default search action
Shi-Jinn Horng
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j154]Ronggang Cai, Hongmei Chen, Yong Mi, Tianrui Li, Chuan Luo, Shi-Jinn Horng:
Multi-view clustering via double spaces structure learning and adaptive multiple projection regression learning. Inf. Sci. 688: 121396 (2025) - 2024
- [j153]Zelong Wang, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Joint subspace reconstruction and label correlation for multi-label feature selection. Appl. Intell. 54(11-12): 1117-1143 (2024) - [j152]Tengyu Yin, Hongmei Chen, Zhong Yuan, Binbin Sang, Shi-Jinn Horng, Tianrui Li, Chuan Luo:
LEFMIFS: Label enhancement and fuzzy mutual information for robust multilabel feature selection. Eng. Appl. Artif. Intell. 133: 108108 (2024) - [j151]Yong Yang, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Sparse low-redundancy multilabel feature selection based on dynamic local structure preservation and triple graphs exploration. Expert Syst. Appl. 242: 122730 (2024) - [j150]Ronggang Cai, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Feature-guided multi-view clustering by jointing local subspace label learning and global label learning. Expert Syst. Appl. 252: 124191 (2024) - [j149]Tengyu Yin, Hongmei Chen, Jihong Wan, Pengfei Zhang, Shi-Jinn Horng, Tianrui Li:
Exploiting feature multi-correlations for multilabel feature selection in robust multi-neighborhood fuzzy β covering space. Inf. Fusion 104: 102150 (2024) - [j148]Yu Luo, Hongmei Chen, Tengyu Yin, Shi-Jinn Horng, Tianrui Li:
Dual hypergraphs with feature weighted and latent space learning for the diagnosis of Alzheimer's disease. Inf. Fusion 112: 102546 (2024) - [j147]Huming Liao, Hongmei Chen, Tengyu Yin, Shi-Jinn Horng, Tianrui Li:
Adaptive orthogonal semi-supervised feature selection with reliable label matrix learning. Inf. Process. Manag. 61(4): 103727 (2024) - [j146]Duanzhang Li, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Unsupervised feature selection via dual space-based low redundancy scores and extended OLSDA. Inf. Sci. 662: 120227 (2024) - [j145]Huming Liao, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Sparse orthogonal supervised feature selection with global redundancy minimization, label scaling, and robustness. Inf. Sci. 666: 120454 (2024) - [j144]Yong Mi, Hongmei Chen, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Unsupervised feature selection with high-order similarity learning. Knowl. Based Syst. 285: 111317 (2024) - [j143]Zhi Qin, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Multi-label Feature selection with adaptive graph learning and label information enhancement. Knowl. Based Syst. 285: 111363 (2024) - [j142]Zhi Qin, Hongmei Chen, Tengyu Yin, Zhong Yuan, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Adaptive label secondary reconstruction for missing multi-label learning. Knowl. Based Syst. 299: 112019 (2024) - [j141]Longyan Xiang, Hongmei Chen, Tengyu Yin, Shi-Jinn Horng, Tianrui Li:
Unsupervised feature selection based on bipartite graph and low-redundant regularization. Knowl. Based Syst. 302: 112379 (2024) - [j140]Yong Mi, Hongmei Chen, Zhong Yuan, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Fast Multi-view Subspace Clustering with Balance Anchors Guidance. Pattern Recognit. 145: 109895 (2024) - [j139]Ronggang Cai, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Multi-view clustering via pseudo-label guide learning and latent graph structure recovery. Pattern Recognit. 151: 110420 (2024) - [j138]Tengyu Yin, Hongmei Chen, Zhihong Wang, Keyu Liu, Zhong Yuan, Shi-Jinn Horng, Tianrui Li:
Feature selection for multilabel classification with missing labels via multi-scale fusion fuzzy uncertainty measures. Pattern Recognit. 154: 110580 (2024) - [j137]Duanzhang Li, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Dual space-based fuzzy graphs and orthogonal basis clustering for unsupervised feature selection. Pattern Recognit. 155: 110683 (2024) - 2023
- [j136]Yong Yang, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Multi-label feature selection based on stable label relevance and label-specific features. Inf. Sci. 648: 119525 (2023) - [j135]Ping Deng, Tianrui Li, Dexian Wang, Hongjun Wang, Hong Peng, Shi-Jinn Horng:
Multi-view clustering guided by unconstrained non-negative matrix factorization. Knowl. Based Syst. 266: 110425 (2023) - [j134]Mengshi Huang, Hongmei Chen, Yong Mi, Chuan Luo, Shi-Jinn Horng, Tianrui Li:
Joint sparse latent representation learning and dual manifold regularization for unsupervised feature selection. Knowl. Based Syst. 282: 111105 (2023) - [j133]Ping Deng, Tianrui Li, Hongjun Wang, Dexian Wang, Shi-Jinn Horng, Rui Liu:
Graph Regularized Sparse Non-Negative Matrix Factorization for Clustering. IEEE Trans. Comput. Soc. Syst. 10(3): 910-921 (2023) - [j132]Tengyu Yin, Hongmei Chen, Zhong Yuan, Jihong Wan, Keyu Liu, Shi-Jinn Horng, Tianrui Li:
A Robust Multilabel Feature Selection Approach Based on Graph Structure Considering Fuzzy Dependency and Feature Interaction. IEEE Trans. Fuzzy Syst. 31(12): 4516-4528 (2023) - [j131]Thi-Van Nguyen, Shi-Jinn Horng, Dinh-Trung Vu, Hongmei Chen, Tianrui Li:
LAWNet: A Lightweight Attention-Based Deep Learning Model for Wrist Vein Verification in Smartphones Using RGB Images. IEEE Trans. Instrum. Meas. 72: 1-10 (2023) - 2022
- [j130]Ping Deng, Fan Zhang, Tianrui Li, Hongjun Wang, Shi-Jinn Horng:
Biased unconstrained non-negative matrix factorization for clustering. Knowl. Based Syst. 239: 108040 (2022) - [j129]Shi-Jinn Horng, Dinh-Trung Vu, Thi-Van Nguyen, Wanlei Zhou, Chin-Teng Lin:
