks (Research Note).
Proceedings of the Euro-Par 2002, 2002

Optimal Resource Allocation and Reliability Analysis for Component-Based Software Applications.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Framework for modeling software reliability, using various testing-efforts and fault-detection rates.
IEEE Trans. Reliab., 2001

Converter-free multiple-voltage scaling techniques for low-powerCMOS digital design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2001

Failure Detection Mechanism for Distributed Object Computing Using CORBA.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

Novel Fault-Tolerant Techniques for High Capacity RAMs.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

An optimization-based low-power voltage scaling technique using multiple supply voltages.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

All-Optical Multicasting on Wavelength-Routed WDM Networks with Partial Replica.
Proceedings of the 15th International Conference on Information Networking, 2001

Dependable Wavelength Routing with Spare Rerouting in All-Optical WDM Networks.
Proceedings of the 15th International Conference on Information Networking, 2001

Restoration from Multiple Faults in WDM Networks without Wavelength Conversion.
Proceedings of the Networking, 2001

A Checkpointing Tool for Palm Operating System.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
A New Log-Based Approach to Independent Recovery in Distributed Shraed Memory Systems.
J. Inf. Sci. Eng., 2000

Resolving error propagation in distributed systems.
Inf. Process. Lett., 2000

Quantitative Software Reliability Modeling from Testing to Operation.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

Effort-Index-Based Software Reliability Growth Models and Performance Assessment.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Distributed Fault-Tolerant Ring Embedding and Reconfiguration in Hypercubes.
IEEE Trans. Computers, 1999

Evaluations of Domino-Free Communication-Induced Checkpointing Protocols.
Inf. Process. Lett., 1999

A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

Software reliability modeling and cost estimation incorporating testing-effort and efficiency.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999

Performance Analysis for Unicast and Multicast Traffic in Broadcast-and-Select WDM Networks.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks.
Proceedings of the Fourth IEEE Symposium on Computers and Communications (ISCC 1999), 1999

A cluster-based checkpointing scheme for mobile computing on wide area network.
Proceedings of the Mobile Networks and Computing, 1999

Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1998
Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability.
IEEE Trans. Parallel Distributed Syst., 1998

A New Technique for Optimization Problems in Graph Theory.
IEEE Trans. Computers, 1998

Pragmatic study of parametric decomposition models for estimating software reliability growth.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

Synchronous Flow Control in Wormhole Routed Optical Networks.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

Fault management for adjustable pre-allocation wavelength division multi-access systems.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

1997
Gauss-elimination-based generation of multiple seed-polynomial pairs for LFSR.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1997

Fault-Tolerant Interleaved Memory Systems with Two-Level Redundancy.
IEEE Trans. Computers, 1997

Optimal Release Times for Software Systems with Scheduled Delivery Time Based on the HGDM.
IEEE Trans. Computers, 1997

A New Probabilistic Induction Method.
J. Autom. Reason., 1997

Analysis of a software reliability growth model with logistic testing-effort function.
Proceedings of the Eighth International Symposium on Software Reliability Engineering, 1997

1996
Optimal release policy for hyper-geometric distribution software-reliability growth model.
IEEE Trans. Reliab., 1996

Needed resources for software module test, using the hyper-geometric software reliability growth model.
IEEE Trans. Reliab., 1996

A Fault-Tolerant Tree Communication Scheme for Hypercube Systems.
IEEE Trans. Computers, 1996

Efficient Selection and Sorting Schemes for Processing Large Distributed Files in Finite Projectives Plane.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

Efficient allocation of testing resources for software module testing based on the hyper-geometric distribution software reliability growth model.
Proceedings of the Seventh International Symposium on Software Reliability Engineering, 1996

Design and Implementation of a High Speed Parallel Architecture for ATM UNI.
Proceedings of the 1996 International Symposium on Parallel Architectures, 1996

A Highly Available Partition-Processing Protocol for Distributed Shared Memory Systems.
Proceedings of the Euro-Par '96 Parallel Processing, 1996

Easily Testable Data Path Allocation Using Input/Output Registers.
Proceedings of the 5th Asian Test Symposium (ATS '96), 1996

An Efficient PRPG Strategy By Utilizing Essential Faults.
Proceedings of the 5th Asian Test Symposium (ATS '96), 1996

1995
Hyper-geometric distribution software reliability growth model with imperfect debugging.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

A Gauss-elimination based PRPG for combinational circuits.
Proceedings of the 1995 European Design and Test Conference, 1995

Delay models for the sea-of-wires array synthesis system.
Proceedings of the 1995 European Design and Test Conference, 1995

1994
Applying various learning curves to hyper-geometric distribution software reliability growth model.
Proceedings of the 5th International Symposium on Software Reliability Engineering, 1994

Neural Networks for Optimization Problems in Graph Theory.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Error Recovery in Parallel Systems of Pipelined Processors with Caches.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

Fault Tolerance in Hyperbus and Hypercube Multiprocessors Using Partitioning Scheme.
Proceedings of the Proceedings 1994 International Conference on Parallel and Distributed Systems, 1994

Optimal release policies for hyper-geometric distribution software reliability growth model with scheduled delivery time.
Proceedings of the First Asia-Pacific Software Engineering Conference, 1994

1993
Design and analysis of defect tolerant hierarchical sorting networks.
IEEE Trans. Very Large Scale Integr. Syst., 1993

YOR: a yield-optimizing routing algorithm by minimizing critical areas and vias.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1993

Parallel Garbage Collection and Graph Reducer.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

Artificial Neural Networks for the Bipartite and K-partite Subgraph Problems.
Proceedings of the PARLE '93, 1993

The Sea-of-Wires Array Aynthesis System.
Proceedings of the 30th Design Automation Conference. Dallas, 1993

Matrix-matrix multiplications and fault tolerance on hypercube multiprocessors.
Proceedings of the International Conference on Application-Specific Array Processors, 1993

1992
Computer-aided modeling and evaluation of reconfigurable VLSI processor arrays with VHDL.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1992

Efficient reconfiguration algorithms for degradable VLSI/WSI arrays.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1992

Concurrent Error Detection and Correction in Real-Time Systolic Sorting Arrays.
IEEE Trans. Computers, 1992

Fault Diagnosis and Spare Allocation for Yield Enhancement in Large Reconfigurable PLA's.
IEEE Trans. Computers, 1992

Locating logic design errors via test generation and don't-care propagation.
Proceedings of the conference on European design automation, 1992

1991
Design and Evaluation of Fault-Tolerant Interleaved Memory Systems.
Proceedings of the International Conference on Parallel Processing, 1991

Efficient Parallel Sorting and Merging Algorithms for Two-Dimensional Mesh-Connected Processor Arrays.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Fault diagnosis in reconfigurable VLSI and WSI processor arrays.
J. VLSI Signal Process., 1990

Reconfigurable Cube-Connected Cycles Architectures.
J. Parallel Distributed Comput., 1990

1989
Fault detection and location in reconfigurable VLSI arrays.
Proceedings of the 1989 IEEE International Conference on Computer-Aided Design, 1989

1988
Spare Allocation and Reconfiguration in Large Area VLSI.
Proceedings of the 25th ACM/IEEE Conference on Design Automation, 1988

1987
Efficient Spare Allocation for Reconfigurable Arrays.
IEEE Des. Test, 1987

Fault Tolerance Techniques for Systolic Arrays.
Computer, 1987


  Loading...