Tsan-sheng Hsu

Orcid: 0000-0001-9721-7617

According to our database1, Tsan-sheng Hsu authored at least 144 papers between 1991 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyses of Tabular AlphaZero on Strongly-Solved Stochastic Games.
IEEE Access, 2023

Building Commuting Flows for an Agent Based Disease Spreading Simulation System Based on Aggregated Information.
Proceedings of the 13th International Conference on Simulation and Modeling Methodologies, 2023

Applying Larger N-Tuple Networks to EinStein Wurfelt Nicht!
Proceedings of the 2023 6th International Conference on Computational Intelligence and Intelligent Systems, 2023

2022
Preliminary Design, Implementation and Observations of the Multi-player Game Tri-Othello.
Proceedings of the International Conference on Technologies and Applications of Artificial Intelligence, 2022

Household Structure Projection: A Monte-Carlo based Approach.
Proceedings of the 12th International Conference on Simulation and Modeling Methodologies, 2022

Using Machine Learning Methods and the Influenza Simulation System to Explore the Similarities of Taiwan's Administrative Regions.
Proceedings of the 11th International Conference on Data Science, 2022

2021
Facilitating external sorting on SMR-based large-scale storage systems.
Future Gener. Comput. Syst., 2021

Changing of Spreading Dynamics for Infectious Diseases in an Aging Society: A Simulation Case Study on Flu Pandemic.
Proceedings of the 11th International Conference on Simulation and Modeling Methodologies, 2021

Eco-feller: Minimizing the Energy Consumption of Random Forest Algorithm by an Eco-pruning Strategy over MLC NVRAM.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Opponent Model Selection Using Deep Learning.
Proceedings of the Advances in Computer Games - 17th International Conference, 2021

2020
Streaming Complexity of Spanning Tree Computation.
Proceedings of the 37th International Symposium on Theoretical Aspects of Computer Science, 2020

2019
Study Simulated Epidemics with Deep Learning.
Proceedings of the 9th International Conference on Simulation and Modeling Methodologies, 2019

2018
Compressing Chinese Dark Chess Endgame Databases by Deep Learning.
IEEE Trans. Games, 2018

An investigation of strength analysis metrics for game-playing programs: A case study in Chinese dark chess.
J. Int. Comput. Games Assoc., 2018

The number of effective moves for Chinese chess.
J. Int. Comput. Games Assoc., 2018

Analysis and efficient solutions for 2 × 4 Chinese dark chess.
J. Int. Comput. Games Assoc., 2018

Using Chinese dark chess endgame databases to validate and fine-tune game evaluation functions.
J. Int. Comput. Games Assoc., 2018

AlphaZero for a Non-Deterministic Game.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2018

2017
Utilizing Multi-Level Data Fault Tolerance to Converse Energy on Software-Defined Storage.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Applying Deep Learning for Surrogate Construction of Simulation Systems.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2017

Learning from Simulated World - Surrogates Construction with Deep Neural Network.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

Enabling Multi-Level Data Fault Tolerance on Software-Defined Storage System.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

An update-overhead-aware caching policy for write-optimized file systems on SMR disks.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Validating and Fine-Tuning of Game Evaluation Functions Using Endgame Databases.
Proceedings of the Computer Games - 6th Workshop, 2017

Analysis and improvement of the 3-star algorithm for the STP-MSP problem in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Computing, 2017

Enhancing Usability for the Wireless Charging Vehicle Simulator.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Mitigating the Write Amplification Problem of Write-Optimized File Systems on Flash Storage.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017

2016
BASE: an assistant tool to precisely simulate energy consumption and reliability of energy-efficient storage systems.
Softw. Pract. Exp., 2016

The Power of Surrogate-Assisted Evolutionary Computing in Searching Vaccination Strategy.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Searching Vaccination Strategy with Surrogate-assisted Evolutionary Computing.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Improving the 3-star approximation algorithm for relay node placement in wireless sensor network.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Exploiting the locality of virtual-machine images to boost the performance of a cloud platform.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Developing a user-friendly sensor network simulator to imitate wireless charging vehicle behaviors.
Proceedings of the 2016 International Conference on Computing, 2016