Recognizing Palm Vein in Smartphones Using RGB Images. IEEE Trans. Ind. Informatics 18(9): 5992-6002 (2022) - [j128]Shi-Jinn Horng, Julian Supardi, Wanlei Zhou, Chin-Teng Lin, Bin Jiang:
Recognizing Very Small Face Images Using Convolution Neural Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2103-2115 (2022) - [c84]Shi-Jinn Horng, Yun-Jhu Zeng:
Improving Embedded Target Tracking Systems Based on Siamese Networks with Infrared Images. AICAS 2022: 419-422 - [i4]Yao-Ching Yu, Shi-Jinn Horng:
CLCNet: Rethinking of Ensemble Modeling with Classification Confidence Network. CoRR abs/2205.09612 (2022) - 2021
- [j127]Pei-Wen Chiang, Shi-Jinn Horng:
Hybrid Time-Series Framework for Daily-Based PM2.5 Forecasting. IEEE Access 9: 104162-104176 (2021) - [j126]Yong-Yi Fanjiang, Cheng-Chi Lee, Yan-Ta Du, Shi-Jinn Horng:
Palm Vein Recognition Based on Convolutional Neural Network. Informatica 32(4): 687-708 (2021) - [j125]Ping Deng, Tianrui Li, Hongjun Wang, Shi-Jinn Horng, Zeng Yu, Xiaomin Wang:
Tri-regularized nonnegative matrix tri-factorization for co-clustering. Knowl. Based Syst. 226: 107101 (2021) - [j124]Shengdong Du, Tianrui Li, Yan Yang, Shi-Jinn Horng:
Deep Air Quality Forecasting Using Hybrid Deep Learning Framework. IEEE Trans. Knowl. Data Eng. 33(6): 2412-2424 (2021) - 2020
- [j123]Shengdong Du, Tianrui Li, Xun Gong, Shi-Jinn Horng:
A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning. Int. J. Comput. Intell. Syst. 13(1): 85-97 (2020) - [j122]Shengdong Du, Tianrui Li, Yan Yang, Shi-Jinn Horng:
Multivariate time series forecasting via attention-based encoder-decoder framework. Neurocomputing 388: 269-279 (2020) - [j121]Yanyong Huang, Tianrui Li, Chuan Luo, Hamido Fujita, Shi-Jinn Horng, Bin Wang:
Dynamic maintenance of rough approximations in multi-source hybrid information systems. Inf. Sci. 530: 108-127 (2020) - [j120]Shi-Jinn Horng, Cheng-Chung Lu, Wanlei Zhou:
An Identity-Based and Revocable Data-Sharing Scheme in VANETs. IEEE Trans. Veh. Technol. 69(12): 15933-15946 (2020)
2010 – 2019
- 2019
- [j119]Ping Deng, Hongjun Wang, Tianrui Li, Shi-Jinn Horng, Xinwen Zhu:
Linear discriminant analysis guided by unsupervised ensemble learning. Inf. Sci. 480: 211-221 (2019) - [j118]Ping-Juei Liu, Shi-Jinn Horng, Jzau-Sheng Lin, Tianrui Li:
Contrast in Haze Removal: Configurable Contrast Enhancement Model Based on Dark Channel Prior. IEEE Trans. Image Process. 28(5): 2212-2227 (2019) - [c83]Shengdong Du, Tianrui Li, Yan Yang, Xun Gong, Shi-Jinn Horng:
An LSTM based Encoder-Decoder Model for MultiStep Traffic Flow Prediction. IJCNN 2019: 1-8 - 2018
- [j117]Guoen Cai, Zhirong Lin, Houde Dai, Xuke Xia, Yongsheng Xiong, Shi-Jinn Horng, Tim C. Lueth:
Quantitative assessment of parkinsonian tremor based on a linear acceleration extraction algorithm. Biomed. Signal Process. Control. 42: 53-62 (2018) - [j116]Yanyong Huang, Tianrui Li, Chuan Luo, Hamido Fujita, Shi-Jinn Horng:
Dynamic Fusion of Multisource Interval-Valued Data by Fuzzy Granulation. IEEE Trans. Fuzzy Syst. 26(6): 3403-3417 (2018) - [c82]Heri Prasetyo, Didi Rosiyadi, Shi-Jinn Horng:
Modified Generalized Random Grids-Based Progressive Secret Sharing with Lossless Ability for Binary Image. IC3INA 2018: 181-186 - [c81]Ruey-Shun Chen, Yeh-Cheng Chen, Xiaopeng Fan, Naixue Xiong, Yu-Xi Hu, Shi-Jinn Horng, S. P. Chen:
RFID-Based System on Emergency Medical Care. PAAP 2018: 6-11 - [c80]Ruey-Shun Chen, Yu-Xi Hu, Xiaopeng Fan, Yeh-Cheng Chen, Shi-Jinn Horng, T.-C. Wang, Naixue Xiong:
Cache Optimization Method to Reduce Network Traffic in Communication Systems. PAAP 2018: 122-125 - [c79]Shi-Jinn Horng, Xuan-Zi Hu, Bin Li, Naixue Xiong:
Personal Identification via Heartbeat Signal. PAAP 2018: 152-156 - [c78]Shi-Jinn Horng, Xuan-Zi Hu, Wen-Lian Cao, Naixue Xiong:
Gesture Recognition Applications Developed in Embedded Systems. PAAP 2018: 157-162 - [c77]Shengdong Du, Tianrui Li, Shi-Jinn Horng:
Time Series Forecasting Using Sequence-to-Sequence Deep Learning Framework. PAAP 2018: 171-176 - [c76]Ping Deng, Hongjun Wang, Shi-Jinn Horng, Dexian Wang, Ji Zhang, Hengxue Zhou:
Softmax Regression by Using Unsupervised Ensemble Learning. PAAP 2018: 196-201 - [i3]Shengdong Du, Tianrui Li, Xun Gong, Zeng Yu, Shi-Jinn Horng:
A Hybrid Method for Traffic Flow Forecasting Using Multimodal Deep Learning. CoRR abs/1803.02099 (2018) - [i2]Shengdong Du, Tianrui Li, Yan Yang, Shi-Jinn Horng:
Deep Air Quality Forecasting Using Hybrid Deep Learning Framework. CoRR abs/1812.04783 (2018) - 2017
- [j115]Yunge Jing, Tianrui Li, Junfu Huang, Hongmei Chen, Shi-Jinn Horng:
A Group Incremental Reduction Algorithm with Varying Data Values. Int. J. Intell. Syst. 32(9): 900-925 (2017) - [j114]Yanyong Huang, Tianrui Li, Chuan Luo, Hamido Fujita, Shi-Jinn Horng:
Matrix-based dynamic updating rough fuzzy approximations for data mining. Knowl. Based Syst. 119: 273-283 (2017) - [j113]Yanyong Huang, Tianrui Li, Chuan Luo, Hamido Fujita, Shi-Jinn Horng:
Dynamic variable precision rough set approach for probabilistic set-valued information systems. Knowl. Based Syst. 122: 131-147 (2017) - [j112]Shiang-Feng Tzeng, Shi-Jinn Horng, Tianrui Li, Xian Wang, Po-Hsian Huang, Muhammad Khurram Khan:
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans. Veh. Technol. 66(4): 3235-3248 (2017) - [c75]Zhirong Lin, Houde Dai, Yongsheng Xiong, Xuke Xia, Shi-Jinn Horng:
Quantification assessment of bradykinesia in Parkinson's disease based on a wearable device. EMBC 2017: 803-806 - [c74]Shengdong Du, Tianrui Li, Xun Gong, Yan Yang, Shi-Jinn Horng:
Traffic flow forecasting based on hybrid deep learning framework. ISKE 2017: 1-6 - [c73]Bin Wang, Tianrui Li, Yanyong Huang, Huaishao Luo, Dongming Guo, Shi-Jinn Horng:
Diverse activation functions in deep learning. ISKE 2017: 1-6 - [e2]Shi-Jinn Horng:
18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017, Taipei, Taiwan, December 18-20, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3151-5 [contents] - 2016
- [j111]Danial Hooshyar, Rodina Binti Ahmad, Moslem Yousefi, Moein Fathi, Shi-Jinn Horng, Heuiseok Lim:
Applying an online game-based formative assessment in a flowchart-based intelligent tutoring system for improving problem-solving skills. Comput. Educ. 94: 18-36 (2016) - [j110]Yunge Jing, Tianrui Li, Chuan Luo, Shi-Jinn Horng, Guoyin Wang, Zeng Yu:
An incremental approach for attribute reduction based on knowledge granularity. Knowl. Based Syst. 104: 24-38 (2016) - [j109]Mahmoud E. Farfoura, Shi-Jinn Horng, Jing-Ming Guo, Ali Al-Haj:
Low complexity semi-fragile watermarking scheme for H.264/AVC authentication. Multim. Tools Appl. 75(13): 7465-7493 (2016) - [c72]Yanyong Huang, Tianrui Li, Chuan Luo, Shi-Jinn Horng:
Matrix-Based Rough Set Approach for Dynamic Probabilistic Set-Valued Information Systems. IJCRS 2016: 197-206 - 2015
- [j108]Rong-Jian Chen, Shi-Jinn Horng, Po-Hsian Huang:
Anti-forensic steganography using multi-bit MER with flexible bit location. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 54-66 (2015) - [j107]Danial Hooshyar, Rodina Binti Ahmad, Mohd Hairul Nizam Md. Nasir, Shahaboddin Shamshirband, Shi-Jinn Horng:
Flowchart-based programming environments for improving comprehension and problem-solving skill of novice programmers: a survey. Int. J. Adv. Intell. Paradigms 7(1): 24-56 (2015) - [j106]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014. Int. J. Distributed Sens. Networks 11: 958190:1-958190:2 (2015) - [j105]Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 317: 48-66 (2015) - [j104]Danial Hooshyar, Rodina Binti Ahmad, Moslem Yousefi, Farrah Dina Yusop, Shi-Jinn Horng:
A flowchart-based intelligent tutoring system for improving problem-solving skills of novice programmers. J. Comput. Assist. Learn. 31(4): 345-361 (2015) - [j103]Hongmei Chen, Tianrui Li, Chuan Luo, Shi-Jinn Horng, Guoyin Wang:
A Decision-Theoretic Rough Set Approach for Dynamic Data Mining. IEEE Trans. Fuzzy Syst. 23(6): 1958-1970 (2015) - [c71]Didi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko:
A resistant digital image watermarking scheme based on masking model. ICCST 2015: 1-4 - [c70]Yanyong Huang, Tianrui Li, Chuan Luo, Shi-Jinn Horng:
Dynamic Updating Rough Approximations in Distributed Information Systems. ISKE 2015: 170-175 - [c69]Yanyong Huang, Tianrui Li, Shi-Jinn Horng:
Dynamic Maintenance of Rough Fuzzy Approximations with the Variation of Objects and Attributes. RSFDGrC 2015: 173-184 - 2014
- [j102]Shi-Jinn Horng, Mahmoud E. Farfoura, Pingzhi Fan, Xian Wang, Tianrui Li, Jing-Ming Guo:
A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multim. Tools Appl. 72(3): 2469-2495 (2014) - [j101]Shi-Jinn Horng, Didi Rosiyadi, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan:
An adaptive watermarking scheme for e-government document images. Multim. Tools Appl. 72(3): 3085-3103 (2014) - [j100]Hongmei Chen, Tianrui Li, Chuan Luo, Shi-Jinn Horng, Guoyin Wang:
A Rough Set-Based Method for Updating Decision Rules on Attribute Values' Coarsening and Refining. IEEE Trans. Knowl. Data Eng. 26(12): 2886-2899 (2014) - [j99]Xian Wang, Xianfu Lei, Pingzhi Fan, Rose Qingyang Hu, Shi-Jinn Horng:
Cost Analysis of Movement-Based Location Management in PCS Networks: An Embedded Markov Chain Approach. IEEE Trans. Veh. Technol. 63(4): 1886-1902 (2014) - [j98]Huei-Wen Ferng, Jeffrey Nurhakim, Shi-Jinn Horng:
Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wirel. Networks 20(4): 625-637 (2014) - [j97]Shi-Jinn Horng, Shiang-Feng Tzeng, Xian Wang, Shaojie Qiao, Xun Gong, Muhammad Khurram Khan:
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs. Wirel. Pers. Commun. 79(2): 1445-1454 (2014) - [c68]Shi-Jinn Horng, Shiang-Feng Tzeng:
VANET-based Secure Value-Added Services. SocialCom 2014: 6:1-6:4 - 2013
- [j96]Muhammad Khurram Khan, Yang Xiang, Shi-Jinn Horng, Hsiao-Hwa Chen:
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j95]Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. KSII Trans. Internet Inf. Syst. 7(6): 1512-1532 (2013) - [j94]Shi-Jinn Horng, Ling-Yuan Hsu, Tianrui Li, Shaojie Qiao, Xun Gong, Hsien-Hsin Chou, Muhammad Khurram Khan:
Using Sorted Switching Median Filter to remove high-density impulse noises. J. Vis. Commun. Image Represent. 24(7): 956-967 (2013) - [j93]Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Takao Terano, Minyi Guo, Muhammad Khurram Khan:
A blind image copyright protection scheme for e-government. J. Vis. Commun. Image Represent. 24(7): 1099-1105 (2013) - [j92]Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11): 1860-1875 (2013) - [c67]Rong-Jian Chen, Yu-Cha Chen, Jui-Lin Lai, Shi-Jinn Horng:
Data Hiding Using Flexible Multi-bit MER. ISBAST 2013: 24-31 - [c66]Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou, Xian Wang, Minyi Guo:
Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference Measures. ISBAST 2013: 251-258 - [e1]Shi-Jinn Horng:
International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2013, Taipei, Taiwan, December 16-18, 2013. IEEE 2013, ISBN 978-1-4799-2418-9 [contents] - [i1]Usukhbayar Baldangombo, Nyamjav Jambaljav, Shi-Jinn Horng:
A Static Malware Detection System Using Data Mining Methods. CoRR abs/1308.2831 (2013) - 2012
