2009 |
35 | EE | Pangfeng Liu,
May-Chen Kuo,
Da-Wei Wang:
An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments.
Algorithmica 53(3): 425-453 (2009) |
2008 |
34 | EE | Tsung-Heng Tsai,
Ting-Ting Liu,
Yung-Ching Huang,
Yu Chen,
Tian-Jiun Liu,
You-Hsuan Lin,
Yuh-Lin Wang,
Juen-Kai Wang,
Da-Wei Wang:
A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination.
BMEI (2) 2008: 328-333 |
2007 |
33 | EE | Lien-Wu Chen,
Yu-Chee Tseng,
Da-Wei Wang,
Jan-Jan Wu:
Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks.
VTC Fall 2007: 1608-1612 |
32 | EE | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
An epistemic framework for privacy protection in database linking.
Data Knowl. Eng. 61(1): 176-205 (2007) |
31 | EE | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
Granulation as a Privacy Protection Mechanism.
T. Rough Sets 7: 256-273 (2007) |
2006 |
30 | EE | Da-Wei Wang,
Churn-Jung Liau,
Yi-Ting Chiang,
Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation.
DBSec 2006: 310-317 |
29 | EE | Chun-Chen Hsu,
Pangfeng Liu,
Da-Wei Wang,
Jan-Jan Wu:
Generalized Edge Coloring for Channel Assignment in Wireless Networks.
ICPP 2006: 82-92 |
28 | EE | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
A GrC-Based Approach to Social Network Data Protection.
RSCTC 2006: 438-447 |
27 | EE | Cho-chin Lin,
Da-Wei Wang,
Tsan-sheng Hsu:
Bounds on the Client-Server Incremental Computing.
IEICE Transactions 89-A(5): 1198-1206 (2006) |
26 | EE | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu,
Jeremy K.-P. Chen:
Value versus damage of information release: A data privacy perspective.
Int. J. Approx. Reasoning 43(2): 179-201 (2006) |
2005 |
25 | EE | Yi-Ting Chiang,
Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
Secrecy of Two-Party Secure Computation.
DBSec 2005: 114-123 |
24 | EE | Ean-Wen Huang,
Da-Wei Wang,
Der-Ming Liou:
Development of a deterministic XML schema by resolving structure ambiguity of HL7 messages.
Computer Methods and Programs in Biomedicine 80(1): 1-15 (2005) |
23 | EE | Tsan-sheng Hsu,
Kuo-Hui Tsai,
Da-Wei Wang,
D. T. Lee:
Two Variations of the Minimum Steiner Problem.
J. Comb. Optim. 9(1): 101-120 (2005) |
2004 |
22 | | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu,
Jeremy K.-P. Chen:
On The Damage and Compensation of Privacy Leakage.
DBSec 2004: 311-324 |
21 | EE | Cho-chin Lin,
Tsan-sheng Hsu,
Da-Wei Wang:
Bounds on the Client-Server Incremental Computing.
ISPAN 2004: 86-91 |
20 | EE | Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
Medical privacy protection based on granular computing.
Artificial Intelligence in Medicine 32(2): 137-149 (2004) |
2003 |
19 | EE | Pangfeng Liu,
Da-Wei Wang,
Jan-Jan Wu:
Efficient Parallel I/O Scheduling in the Presence of Data Duplication.
ICPP 2003: 231-238 |
18 | EE | Jan-Jan Wu,
Da-Wei Wang,
Yih-Fang Lin:
Placement of I/O servers to improve parallel I/O performance on switch-based clusters.
ICS 2003: 244-251 |
17 | EE | Pangfeng Liu,
Da-Wei Wang,
Yi-Heng Guo:
An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters.
RTCSA 2003: 38-52 |
2002 |
16 | EE | Tsan-sheng Hsu,
Churn-Jung Liau,
Da-Wei Wang,
Jeremy K.-P. Chen:
Quantifying Privacy Leakage through Answering Database Queries.
ISC 2002: 162-176 |
15 | EE | Yi-Ting Chiang,
Yu-Cheng Chiang,
Tsan-sheng Hsu,
Churn-Jung Liau,
Da-Wei Wang:
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.
Rough Sets and Current Trends in Computing 2002: 226-233 |
2001 |
14 | EE | Tsan-sheng Hsu,
Churn-Jung Liau,
Da-Wei Wang:
A Logical Model for Privacy Protection.
ISC 2001: 110-124 |
13 | EE | Kuo-Hui Tsai,
Da-Wei Wang,
Frank K. Hwang:
Lower bounds for wide-sense nonblocking Clos network.
Theor. Comput. Sci. 261(2): 323-328 (2001) |
2000 |
12 | EE | Pangfeng Liu,
Da-Wei Wang:
Reduction Optimization in Heterogeneous Cluster Environments.
IPDPS 2000: 477-482 |
11 | EE | Xiaoyun Lu,
Da-Wei Wang,
C. K. Wong:
On the bounded domination number of tournaments.
Discrete Mathematics 220(1-3): 257-261 (2000) |
1999 |
10 | EE | Xiaoyun Lu,
Da-Wei Wang,
C. K. Wong:
The strong Hall property and symmetric chain orders.
Discrete Mathematics 203(1-3): 161-168 (1999) |
1998 |
9 | EE | Kuo-Hui Tsai,
Da-Wei Wang:
Lower Bounds for Wide-Sense Non-blocking Clos Network.
COCOON 1998: 213-218 |
8 | EE | Xiaoyun Lu,
Da-Wei Wang,
C. K. Wong:
On avoidable and unavoidable claws.
Discrete Mathematics 184(1-3): 259-265 (1998) |
1997 |
7 | | Kuo-Hui Tsai,
Da-Wei Wang:
Optimal Algorithms for Circle Partitioning.
COCOON 1997: 304-310 |
1996 |
6 | | Tsan-sheng Hsu,
Kuo-Hui Tsai,
Da-Wei Wang,
D. T. Lee:
Steiner Problems on Directed Acyclic Graphs.
COCOON 1996: 21-30 |
1994 |
5 | EE | Yehuda Afek,
Hagit Attiya,
Alan Fekete,
Michael J. Fischer,
Nancy A. Lynch,
Yishay Mansour,
Da-Wei Wang,
Lenore D. Zuck:
Reliable Communication Over Unreliable Channels.
J. ACM 41(6): 1267-1297 (1994) |
1992 |
4 | | Nick Reingold,
Da-Wei Wang,
Lenore D. Zuck:
Games I/O Automata Play (Extended Abstract).
CONCUR 1992: 325-339 |
3 | | David S. Greenberg,
Gadi Taubenfeld,
Da-Wei Wang:
Choice Coordination with Multiple Alternatives (Preliminary Version).
WDAG 1992: 54-68 |
1991 |
2 | | Da-Wei Wang,
Lenore D. Zuck:
Real-Time Sequence Transmission Problem.
PODC 1991: 111-123 |
1989 |
1 | | Da-Wei Wang,
Lenore D. Zuck:
Tight Bounds for the Sequence Transmission Problem.
PODC 1989: 73-83 |