ShareEnergy: Configuring Mobile Relays to Extend Sensor Networks Lifetime Based on Residual Power.
Proceedings of the 2016 International Conference on Collaboration Technologies and Systems, 2016

2015
An Energy-Efficient and Reliable Storage Mechanism for Data-Intensive Academic Archive Systems.
ACM Trans. Storage, 2015

Equivalence Classes in Chinese Dark Chess Endgames.
IEEE Trans. Comput. Intell. AI Games, 2015

An effective monitoring framework and user interface design.
Softw. Pract. Exp., 2015

Finding Articulation Points of Large Graphs in Linear Time.
Proceedings of the Algorithms and Data Structures - 14th International Symposium, 2015

Prolong Lifetime of Dynamic Sensor Network by an Intelligent Wireless Charging Vehicle.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

The Impact of Household Structures on Pandemic Influenza Vaccination Priority.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015

A study of suitable fault tolerance frameworks for an energy-efficient storage system.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

A QoS-Aware Data Reconstruction Strategy for a Data Fault-Tolerant Storage System.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Compressing Chinese dark chess endgame databases.
Proceedings of the 2015 IEEE Conference on Computational Intelligence and Games, 2015

Convergence and correctness analysis of Monte-Carlo tree search algorithms: A case study of 2 by 4 Chinese dark chess.
Proceedings of the 2015 IEEE Conference on Computational Intelligence and Games, 2015

2014
Algorithms and Computation (ISAAC 2012).
Theor. Comput. Sci., 2014

A logical framework for privacy-preserving social network publication.
J. Appl. Log., 2014

Advanced Meta-knowledge for Chinese Chess Endgame Knowledge Bases.
J. Int. Comput. Games Assoc., 2014

Adaptable Scheduling Algorithm for Grids with Resource Redeployment Capability.
J. Grid Comput., 2014

Preface Algorithms and Computation (ISAAC 2012).
Algorithmica, 2014

A comparison between a deterministic, compartmental model and an individual based-stochastic model for simulating the transmission dynamics of pandemic influenza.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

An Information-Theoretic Approach for Secure Protocol Composition.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A High Efficient Disk Scheduling Framework with QoS Mechanism in Xen-Based Cloud Platforms.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

2013
Energy Efficient Geographic Routing Algorithms in Wireless Sensor Network.
J. Interconnect. Networks, 2013

Guest Editors' Foreword.
Int. J. Comput. Geom. Appl., 2013

Multilevel Inference in Chinese Chess Endgame Knowledge Bases.
J. Int. Comput. Games Assoc., 2013

Privacy-Preserving Social Network Publication Based on Positional Indiscernibility.
Proceedings of the Scalable Uncertainty Management - 7th International Conference, 2013

Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

LaSA: A locality-aware scheduling algorithm for Hadoop-MapReduce resource assignment.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Integrating deadline-modification SCAN algorithm to Xen-based cloud platform.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

BASE: Benchmark analysis software for energy-efficient solutions in large-scale storage systems.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

Automatic Generation of Opening Books for Dark Chess.
Proceedings of the Computers and Games - 8th International Conference, 2013

A Quantitative Study of 2 \times 4 2 × 4 Chinese Dark Chess.
Proceedings of the Computers and Games - 8th International Conference, 2013

A Scripting Language for Automating Secure Multiparty Computation.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Aggregating consistent endgame knowledge in Chinese Chess.
Knowl. Based Syst., 2012

KANI wins the 5x5 Shogi Tournament at the TCGA 2012.
J. Int. Comput. Games Assoc., 2012

CacheRAID: An Efficient Adaptive Write Cache Policy to Conserve RAID Disk Array Energy.
Proceedings of the IEEE Fifth International Conference on Utility and Cloud Computing, 2012

A Probabilistic Hybrid Logic for Sanitized Information Systems.
Proceedings of the Scalable Uncertainty Management - 6th International Conference, 2012

Simple and Efficient Algorithms to Get a Finer Resolution in a Stochastic Discrete Time Agent-Based Simulation.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2012

A Simple Efficient Technique to Adjust Time Step Size in a Stochastic Discrete Time Agent-based Simulation.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Logic, Probability, and Privacy: A Framework for Specifying Privacy Requirements.
Proceedings of the Turing-100, 2012

2011
Game Tree Search with Adaptive Resolution.
Proceedings of the Advances in Computer Games - 13th International Conference, 2011

2010
Privacy-Preserving Collaborative Recommender Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2010

The bridge-connectivity augmentation problem with a partition constraint.
Theor. Comput. Sci., 2010

Heterogeneous Subset Sampling.
Proceedings of the Computing and Combinatorics, 16th Annual International Conference, 2010

Knowledge Abstraction in Chinese Chess Endgame Databases.
Proceedings of the Computers and Games - 7th International Conference, 2010

2009
Toward Empirical Aspects of Secure Scalar Product.
IEEE Trans. Syst. Man Cybern. Part C, 2009

Smallest Bipartite Bridge-Connectivity Augmentation.
Algorithmica, 2009

Two-Vertex Connectivity Augmentations for Graphs with a Partition Constraint (Extended Abstract).
Proceedings of the Algorithms and Computation, 20th International Symposium, 2009

An Intelligent Tutoring System of Chinese Chess.
Proceedings of the Next-Generation Applied Intelligence, 2009

An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Conflict Resolution of Chinese Chess Endgame Knowledge Base.
Proceedings of the Advances in Computer Games, 12th International Conference, 2009

2008
Towards Efficient Privacy-preserving Collaborative Recommender Systems.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Scalar-product based Secure Two-party Computation.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Logical Definability in Social Position Analysis.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Knowledge Inferencing on Chinese Chess Endgames.
Proceedings of the Computers and Games, 6th International Conference, CG 2008, Beijing, 2008

2007
Granulation as a Privacy Protection Mechanism.
Trans. Rough Sets, 2007

An epistemic framework for privacy protection in database linking.
Data Knowl. Eng., 2007

Smallest Bipartite Bridge-Connectivity Augmentation (Extended Abstract).
Proceedings of the Algorithmic Aspects in Information and Management, 2007

2006
Value versus damage of information release: A data privacy perspective.
Int. J. Approx. Reason., 2006

Bounds on the Client-Server Incremental Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

The Hamiltonian problem on distance-hereditary graphs.
Discret. Appl. Math., 2006

A GrC-Based Approach to Social Network Data Protection.
Proceedings of the Rough Sets and Current Trends in Computing, 2006

Attribute-oriented Granulation for Privacy Protection.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Privacy Protection in Social Network Data Disclosure Based on Granular Computing.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

Information Theoretical Analysis of Two-Party Secret Computation.
Proceedings of the Data and Applications Security XX, 2006

Abstracting Knowledge from Annotated Chinese-Chess Game Records.
Proceedings of the Computers and Games, 5th International Conference, 2006

The Graph-History Interaction Problem in Chinese Chess.
Proceedings of the Advances in Computer Games, 11th International Conference, 2006

2005
Optimal Augmentation for Bipartite Componentwise Biconnectivity in Linear Time.
SIAM J. Discret. Math., 2005

Two Variations of the Minimum Steiner Problem.
J. Comb. Optim., 2005

Secrecy of Two-Party Secure Computation.
Proceedings of the Data and Applications Security XIX, 2005

2004
Checking Indefinitely in Chinese Chess Endgames.
J. Int. Comput. Games Assoc., 2004

Medical privacy protection based on granular computing.
Artif. Intell. Medicine, 2004

On The Damage and Compensation of Privacy Leakage.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

An External-Memory Retrograde Analysis Algorithm.
Proceedings of the Computers and Games, 4th International Conference, 2004

2003
Preserving confidentiality when sharing medical database with the Cellsecu system.
Int. J. Medical Informatics, 2003

Efficient Algorithms for Descendent Subtrees Comparison of Phylogenetic Trees with Applications to Co-evolutionary Classifications in Bacterial Genome.
Proceedings of the Algorithms and Computation, 14th International Symposium, 2003