- [j91]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Chin-Shyurng Fahn, Deng-Kui Huang, Ray-Shine Run, Yuh-Rau Wang, I-Hong Kuo:
Solving the bi-objective personnel assignment problem using particle swarm optimization. Appl. Soft Comput. 12(9): 2840-2845 (2012) - [j90]Ray-Shine Run, Shi-Jinn Horng, Jui-Lin Lai, Tzong-Wann Kao, Rong-Jian Chen:
An improved SVD-based watermarking technique for copyright protection. Expert Syst. Appl. 39(1): 673-689 (2012) - [j89]Mahmoud E. Farfoura, Shi-Jinn Horng, Jui-Lin Lai, Ray-Shine Run, Rong-Jian Chen, Muhammad Khurram Khan:
A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Syst. Appl. 39(3): 3185-3196 (2012) - [j88]Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, Yi Pan:
Copyright Protection for E-Government Document Images. IEEE Multim. 19(3): 62-73 (2012) - [c65]Chih-Tung Lin, Shi-Jinn Horng, Yao-Lin Huang:
Hardware Resource Manager for Reconfiguration System. ISBAST 2012: 59-65 - [c64]Yao-Lin Huang, Shi-Jinn Horng, Tzong-Wann Kao, I-Hong Kuo, Takao Terano:
A Hybrid Forecasting Model Based on Adaptive Fuzzy Time Series and Particle Swarm Optimization. ISBAST 2012: 66-70 - [c63]Shiang-Feng Tzeng, Shi-Jinn Horng:
Enhancement of Generalized Ring Signatures with Convertibility. ISBAST 2012: 71-76 - [c62]Rong-Jian Chen, Shi-Jinn Horng:
Multi-bit Adaptive Embedding Algorithm for Anti-forensic Steganography. ISBAST 2012: 82-89 - [c61]Hung-Chuan Lai, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Yi Pan:
An Efficient Run Time Control Flow Errors Detection by DCT Technique. ISBAST 2012: 134-150 - [c60]Wen-Ting Hsieh, Shi-Jinn Horng:
Feature Selection Based on Asynchronous Discrete Particle Swarm Optimal Search Algorithm. PAAP 2012: 262-268 - 2011
- [j87]Rong-Jian Chen, Jun-Jian Lin, Su-Min Hung, Jui-Lin Lai, Shi-Jinn Horng:
Architecture design of high-efficient and non-memory AES crypto-core for WPAN. Concurr. Comput. Pract. Exp. 23(12): 1332-1347 (2011) - [j86]Shi-Jinn Horng, Chyouhwa Chen, Huei-Wen Ferng, Tzong-Wann Kao, Meng-Hung Li:
Enhancing WLAN location privacy using mobile behavior. Expert Syst. Appl. 38(1): 175-183 (2011) - [j85]Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, Citra Dwi Perkasa:
A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1): 306-313 (2011) - [j84]Yuh-Rau Wang, Wei-Hung Lin, Shi-Jinn Horng:
A sliding window technique for efficient license plate localization based on discrete wavelet transform. Expert Syst. Appl. 38(4): 3142-3146 (2011) - [j83]Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Yuh-Rau Wang, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
MTPSO algorithm for solving planar graph coloring problem. Expert Syst. Appl. 38(5): 5525-5531 (2011) - [j82]Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng:
Discovering fuzzy inter- and intra-object associations. Expert Syst. Appl. 38(6): 6777-6786 (2011) - [j81]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
A fast RFID tag identification algorithm based on counter and stack. Expert Syst. Appl. 38(6): 6829-6838 (2011) - [j80]Ling-Yuan Hsu, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
Mutual funds trading strategy based on particle swarm optimization. Expert Syst. Appl. 38(6): 7582-7602 (2011) - [j79]Yao-Lin Huang, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Jui-Lin Lai, I-Hong Kuo:
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization. Expert Syst. Appl. 38(7): 8014-8023 (2011) - [j78]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto:
An efficient phishing webpage detector. Expert Syst. Appl. 38(10): 12018-12027 (2011) - [j77]Chyouhwa Chen, Shi-Jinn Horng, Chin-Pin Huang:
Locality sensitive hashing for sampling-based algorithms in association rule mining. Expert Syst. Appl. 38(10): 12388-12397 (2011) - [j76]Ray-Shine Run, Shi-Jinn Horng, Wei-Hung Lin, Tzong-Wann Kao, Pingzhi Fan, Muhammad Khurram Khan:
An efficient wavelet-tree-based watermarking method. Expert Syst. Appl. 38(12): 14357-14366 (2011) - [j75]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Chin-Shyurng Fahn, Pingzhi Fan, Yuan-Hsin Chen, Muhammad Khurram Khan, Anu G. Bourgeois, Takao Terano:
3D block-based medial axis transform and chessboard distance transform based on dominance. Image Vis. Comput. 29(4): 272-285 (2011) - [c59]Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:
Novel Multi-bit Watermarking Using Adaptive Embedding Algorithms with Minimum Error. CISIS 2011: 211-218 - [c58]Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum Error. IMIS 2011: 221-228 - [c57]Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan:
Call dropping performance of the relay station (RS)-first channel access scheme in LTE-Advanced relay networks. ATNAC 2011: 1-6 - [c56]Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan:
Call dropping performance analysis of the eNB-first channel access policy in LTE-Advanced relay networks. WiMob 2011: 43-50 - 2010
- [j74]I-Hong Kuo, Shi-Jinn Horng, Tzong-Wann Kao, Tsung-Lieh Lin, Cheng-Ling Lee, Yuan-Hsin Chen, Y. I. Pan, Takao Terano:
A hybrid swarm intelligence algorithm for the travelling salesman problem. Expert Syst. J. Knowl. Eng. 27(3): 166-179 (2010) - [j73]I-Hong Kuo, Shi-Jinn Horng, Yuan-Hsin Chen, Ray-Shine Run, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, Tsung-Lieh Lin:
Forecasting TAIFEX based on fuzzy time series and particle swarm optimization. Expert Syst. Appl. 37(2): 1494-1502 (2010) - [j72]Tsung-Lieh Lin, Shi-Jinn Horng, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, I-Hong Kuo:
An efficient job-shop scheduling algorithm based on particle swarm optimization. Expert Syst. Appl. 37(3): 2629-2636 (2010) - [j71]Ling-Yuan Hsu, Shi-Jinn Horng, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, I-Hong Kuo:
Temperature prediction and TAIFEX forecasting based on fuzzy relationships and MTPSO techniques. Expert Syst. Appl. 37(4): 2756-2770 (2010) - [j70]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Deng-Kui Huang, Chin-Shyurng Fahn, Jui-Lin Lai, Rong-Jian Chen, I-Hong Kuo:
An efficient bi-objective personnel assignment algorithm based on a hybrid particle swarm optimization model. Expert Syst. Appl. 37(12): 7825-7830 (2010) - [j69]Tsung-Lieh Lin, Shi-Jinn Horng, Kai-Hui Lee, Pei-Ling Chiu, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst. Appl. 37(12): 7858-7869 (2010) - [j68]Rong-Jian Chen, Jui-Lin Lai, Shi-Jinn Horng:
Novel Stream Cipher Using SCAN and Variable Ordered Recursive CA Substitutions and Its DSP+FPGA Implementation. J. Networks 5(1): 75-87 (2010) - [j67]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa:
Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit. 43(5): 1789-1800 (2010) - [j66]Rong-Jian Chen, Shi-Jinn Horng:
Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata. Signal Process. Image Commun. 25(6): 413-426 (2010) - [j65]Shi-Jinn Horng, Yuan-Hsin Chen, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Wei-Chih Chen, Yi Pan, Takao Terano:
A Novel Anti-collision Algorithm in RFID Systems for Identifying Passive Tags. IEEE Trans. Ind. Informatics 6(1): 105-121 (2010) - [c55]Mahmoud E. Farfoura, Shi-Jinn Horng:
A Novel Blind Reversible Method for Watermarking Relational Databases. ISPA 2010: 563-569 - [c54]Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng:
Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding. NSS 2010: 306-311
2000 – 2009
- 2009
- [j64]Hung-Chang Chan, Jou-Ming Chang, Yue-Li Wang, Shi-Jinn Horng:
Geodesic-pancyclicity and fault-tolerant panconnectivity of augmented cubes. Appl. Math. Comput. 207(2): 333-339 (2009) - [j63]Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng:
Discovering fuzzy personal moving profiles in wireless networks. Appl. Soft Comput. 9(2): 667-676 (2009) - [j62]I-Hong Kuo, Shi-Jinn Horng, Tzong-Wann Kao, Tsung-Lieh Lin, Cheng-Ling Lee, Yi Pan:
An improved method for forecasting enrollments based on fuzzy time series and particle swarm optimization. Expert Syst. Appl. 36(3): 6108-6117 (2009) - [j61]I-Hong Kuo, Shi-Jinn Horng, Tzong-Wann Kao, Tsung-Lieh Lin, Cheng-Ling Lee, Takao Terano, Yi Pan:
An efficient flow-shop scheduling algorithm based on a hybrid particle swarm optimization model. Expert Syst. Appl. 36(3): 7027-7032 (2009) - [j60]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng:
A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst. Appl. 36(6): 9869-9878 (2009) - [j59]Cheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng:
Discovering mobile users' moving behaviors in wireless networks. Expert Syst. Appl. 36(8): 10809-10814 (2009) - [j58]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng, Tzong-Wann Kao, Yi Pan:
A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst. Appl. 36(9): 11509-11516 (2009) - [j57]Wei-Hung Lin, Shi-Jinn Horng, Tzong-Wann Kao, Rong-Jian Chen, Yuan-Hsin Chen, Cheng-Ling Lee, Takao Terano:
Image copyright protection with forward error correction. Expert Syst. Appl. 36(9): 11888-11894 (2009) - [j56]Cheng-An Yen, Shi-Jinn Horng, Hsi-Sheng Goan, Tzong-Wann Kao, Yao-Hsin Chou:
Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9(5&6): 376-394 (2009) - [c53]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng:
A Block-Based Watermarking Method Using Wavelet Coefficient Quantization. ICA3PP 2009: 156-164 - [c52]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng:
A Digital Watermarking Method Using Binary Cluster. ICA3PP 2009: 165-174 - [c51]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng:
A Novel Blind Watermarking Using Hybrid Embedding Technique. ICA3PP 2009: 175-181 - [c50]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng, Tzong-Wann Kao:
Digital Image Watermarking for Malicious Attack. ICA3PP 2009: 234-241 - [c49]Yuh-Rau Wang, Wei-Hung Lin, Shi-Jinn Horng:
Fast License Plate Localization Using Discrete Wavelet Transform. ICA3PP 2009: 408-415 - [c48]Chao-Jang Hwang, Chih-Tung Lin, Shi-Jinn Horng:
Implementation of Different Function Units Using Flexible and Reconfigurable Architecture. ITNG 2009: 84-89 - [c47]Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng:
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. NSS 2009: 36-43 - [c46]Shi-Jinn Horng, Yuan-Hsin Chen, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Kevin Octavius Sentosa:
An Improved Score Level Fusion in Multimodal Biometric Systems. PDCAT 2009: 239-246 - 2008
- [j55]Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang, Yi Pan:
A feasible intrusion detector for recognizing IIS attacks based on neural networks. Comput. Secur. 27(3-4): 84-100 (2008) - [j54]Shi-Jinn Horng, Pingzhi Fan, Ming-Yang Su, Yuan-Hsin Chen, Cheng-Ling Lee, Shao-Wei Lan:
Anomaly detection for web server based on smooth support vector machine. Comput. Syst. Sci. Eng. 23(3) (2008) - [j53]Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng:
Linguistic object-oriented web-usage mining. Int. J. Approx. Reason. 48(1): 47-61 (2008) - [j52]Chin-Hsiung Wu, Shi-Jinn Horng, Ching-Feng Wen, Yuh-Rau Wang:
Fast and scalable computations of 2D image moments. Image Vis. Comput. 26(6): 799-811 (2008) - [j51]Wei-Hung Lin, Shi-Jinn Horng, Tzong-Wann Kao, Pingzhi Fan, Cheng-Ling Lee, Yi Pan:
An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization. IEEE Trans. Multim. 10(5): 746-757 (2008) - [c45]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Chin-Shyurng Fahn, Pingzhi Fan, Cheng-Ling Lee, Anu G. Bourgeois:
3D Block-Based Medial Axis Transform and Chessboard Distance Transform on the CREW PRAM. ICA3PP 2008: 83-96 - [c44]Hung-Chuan Lai, Shi-Jinn Horng, Yung-Yuan Chen:
An Online Control Flow Check for VLIW Processor. PRDC 2008: 256-264 - [c43]Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng:
A Blind Watermarking Scheme Based on Wavelet Tree Quantization. SSIRI 2008: 89-95 - 2007
- [j50]Hung-Chang Chan, Jou-Ming Chang, Yue-Li Wang, Shi-Jinn Horng:
Geodesic-pancyclic graphs. Discret. Appl. Math. 155(15): 1971-1978 (2007) - [j49]Cheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng:
Mining knowledge from object-oriented instances. Expert Syst. Appl. 33(2): 441-450 (2007) - [c42]Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo:
Quantum Entanglement, Non-Locality and Secure Computation. ICQNM 2007: 15 - [c41]Wei-Chih Chen, Shi-Jinn Horng, Pingzhi Fan:
An Enhanced Anti-collision Algorithm in RFID Based on Counter and Stack. ICSNC 2007: 21 - [c40]I-Hong Kuo, Shi-Jinn Horng, Tzong-Wann Kao, Tsung-Lieh Lin, Pingzhi Fan:
An Efficient Flow-Shop Scheduling Algorithm Based on a Hybrid Particle Swarm Optimization Model. IEA/AIE 2007: 303-312 - [c39]Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo:
Dependabilities in a High-performance Quantum Real-time Distributed System. ITNG 2007: 1107-1112 - [c38]Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan:
A New Concurrent Detection of Control Flow Errors Based on DCT Technique. PRDC 2007: 201-209 - 2006
- [j48]Chin-Hsiung Wu, Shi-Jinn Horng, Yuh-Rau Wang, Horng-Ren Tsai:
Optimal geometric algorithms for digitized images on arrays with reconfigurable optical buses. Microprocess. Microsystems 30(7): 425-434 (2006) - [c37]Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu, Peng-Chu Wang, Wei-Zen Su:
A Surveillance Spyware Detection System Based on Data Mining Methods. IEEE Congress on Evolutionary Computation 2006: 3236-3241 - [c36]Cheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng:
Simultaneously mining inter- and intra-object association rules. GrC 2006: 679-682 - [c35]Cheng-Ming Huang, Tzung-Pei Hong, Shi-Jinn Horng:
Simultaneously Mining Fuzzy Inter- and Intra-Object Association Rules. SMC 2006: 2778-2783 - 2005
- [j47]Yuh-Rau Wang, Shi-Jinn Horng, Chin-Hsiung Wu:
Efficient Algorithms for the All Nearest Neighbor and Closest Pair Problems on the Linear Array with a Reconfigurable Pipelined Bus System. IEEE Trans. Parallel Distributed Syst. 16(3): 193-206 (2005) - [c34]Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, Shi-Jinn Horng:
Embedded Fingerprint Verification System. ICPADS (2) 2005: 52-57 - [c33]Shi-Jinn Horng, Ming-Yang Su, Chao-Yi Wu:
An E-Mail Client Implementation with Spam Filtering and Security Mechanisms. ICWS 2005: 783-784 - [c32]Yuh-Rau Wang, Shi-Jinn Horng, Hung-Chang Chan:
Fast All Nearest Neighbor Algorithms from Image Processing Perspective. IPDPS 2005 - [c31]Tzung-Pei Hong, Cheng-Ming Huang, Shi-Jinn Horng:
Mining Linguistic Mobility Patterns for Wireless Networks. KES (3) 2005: 1352-1358 - [c30]Shih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Yuh-Rau Wang:
An O(1) Time Parallel Algorithm for the Dominance Counting and 3D Block-Based Medial Axis Transform on AROB. PDCAT 2005: 603-609 - 2004
- [j46]Yuh-Rau Wang, Shi-Jinn Horng:
Parallel algorithms for arbitrary dimensional Euclidean distance transforms with applications on arrays with reconfigurable optical buses. IEEE Trans. Syst. Man Cybern. Part B 34(1): 517-532 (2004) - [j45]Chin-Hsiung Wu, Shi-Jinn Horng:
Run-length chain coding and scalable computation of a shape's moments using reconfigurable optical buses. IEEE Trans. Syst. Man Cybern. Part B 34(2): 845-855 (2004) - [c29]Yuh-Rau Wang, Shi-Jinn Horng:
Constant Time Algorithms for the 3-D All Nearest Neighbor Problem on the LARPBS. PDCAT 2004: 243-247 - 2003
- [j44]Chin-Hsiung Wu, Shi-Jinn Horng:
Scalable and Optimal Speed-Up Parallel Algorithms for Template Matching on Arrays with Reconfigurable Optical Buses. Int. J. Found. Comput. Sci. 14(1): 79-98 (2003) - [j43]Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer:
Parallel Computation of the Euclidean Distance Transform on a Three-Dimensional Image Array. IEEE Trans. Parallel Distributed Syst. 14(3): 203-212 (2003) - [j42]Yuh-Rau Wang, Shi-Jinn Horng:
An O(1)Time Algorithm for the 3D Euclidean Distance Transform on the CRCW PRAM Model. IEEE Trans. Parallel Distributed Syst. 14(10): 973-982 (2003) - [j41]Chin-Hsiung Wu, Shi-Jinn Horng:
Fast and Scalable Selection Algorithms with Applications to Median Filtering. IEEE Trans. Parallel Distributed Syst. 14(10): 983-992 (2003) - [c28]Yung-Yuan Chen, Shi-Jinn Horng, Hung-Chuan Lai:
An Integrated Fault-Tolerant Design Framework for VLIW Processors. DFT 2003: 555-562 - 2002
- [j40]Chin-Hsiung Wu, Shi-Jinn Horng, Horng-Ren Tsai:
Optimal Parallel Algorithms for Computer Vision Problems. J. Parallel Distributed Comput. 62(6): 1021-1041 (2002) - [j39]Shi-Jinn Horng, Horng-Ren Tsai, Yi Pan, Jennifer Seitzer:
Optimal Algorithms for the Channel-Assignment Problem on a Reconfigurable Array of Processors with Wider Bus Networks. IEEE Trans. Parallel Distributed Syst. 13(11): 1124-1138 (2002) - [c27]Chin-Hsiung Wu, Shi-Jinn Horng, Yi Pan:
Parallel Algorithms for Median Filtering on Arrays with Reconfigurable Optical Buses. IPDPS 2002 - [c26]Yuh-Rau Wang, Shi-Jinn Horng:
An O(1) Time Parallel Algorithm for the 3D Euclidean Distance Transform on the AROB*. PDPTA 2002: 1120-1126 - 2001
- [j38]Chin-Hsiung Wu, Shi-Jinn Horng, Pei-Zong Lee:
A new computation of shape moments via quadtree decomposition. Pattern Recognit. 34(7): 1319-1330 (2001) - [j37]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems. J. Supercomput. 18(1): 25-45 (2001) - [j36]Chin-Hsiung Wu, Shi-Jinn Horng:
L2 Vector Median Filters on Arrays with Reconfigurable Optical Buses. IEEE Trans. Parallel Distributed Syst. 12(12): 1281-1292 (2001) - [c25]Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer:
Fast Computation of the 3-D Euclidean Distance Transform on the EREW PRAM Model. ICPP 2001: 471-478 - [c24]Chin-Hsiung Wu, Shi-Jinn Horng, Yi-Wen Chen, Chen-Kuo Yu:
Run-Length Chain Coding and Shape's Moment Computations on Arrays with Reconfigurable Optical Buses. ICPP 2001: 479-488 - 2000
- [j35]Chin-Hsiung Wu, Shi-Jinn Horng, Yi-Wen Chen, Wei-Yi Lee:
Designing scalable and efficient parallel clustering algorithms on arrays with reconfigurable optical buses. Image Vis. Comput. 18(13): 1033-1043 (2000) - [j34]Chin-Hsiung Wu, Shi-Jinn Horng, Horng-Ren Tsai:
Efficient Parallel Algorithms for Hierarchical Clustering on Arrays with Reconfigurable Optical Buses. J. Parallel Distributed Comput. 60(9): 1137-1153 (2000) - [c23]Chin-Hsiung Wu, Shi-Jinn Horng, Pei-Zong Lee, Shung-Shing Lee, Shih-Ying Lin:
A New Computation of Shape Moments via Quadtree Decomposition. IPDPS Workshops 2000: 123-129 - [c22]Chin-Hsiung Wu, Shi-Jinn Horng, Jinn-Fu Lin, Horng-Ren Tsai, Tsrong-Lay Lin:
An Optimal Parallel Algorithm for Computing Moments on Arrays with Reconfigurable Optical Buses. IPDPS 2000: 741-746
1990 – 1999
- 1999
- [j33]Yu-Hua Lee, Shi-Jinn Horng:
Optimal Computing the Chessboard Distance Transform on Parallel Processing Systems, . Comput. Vis. Image Underst. 73(3): 374-390 (1999) - [j32]Horng-Ren Tsai, Shi-Jinn Horng:
Optimal parallel clustering algorithms on a reconfigurable array of processors with wider bus networks. Image Vis. Comput. 17(13): 925-936 (1999) - [j31]Horng-Ren Tsai, Shi-Jinn Horng, Tzong-Wann Kao, Shung-Shing Lee, Shun-Shan Tsai:
Fundamental data movement operations and its applications on a hyper-bus broadcast network. Parallel Comput. 25(2): 137-157 (1999) - [j30]Shung-Shing Lee, Shi-Jinn Horng, Horng-Ren Tsai:
Entropy thresholding and its parallel algorithm on the reconfigurable array of processors with wider bus networks. IEEE Trans. Image Process. 8(9): 1229-1242 (1999) - 1998
- [j29]Yuung-Jih Chen, Shi-Jinn Horng, Tzong-Wann Kao, Horng-Ren Tsai:
Parallel Algorithm for the Medial Axis Transform of Binary Images. Aust. Comput. J. 30(1): 12-19 (1998) - [j28]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments. Comput. J. 41(2): 125-133 (1998) - [j27]Horng-Ren Tsai, Shi-Jinn Horng, Shun-Shan Tsai, Shung-Shing Lee, Tzong-Wann Kao, Chia-Ho Chen:
Optimal Speed-Up Parallel Image Template Matching Algorithms on Processor Arrays with a Reconfigurable Bus System. Comput. Vis. Image Underst. 71(3): 393-412 (1998) - [j26]Woei-Jiunn Tsaur, Shi-Jinn Horng:
A new generalized software complexity metric for distributed programs. Inf. Softw. Technol. 40(5-6): 259-269 (1998) - [c21]Woei-Jiunn Tsaur, Shi-Jinn Horng, R. Tsai:
A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems. PDSE 1998: 115- - 1997
- [j25]Yuung-Jih Chen, Shi-Jinn Horng:
Medial Axis Transform on Mesh-Connected Computers with Hyperbus Broadcasting. Computing 59(2): 95-114 (1997) - [j24]Yu-Hua Lee, Shi-Jinn Horng, Tzong-Wann Kao, Yuung-Jih Chen:
Parallel Computation of the Euclidean Distance Transform on the Mesh of Trees and the Hypercube Computer. Comput. Vis. Image Underst. 68(1): 109-119 (1997) - [j23]Yu-Hua Lee, Shi-Jinn Horng:
The equivalence of the chessboard distance transform and the medial axis transform. Int. J. Comput. Math. 65(3-4): 165-177 (1997) - [j22]Tzong-Wann Kao, Shi-Jinn Horng:
Computing Dominators on Interval Graphs. J. Inf. Sci. Eng. 13(4): 615-629 (1997) - [j21]Horng-Ren Tsai, Shi-Jinn Horng, Shung-Shing Lee, Shun-Shan Tsai, Tzong-Wann Kao:
Parallel hierarchical clustering algorithms on processor arrays with a reconfigurable bus system. Pattern Recognit. 30(5): 801-815 (1997) - [j20]Shung-Shing Lee, Shi-Jinn Horng, Horng-Ren Tsai, Yu-Hua Lee:
Image processing on a reconfigurable array of processors with wider bus networks. Pattern Recognit. 30(9): 1521-1532 (1997) - [j19]Feng-Shr Jiang, Shi-Jinn Horng, Tzong-Wann Kao:
Embedding of Generalized Fibonacci Cubes in Hypercubes with Faulty Nodes. IEEE Trans. Parallel Distributed Syst. 8(7): 727-737 (1997) - [j18]Horng-Ren Tsai, Shi-Jinn Horng, Shun-Shan Tsai, Tzong-Wann Kao, Shung-Shing Lee:
Solving an Algebraic Path Problem and Some Related Graph Problems on a Hyper-Bus Broadcast Network. IEEE Trans. Parallel Distributed Syst. 8(12): 1226-1235 (1997) - [c20]Horng-Ren Tsai, Shi-Jinn Horng, Shun-Shan Tsai, Shung-Shing Lee, Tzong-Wann Kao, Chia-Ho Chen, Yi-Hong Guo:
Parallel String Matching Algorithms an Processor Arrays with a Reconfiguable Bus System. Euro-PDS 1997: 203-206 - [c19]Horng-Ren Tsai, Shi-Jinn Horng, Shun-Shan Tsai, Shung-Shing Lee, Tzong-Wann Kao, Chia-Ho Chen:
Parallel Clustering Algorithms on a Reconfigurable Array of Processors with Wider Bus Networks. ICPADS 1997: 630- - [c18]Woei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai:
An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. ICPADS 1997: 640-647 - [c17]Woei-Jiunn Tsaur, Shi-Jinn Horng, Chia-Ho Chen:
An authentication-combined access control scheme using a geometric approach in distributed systems. SAC 1997: 361-365 - 1996
- [j17]Tzong-Wann Kao, Shi-Jinn Horng:
The Power of List Ranking on a Reconfigurable Array of Processors with Wider Bus Networks. Aust. Comput. J. 28(4): 138-119 (1996) - [j16]Horng-Ren Tsai, Shi-Jinn Horng, Shung-Shing Lee, Shun-Shan Tsai, Tzong-Wann Kao:
Parallel Sorting Algorithms on a Hyper-Channel Broadcast Communication Model. Int. J. High Speed Comput. 8(4): 307-318 (1996) - [j15]Tzong-Wann Kao, Shi-Jinn Horng, Yi-Hong Guo:
Constant Time Algorithms for Graph Connectivity Problems on Reconfigurable Meshes Using Fewer Processors. Int. J. High Speed Comput. 8(4): 371-385 (1996) - [j14]Shun-Shan Tsai, Shi-Jinn Horng:
Efficient Embedding Hypercube on Arrangement Graphs. J. Inf. Sci. Eng. 12(4): 585-592 (1996) - [j13]Yu-Hua Lee, Shi-Jinn Horng, Tzong-Wann Kao, Ferng-Shi Jaung, Yuung-Jih Chen, Horng-Ren Tsai:
Parallel Computation of Exact Euclidean Distance Transform. Parallel Comput. 22(2): 311-325 (1996) - [j12]Shung-Shing Lee, Shi-Jinn Horng, Tzong-Wann Kao, Horng-Ren Tsai:
Optimal computing hough transform on a reconfigurable array of processors with wider bus networks. Pattern Recognit. 29(4): 603-613 (1996) - [j11]Shung-Shing Lee, Shi-Jinn Horng, Horng-Ren Tsai, Shun-Shan Tsai:
Building a quadtree and its applications on a reconfigurable mesh. Pattern Recognit. 29(9): 1571-1579 (1996) - [c16]Yu-Hua Lee, Shi-Jinn Horng:
Fast parallel chessboard distance transform algorithms. ICPADS 1996: 488-493 - [c15]Yu-Hua Lee, Shi-Jinn Horng:
The Chessboard Distance Transform and the Medial Axis Transform are Interchangeable. IPPS 1996: 424-428 - [c14]Shung-Shing Lee, Shi-Jinn Horng, Horng-Ren Tsai, Yu-Hua Lee:
Some Image Processing Algorithms on a RAP with Wider Bus Networks. IPPS 1996: 708-715 - [c13]Yu-Hua Lee, Shi-Jinn Horng, Tzong-Wann Kao, Shung-Shing Lee:
Optimal Parallel Algorithms for Computing the Chessboard Distance Transform and the Medial Axis Transform on RAP. ISPAN 1996: 22-28 - [c12]Tzong-Wann Kao, Shi-Jinn Horng:
Computing Dominators and Its Applications on Processor Arrays with Reconfigurable Bus Systems. ISPAN 1996: 302-308 - [c11]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. ISPAN 1996: 326-329 - [c10]Horng-Ren Tsai, Shi-Jinn Horng, Shung-Shing Lee, Tzong-Wann Kao:
Optimal Finding the All-Pair Shortest Path for Interval Graphs on a Reconfigurable Array of Processors with Wider Bus Networks. PDPTA 1996: 1374-1385 - [c9]Horng-Ren Tsai, Shi-Jinn Horng, Shung-Shing Lee, Shun-Shan Tsai, Tzong-Wann Kao:
Efficient Parallel Algorithms for the Algebraic Path Problems on a Hyper-bus Broadcast Network. PDPTA 1996: 1386-1397 - [c8]Woei-Jiunn Tsaur, Shi-Jinn Horng:
On the design of secure group-oriented communication channels in Internet environments. PIMRC 1996: 1243-1247 - 1995
- [j10]Chin Fu Lin, Shi-Jinn Horng, Tzong-Wann Kao:
Generalized Rotate Sort on Mesh-Connected Computers with Multiple Broadcasting Using Fewer Processors. Int. J. High Speed Comput. 7(4): 515-530 (1995) - [j9]Tzong-Wann Kao, Shi-Jinn Horng:
Optimal Algorithms for Computing Articulation Points and Some Related Problems on a Circular-Arc Graph. Parallel Comput. 21(6): 953-969 (1995) - [j8]Tzong-Wann Kao, Shi-Jinn Horng, Yue-Li Wang, Horng-Ren Tsai:
Designing Efficient Parallel Algorithms on CRAP. IEEE Trans. Parallel Distributed Syst. 6(5): 554-560 (1995) - [j7]Tzong-Wann Kao, Shi-Jinn Horng, Yue-Li Wang:
An O(1) time algorithms for computing histogram and Hough transform on a cross-bridge reconfigurable array of processors. IEEE Trans. Syst. Man Cybern. 25(4): 681-687 (1995) - [c7]Woei-Jiunn Tsaur, Shi-Jinn Horng:
Toward Software Metrics for Distributed Software. APSEC 1995: 209- - 1994
- [j6]Tzong-Wann Kao, Shi-Jinn Horng:
Efficient algorithms for computing two nearest-neighbor problems on a rap. Pattern Recognit. 27(12): 1707-1716 (1994) - [c6]Tzong-Wann Kao, Shi-Jinn Horng:
Computing List Ranking on a RAP with Wider Bus Networks. ICPADS 1994: 28-33 - [c5]Shi-Jinn Horng:
Semigroup Computation and Its Applications on Mesh-Connected Computers with Hyperbus Broadcasting. ICPADS 1994: 34-39 - [c4]Tzong-Wann Kao, Shi-Jinn Horng:
Computing k-vertex Connectivity on an Interval Graph. ICPP (3) 1994: 218-221 - [c3]Yi-Wen Chen, Shi-Jinn Horng, Tzong-Wann Kao, Horng-Ren Tsai, Shun-Shan Tsai:
Parallel connectivity algorithms on permutation graphs. ISPAN 1994: 97-104 - 1993
- [j5]Shi-Jinn Horng:
Constant Time Algorithm for Template Matching on a Reconfigurable Array of Processors. Comput. J. 36(3): 246-253 (1993) - [j4]Shi-Jinn Horng:
Computing Dominators on a Cube-Connected Machine. Parallel Comput. 19(7): 713-728 (1993) - [j3]Tzong-Wann Kao, Shi-Jinn Horng, Yue-Li Wang, Kuo-Liang Chung:
A constant time algorithm for computing hough transform. Pattern Recognit. 26(2): 277-286 (1993) - [c2]Shi-Jinn Horng:
Parallel Compting Dominators on Hypercube Multiprocessors. ICCI 1993: 240-243 - [c1]Tzong-Wann Kao, Shi-Jinn Horng, Horng-Ren Tsai:
Computing Connected Components and Some Related Applications on a RAP. ICPP (3) 1993: 57-64 - 1991
- [j2]Shi-Jinn Horng, Wen-Tsuen Chen, Ming-Yi Fang:
Optimal Speed-Up Algorithms for Template Matching on SIMD Hypercube Multiprocessors with Restricted Local Memory. Inf. Process. Lett. 38(1): 29-37 (1991) - [j1]Wen-Tsuen Chen, Jia-Shung Wang, Chia-Cheng Liu, Shi-Jinn Horng, Chang-Biau Yang, Ruey-Zone Huang, Bern-Cherng Liaw:
Design of An Integrated Parallel Processing System with Systolic VLSI Chips. J. Inf. Sci. Eng. 7(2): 217-235 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint