2009 | ||
---|---|---|
35 | EE | Pangfeng Liu, May-Chen Kuo, Da-Wei Wang: An Approximation Algorithm and Dynamic Programming for Reduction in Heterogeneous Environments. Algorithmica 53(3): 425-453 (2009) |
2008 | ||
34 | EE | Tsung-Heng Tsai, Ting-Ting Liu, Yung-Ching Huang, Yu Chen, Tian-Jiun Liu, You-Hsuan Lin, Yuh-Lin Wang, Juen-Kai Wang, Da-Wei Wang: A Multiscale Approach for Surface-enhanced Raman Spectroscopy (SERS) Spectrum Representation and its Application to Bacterial Discrimination. BMEI (2) 2008: 328-333 |
2007 | ||
33 | EE | Lien-Wu Chen, Yu-Chee Tseng, Da-Wei Wang, Jan-Jan Wu: Exploiting Spectral Reuse in Resource Allocation, Scheduling, and Routing for IEEE 802.16 Mesh Networks. VTC Fall 2007: 1608-1612 |
32 | EE | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu: An epistemic framework for privacy protection in database linking. Data Knowl. Eng. 61(1): 176-205 (2007) |
31 | EE | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu: Granulation as a Privacy Protection Mechanism. T. Rough Sets 7: 256-273 (2007) |
2006 | ||
30 | EE | Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu: Information Theoretical Analysis of Two-Party Secret Computation. DBSec 2006: 310-317 |
29 | EE | Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu: Generalized Edge Coloring for Channel Assignment in Wireless Networks. ICPP 2006: 82-92 |
28 | EE | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu: A GrC-Based Approach to Social Network Data Protection. RSCTC 2006: 438-447 |
27 | EE | Cho-chin Lin, Da-Wei Wang, Tsan-sheng Hsu: Bounds on the Client-Server Incremental Computing. IEICE Transactions 89-A(5): 1198-1206 (2006) |
26 | EE | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen: Value versus damage of information release: A data privacy perspective. Int. J. Approx. Reasoning 43(2): 179-201 (2006) |
2005 | ||
25 | EE | Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu: Secrecy of Two-Party Secure Computation. DBSec 2005: 114-123 |
24 | EE | Ean-Wen Huang, Da-Wei Wang, Der-Ming Liou: Development of a deterministic XML schema by resolving structure ambiguity of HL7 messages. Computer Methods and Programs in Biomedicine 80(1): 1-15 (2005) |
23 | EE | Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee: Two Variations of the Minimum Steiner Problem. J. Comb. Optim. 9(1): 101-120 (2005) |
2004 | ||
22 | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen: On The Damage and Compensation of Privacy Leakage. DBSec 2004: 311-324 | |
21 | EE | Cho-chin Lin, Tsan-sheng Hsu, Da-Wei Wang: Bounds on the Client-Server Incremental Computing. ISPAN 2004: 86-91 |
20 | EE | Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu: Medical privacy protection based on granular computing. Artificial Intelligence in Medicine 32(2): 137-149 (2004) |
2003 | ||
19 | EE | Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu: Efficient Parallel I/O Scheduling in the Presence of Data Duplication. ICPP 2003: 231-238 |
18 | EE | Jan-Jan Wu, Da-Wei Wang, Yih-Fang Lin: Placement of I/O servers to improve parallel I/O performance on switch-based clusters. ICS 2003: 244-251 |
17 | EE | Pangfeng Liu, Da-Wei Wang, Yi-Heng Guo: An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters. RTCSA 2003: 38-52 |
2002 | ||
16 | EE | Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen: Quantifying Privacy Leakage through Answering Database Queries. ISC 2002: 162-176 |
15 | EE | Yi-Ting Chiang, Yu-Cheng Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang: How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases. Rough Sets and Current Trends in Computing 2002: 226-233 |
2001 | ||
14 | EE | Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang: A Logical Model for Privacy Protection. ISC 2001: 110-124 |
13 | EE | Kuo-Hui Tsai, Da-Wei Wang, Frank K. Hwang: Lower bounds for wide-sense nonblocking Clos network. Theor. Comput. Sci. 261(2): 323-328 (2001) |
2000 | ||
12 | EE | Pangfeng Liu, Da-Wei Wang: Reduction Optimization in Heterogeneous Cluster Environments. IPDPS 2000: 477-482 |
11 | EE | Xiaoyun Lu, Da-Wei Wang, C. K. Wong: On the bounded domination number of tournaments. Discrete Mathematics 220(1-3): 257-261 (2000) |
1999 | ||
10 | EE | Xiaoyun Lu, Da-Wei Wang, C. K. Wong: The strong Hall property and symmetric chain orders. Discrete Mathematics 203(1-3): 161-168 (1999) |
1998 | ||
9 | EE | Kuo-Hui Tsai, Da-Wei Wang: Lower Bounds for Wide-Sense Non-blocking Clos Network. COCOON 1998: 213-218 |
8 | EE | Xiaoyun Lu, Da-Wei Wang, C. K. Wong: On avoidable and unavoidable claws. Discrete Mathematics 184(1-3): 259-265 (1998) |
1997 | ||
7 | Kuo-Hui Tsai, Da-Wei Wang: Optimal Algorithms for Circle Partitioning. COCOON 1997: 304-310 | |
1996 | ||
6 | Tsan-sheng Hsu, Kuo-Hui Tsai, Da-Wei Wang, D. T. Lee: Steiner Problems on Directed Acyclic Graphs. COCOON 1996: 21-30 | |
1994 | ||
5 | EE | Yehuda Afek, Hagit Attiya, Alan Fekete, Michael J. Fischer, Nancy A. Lynch, Yishay Mansour, Da-Wei Wang, Lenore D. Zuck: Reliable Communication Over Unreliable Channels. J. ACM 41(6): 1267-1297 (1994) |
1992 | ||
4 | Nick Reingold, Da-Wei Wang, Lenore D. Zuck: Games I/O Automata Play (Extended Abstract). CONCUR 1992: 325-339 | |
3 | David S. Greenberg, Gadi Taubenfeld, Da-Wei Wang: Choice Coordination with Multiple Alternatives (Preliminary Version). WDAG 1992: 54-68 | |
1991 | ||
2 | Da-Wei Wang, Lenore D. Zuck: Real-Time Sequence Transmission Problem. PODC 1991: 111-123 | |
1989 | ||
1 | Da-Wei Wang, Lenore D. Zuck: Tight Bounds for the Sequence Transmission Problem. PODC 1989: 73-83 |