2002
Characterization of Efficiently Parallel Solvable Problems on Distance-Hereditary Graphs.
SIAM J. Discret. Math., 2002

Simpler and faster biconnectivity augmentation.
J. Algorithms, 2002

Verification of Endgame Databases.
J. Int. Comput. Games Assoc., 2002

How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.
Proceedings of the Rough Sets and Current Trends in Computing, 2002

Quantifying Privacy Leakage through Answering Database Queries.
Proceedings of the Information Security, 5th International Conference, 2002

Efficient Algorithms for the Hamiltonian Problem on Distance-Hereditary Graphs.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

Indefinite Sequence of Moves in Chinese Chess Endgames.
Proceedings of the Computers and Games, Third International Conference, CG 2002, Edmonton, 2002

2001
A Logical Model for Privacy Protection.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Edge and node searching problems on trees.
Theor. Comput. Sci., 2000

A multi-tree routing scheme using acyclic orientations.
Theor. Comput. Sci., 2000

Task Allocation on a Network of Processors.
IEEE Trans. Computers, 2000

On Four-Connecting a Triconnected Graph.
J. Algorithms, 2000

A Faster Implementation of a Parallel Tree Contraction Scheme and Its Application on Distance-Hereditary Graphs.
J. Algorithms, 2000

Graph Searching on Some Subclasses of Chordal Graphs.
Algorithmica, 2000

Simpler and Faster Vertex-Connectivity Augmentation Algorithms.
Proceedings of the Algorithms, 2000

Construction of Chinese Chess Endgame Databases by Retrograde Analysis.
Proceedings of the Computers and Games, Second International Conference, 2000

1999
Efficient Parallel Algorithms on Distance Hereditary Graphs.
Parallel Process. Lett., 1999

1998
A Unifying Augmentation Algorithm for Two-Edge Connectivity and Biconnectivity.
J. Comb. Optim., 1998

Characterization of Efficiently Solvable Problems on Distance-Hereditary Graphs.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998

A New Simple Parallel Tree Contraction Scheme and Its Application on Distance-Hereditary Graphs.
Proceedings of the Solving Irregularly Structured Problems in Parallel, 1998

A Linear-Time Algorithm for Constructing an Optimal Node-Search Strategy of a Tree.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998

Executing Divisible Jobs on a Network with a Fixed Number of Processors.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998

1997
Scheduling Problems in a Practical Allocation Model.
J. Comb. Optim., 1997

Security Problems for Statistical Databases with General Cell Suppressions.
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997

1996
Efficient Massively Parallel Implementation of some Combinatorial Algorithms.
Theor. Comput. Sci., 1996

Graph Searching on Chordal Graphs.
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Bounds and Algorithms for a Practical Task Allocation Model (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Optimal Augmentation for Bipartite Componentwise Biconnectiviy in Linear Time (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Steiner Problems on Directed Acyclic Graphs.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

Optimal Bi-Level Augmentation for Selectivity Enhancing Graph Connectivity with Applications.
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

1995
Efficient implementation of virtual processing for some combinatorial algorithms on the MasPar MP-1.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Undirected Vertex-Connectivity Structure and Smallest Four-Vertex-Connectivity Augmentation.
Proceedings of the Algorithms and Computation, 6th International Symposium, 1995

Implementation of parallel graph algorithms on a massively parallel SIMD computer with virtual processing.
Proceedings of IPPS '95, 1995

1994
Parallel implementation of algorithms for finding connected components in graphs.
Proceedings of the Parallel Algorithms, 1994

1993
Finding a Smallest Augmentation to Biconnect a Graph.
SIAM J. Comput., 1993

1992
On Four-Connecting a Triconnected Graph (Extended Abstract)
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992

Implementation of Parallel Graph Algorithms on the MasPar.
Proceedings of the Computational Support for Discrete Mathematics, 1992

1991
A Linear Time Algorithm for Triconnectivity Augmentation (Extended Abstract)
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991


  Loading...