


default search action
ICS 2020: Yunlin, Taiwan
- International Computer Symposium, ICS 2020, Tainan, Taiwan, December 17-19, 2020. IEEE 2020, ISBN 978-1-7281-9255-0

- Chung-Ming Huang, Chi-Feng Lai:

The Mobile Edge Computing (MEC)-based Vehicle to Infrastructure (V2I) Data Offloading from Cellular Network to VANET using the Delay-Constrained Computing Scheme. 1-6 - Hung-Chin Jang, Kai-Sheng Chang:

A Study on Handover Mechanism in 5G Non-standalone Network. 7-12 - Yerra Prathyusha, Tsang-Ling Sheu:

A User Pairing Technique for Mixed Traffic Types in Downlink NOMA. 13-18 - Jean Jimmy Julien, Fuchun Joseph Lin

, Chiao-Hsuan Yu, Wan-Hsun Hu:
Charging Models for MANO-based 5G Core Networks. 19-24 - Ming-Hua Cheng, Wen-Shyang Hwang, Yan-Jing Wu, Cheng-Han Lin, Jhen-Siang Syu:

An Effective Flow-Rule-Reducing Algorithm for Flow Tables in Software-Defined Networks. 25-30 - Ying-Hong Wang:

A novel Scheduling Algorithm applied to the Component Carrier Selection for Femtocell in Wireless Communication. 31-36 - Shih-Feng Huang, Yen-Wen Lin:

A Feature Fusion Approach for Multiple Signal Classification. 37-42 - Shih-Han Chen, Sok-Ian Sou, Hsun-Ping Hsieh

:
HPCF: Hybrid Music Group Recommendation System based on Item Popularity and Collaborative Filtering. 43-49 - Hsin-Wei Li, Sok-Ian Sou, Hsun-Ping Hsieh

:
Room-based Playlist Arrangement System using Group Recommendation. 50-54 - Yi-Chen Wang, Pei-Lin Yang, Sok-Ian Sou, Hsun-Ping Hsieh

:
The MuTube Dataset for Music Listening History Retrieval and Recommendation System. 55-60 - Kuang-Ting Lee, Chien-Yu Chiou, Chun-Rong Huang

:
One-Class Novelty Detection via Sparse Representation with Contrastive Deep Features. 61-66 - Jia-Wei Kan, Wei-Chin Chien, Sheng-De Wang:

Grid Structure Attention for Natural Language Interface to Bash Commands. 67-72 - Hung-Yun Chen, Pei-Hsuan Tsai

:
A Speedup Simulation-based Fire Prediction for Online Evacuation Planning. 73-78 - Ching Ya Liao, Pangfeng Liu, Jan-Jan Wu:

Convolution Filter Pruning for Transfer Learning on Small Dataset. 79-84 - Aanand P. Pant, Kun-Ru Wu, Yu-Chee Tseng:

Speak to Action: Offline and Hybrid Language Recognition on Embedded Board for Smart Control System. 85-90 - You-Rong Chen, Chi-Ting Ni, Kiat Siong Ng

, Chia-Lun Hsu, Shen-Chang Chang, Chin-Bin Hsu, Pei-Yin Chen:
An AI-based System for Monitoring Behavior and Growth of Pigs. 91-95 - Tzu-Hsuan Lin, Jehn-Ruey Jiang:

Anomaly Detection with Autoencoder and Random Forest. 96-99 - Shu-Kai Yang, Chien Chou:

An Efficient Methodology for the Cross-Comparison of Text Documents. 100-104 - Josimar Edinson Chire Saire, Honorio Apaza

:
Text Mining over Curriculum Vitae of Peruvian Professionals using Official Scientific Site DINA. 105-109 - Rong-Guei Tsai, Guan-Rong Shih, Pei-Hsuan Tsai

:
Sensor Activity Control Strategy for Random Access Wireless Sensor Network Systems. 110-115 - Shun-Yu Li, Jou-Ming Chang, Kung-Jui Pai:

A Parallel Algorithm for Constructing Two Edge-disjoint Hamiltonian Cycles in Locally Twisted Cubes. 116-119 - Di-De Yen, Hsu-Chun Yen:

On the Valuedness of Symbolic Finite Transducers. 120-125 - Shih-Chia Chang, Li-Hsuan Chen

, Ling-Ju Hung
, Shih-Shun Kao
, Ralf Klasing:
The Hardness and Approximation of the Densest k-Subgraph Problem in Parameterized Metric Graphs. 126-130 - I-Shyan Hwang, Ardian Rianto, Razat Kharga

:
BitTorrent-Based P2P Locality-Awareness File Sharing over Software-defined NG-PON2. 131-134 - Chia-Chun Liu, Josh Jia-Ching Ying:

DeepSafety: A Deep Learning Framework for Unsafe Behaviors Detection of Steel Activity in Construction Projects. 135-140 - Rung-Ching Chen, Yi Chen Shiao, Christine Dewi, Qiao-En Liu:

Predicting the Japanese Yen to US Dollar Exchange Rate Based on Machine Learning Models. 141-146 - Ji-Hong Cheng, Wen-Chun Liu, Ting-Tsung Chang, Sun-Yuan Hsieh, Vincent S. Tseng:

An Effective and Efficient Algorithm for Detecting Exact Deletion Breakpoints from Viral Next-Generation Sequencing Data. 147-152 - Ying-Chiao Liao, Chuan-Chi Wang, Chia-Heng Tu, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung:

PerfNetRT: Platform-Aware Performance Modeling for Optimized Deep Neural Networks. 153-158 - Yen-Lin Lee, Ratri Abdatush Sholihah, Deron Liang, Wei-Jen Wang:

Resolving automatic high availability operations and users commands to virtual machines on OpenStack. 159-164 - Yen-Long Chen, Kuo-Feng Ssu, Yu-Jung Chang:

Real-time Transfers for Improving Efficiency of Ridesharing Services in the Environment with Connected and Self-driving Vehicles. 165-170 - Tzu-Lun Huang, Jason Huang:

An efficient data structure for distributed ledger in blockchain systems. 175-178 - Tzu-Lun Huang, Jason Huang:

Design and analysis of a distributed consensus protocol for real-time blockchain systems. 179-184 - Ming-Huang Tsai, Han-Ting Liang, Yun-He Wang, Wu-Chun Chung:

Enhanced OpenStack Cloud for Network Function Virtualization. 185-190 - Po-Sheng Lin, Ming-Chang Kao, Wen-Yew Liang, Shih-Hao Hung:

Performance Analysis and Optimization for Federated Learning Applications with PySyft-based Secure Aggregation. 191-196 - Jih-Ching Chiu, Yu-Yi Wang, Wei-Yi Lin:

The Brain Memory Architecture HW/SW Co-Design Platform with Adaptive CNN Algorithm. 197-202 - Chun-Zhang Zheng, Chin-Hsien Wu:

A Hybrid Computational Storage Architecture to Accelerate CNN Training. 203-208 - Chi-Ting Ni, Chen-An Chang, Jia-Wei Liao, Pei-Yin Chen:

A Novel VLSI Architecture for Barrel Distortion Correction. 209-213 - Ching-Chun Jim Huang, Chung-Fan Yang:

An Empirical Approach to Minimize Latency of Real-Time Multiprocessor Linux Kernel. 214-218 - Jing Chen, Yi-Wei Chen:

The Design and Implementation of a Power Management Solution for Smart Glasses. 219-224 - I-Min Chiu, Wun-Huei Zeng, Chun-Hung Richard Lin:

Using multiclass machine learning model to improve outcome prediction of acute ischemic stroke patients after reperfusion therapy. 225-231 - Kai-Hsiang Lin, Jui-Hung Chang, Ti-Hao Wang, Hoe-Yuan Ong, Pau-Choo Chung:

Rectum Segmentation in Brachytherapy Dataset Using Recurrent Network. 232-236 - Tsung-Chieh Lin

, Hsi-Chieh Lee
:
Skin Cancer Dermoscopy Images Classification with Meta Data via Deep Learning Ensemble. 237-241 - Josimar Edinson Chire Saire, Jimy Frank Oblitas Cruz

:
Study of Coronavirus Impact on Parisian Population from April to June using Twitter and Text Mining Approach. 242-246 - Sandeep Vara Sankar Diddi

, Li-Wei Ko:
Evaluation of Fatigue and Attention Levels in Multi-target Scenario using CNN. 247-251 - Jih-Ching Chiu, Jun-Jiang Chen, Kuan-Lun Su:

Design and Implement Robust Wireless Network Based on TCP Protocol. 252-261 - Zhi-Hao Wang, Sung-Tsun Shih, Hendrick Hendrick, Mao-Yuan Pai, Gwo-Jiun Horng:

Deployment and Evaluation of LoRa Network Configuration Based on Random Forest. 262-265 - Pei-Hsuan Tsai

, Yu-Lin Tseng, Jun-Bin Zhang, Meng-Hsun Tsai
:
A Query-based Routing Table Update Mechanism for Content-Centric Network. 266-271 - Abid Falih Zuhdi, Aripriharta, Agusta Rakhmat Taufani, Adim Firmansah, Gwo-Jiun Horng:

Car Sales Prediction System Based on Fuzzy Time Series and Adaptive Neuro Fuzzy Inference System. 272-277 - Jih-Ching Chiu, Cheng-Lin Tsai, Zhi-Yu Lee:

Design and Implement Adaptive Tree Topology Mechanism For Wi-Fi Wireless Network. 278-282 - Elaiyasuriyan Ganesan

, I-Shyan Hwang, Andrew Tanny Liem
:
Resource Allocation for Tactile Internet via Software-Defined FiWi Access Network. 283-287 - Yinman Lee, Bo-Ying Huang, Sok-Ian Sou:

An Efficient Algorithm for Joint Power Allocation in NOMA-Based Diamond Relay Networks. 288-293 - Mehdi Gheisari, Aaqif Afzaal Abbasi, Zahra Sayari, Qasim Rizvi, Alia Asheralieva

, Sabitha Banu A.
, Feras M. Awaysheh, Syed Bilal Hussain Shah, Khuhawar Arif Raza:
A Survey on Clustering Algorithms in Wireless Sensor Networks: Challenges, Research, and Trends. 294-299 - Hao-En Chueh, Chang-Yi Kao

, Meng-Luen Wu:
Usage Behavior Analysis of Intelligent Network based Public Bicycle Rental System. 300-303 - Lo-An Chen, Jing-Zhao Zhuo, Yun-Zhan Cai, Yu-Ting Wang, Meng-Hsun Tsai

:
Finding Periodicity of Subflows in SDN-based IoT. 304-309 - Sheng-Tzong Cheng, Chong-Yi Zhu, Chih-Wei Hsu, Jiashing Shih:

The Anomaly Detection Mechanism Using Extreme Learning Machine for Service Function Chaining. 310-315 - Hong Tsuen Lei, Ping-Yu Hsu, Ming-Shien Cheng:

Key Factors for Suppliers of Gaming Notebook Keyboards with AHP. 316-318 - Ying-Chia Peng, Ming-Shien Cheng, Ping-Yu Hsu:

Constructing an Integrated Classifiers for Identifying Authenticity and Sentiment Analysis- A Case of Hotel Reviews. 319-324 - Hao-Hsuan Tsou

, Kuang-Di Lee, Zhi-Hao Wang, Chung-Ching Huang:
The Feature Extraction Modeling of Product Analysis in Injection Molding for Intelligent Manufacturing. 325-329 - Shau-Yin Tseng, Jian-Wei Chen:

Maskless lithography laser source target light dose reversed mapping. 330-334 - Shau-Yin Tseng, Jin-Nan Liu, Jian-Wei Chen:

Nonlinear PCB Compensation Based on Intel® HD graphics for Manufacturing Processing. 335-340 - Jih-Ching Chiu, Hao-Yu Tseng, Zhi-Yu Lee:

Design of Multidimension-media Streaming Protocol Based on RTSP. 341-347 - Lung-Chih Kuo

, Cheng-Chi Tai:
Implementation of Inverse Perspective Mapping for Camera-Vision Water-Level Measurements. 348-351 - Kareen Teo

, Khin Wee Lai
, Ching Wai Yong, Belinda Pingguan-Murphy, Joon Huang Chuah, Clarence Augustine Th Tee:
Prediction of Hospital Readmission Combining Rule-based and Machine Learning Model. 352-355 - Wei-Chi Chen, Wei-Ta Chu

:
A Study of Self Distillation for Mango Image Classification. 356-359 - Dylan Josh Coming Lopez

, Cheng-Chang Lien:
Real-Time Human Violent Activity Recognition Using Complex Action Decomposition. 360-364 - Wen-Nung Lie, Hung-Ta Chiu, Jui-Chiu Chiang:

Disparity Map Estimation From Stereo Image Pair Using Deep Convolutional Network. 365-369 - Kuan-Yu Huang

, Pei-Yin Chen, Ching-Ching Huang:
A low-complexity learning-based algorithm for joint application of demosaicking and up-scaling. 370-375 - Chih-Hsuan Wu, Jun-Wei Hsieh, Chia-Yu Wang, Chih-Hsiang Ho:

Marine Pollution Detection based on Deep Learning and Optical Flow. 376-381 - S. P. Joseph, L. L. M. C. Wijerathna, K. G. R. D. Epa, E. K. W. A. P. K. Egalla, Pradeep K. W. Abeygunawardhana, R. De Silva:

Smart Harvesting based on Image Processing. 382-386 - Tzu-Wei Chiu Huang, Keng-Hao Liu, Chih-Cheng Pai, Chinsu Lin, Yang-Chu Chen:

Detection of The Erosion Area of Lotus Leaf Using Hyperspectral Imaging. 387-391 - Chih-Cheng Pai, Yang-Chu Chen, Keng-Hao Liu, Yuan-Hsun Tsai, Po-Chi Hu, Zong-Hsin Liu:

Pork Tissue Recognition Using Visible and Near Infrared Hyperspectral Imaging. 392-396 - Po-Wen Chi, Ming-Hung Wang

, Yu Zheng:
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking. 397-402 - Yi-Fan Tseng, Jheng-Jia Huang:

Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes. 403-407 - Yi-Ming Chen, An-Chi He, Guo-Chung Chen, Yu-Chi Liu:

Android malware detection system integrating block feature extraction and multi-head attention mechanism. 408-413 - Sying-Jyan Wang

, Cheng Xuan Cai, Yen-Wen Tseng, Katherine Shu-Min Li:
Feature Selection for Malicious Traffic Detection with Machine Learning. 414-419 - M. Fahim Ferdous Khan, Ken Sakamura:

A Context-Policy-based Approach to Access Control for Healthcare Data Protection. 420-425 - Cheng-Wei Huang, Tien-Yi Wu, Yuan Tai, Ching-Hsuan Shao, Lo-An Chen, Meng-Hsun Tsai

:
Machine learning-based IP Camera identification system. 426-430 - Clémentine Gritti:

Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud Storage. 431-436 - You-Wei Chang, Po-Ching Lin:

SSOV: A Single Sign-on Protocol for Accessing Vehicular Application Services with the Support of Secret Credential Management System. 437-442 - Kuan-Ming Su, I-Hsien Liu

, Jung-Shian Li:
The Risk of Industrial Control System Programmable Logic Controller Default Configurations. 443-447 - Chun-Yu Chen, Lo-An Chen, Yun-Zhan Cai, Meng-Hsun Tsai

:
RNN-based DDoS Detection in IoT Scenario. 448-453 - Shao-Hua Wang, Chen-Xuan Lin, Chia-Heng Tu, Ching-Chun Jim Huang, Jyh-Ching Juang:

Autonomous Vehicle Simulation for Asia Urban Areas with a Perspective from Education. 454-458 - B. V. P. Prasad, Qing Yuan Huang, Jing-Jou Tang:

Development of a Prototype EV Autonomous Vehicle for Systematic Research. 459-461 - Chun-An Lin, Chun-Feng Liao:

User-Managed Access Delegation for Blockchain-driven IoT Services. 462-467 - Huang Yu Hsiang, Tseng Sheng Yuan, Ping Wang, Wen-Hui Lin, Lin Hsiao Chung:

A Case Study on Experiment Site Selection for PV Energy Generation Forecast. 468-472 - Bao-An Nguyen

, Kuan-Yu Ho, Hsi-Min Chen:
Measure Students' Contribution in Web Programming Projects by Exploring Source Code Repository. 473-478 - Hewage H. A. S. S, Hettiarachchi K. U, Jayarathna K. M. J. B, Hasintha K. P. C., Amila Senarathne

, Janaka Wijekoon:
Smart Human Resource Management System to Maximize Productivity. 479-484 - Hong-Bao Ye, Hsiang-Yang Weng, Hewijin Christine Jiau:

Exploiting Third-party SDK Sensitive Data Leakage. 485-490 - Jen-Hao Kuo, Yi-Hao Li, Hewijin Christine Jiau:

Revealing Coordination Needs from Task Allocation for Team Performance Estimation. 491-496 - Jong-Yih Kuo, Hui-Chi Lin, Huang-Song Yu:

Study of Automatic Programs Quality Analysis and Correction. 503-507 - Jong-Yih Kuo, Hui-Chi Lin, Jia-Yu Chen:

The Study of Programming Debugging and Intelligent Feedback System. 508-512 - Yu-Te Wang, Chu-Fei Wu, Shang-Pin Ma, Hsuan-Tung Chen, Shih-Ying Chang, Chun-Sheng Li:

PDAS: A Digital-Signature-Based Authorization Platform for Digital Personal Data. 513-518 - Chia-Yu Li, Shang-Pin Ma, Tsung-Wen Lu:

Microservice Migration Using Strangler Fig Pattern: A Case Study on the Green Button System. 519-524 - Yu Tsou, Deng-Neng Chen, Chia-Yu Lai:

A Cross-lingual Patent Topics Model for Trend Analysis. 525-528 - Vitaly Romanov, Vladimir Ivanov, Giancarlo Succi

:
Approaches for Representing Software as Graphs for Machine Learning Applications. 529-534 - Wen-Tse Chiu, Cheng-Hsuan Lin, Ci-Lin Jhu, Chinsu Lin, Ying-Cheng Chen, Mei-Jing Huang, Wei-Min Liu

:
Semantic Segmentation of Lotus Leaves in UAV Aerial Images via U-Net and DeepLab-based Networks. 535-540 - Ching-Ming Chao, Wei-Tien Chang:

Application of Social Analytics to Credit Rating in Financial Technology. 541-547 - Chia-Hui Chang

, Yuan-Hao Lin, Hsiu-Min Chuang:
EventGo! Exploring Event Dynamics from Social-Media Posts. 548-552 - Yu-Chieh Chao, Chia-Hui Chang

:
Automatic Spelling Correction for ASR Corpus in Traditional Chinese Language using Seq2Seq Models. 553-558 - Frank S. C. Tseng, Annie Y. H. Chou:

Spatiotemporal Multi-Dimensional Modeling of Data Warehouse for Event Tracing Applications. 559-564 - Chang-Ming Tsai, Cheng-Te Li:

TideFC: Learning Temporal Interaction for Dynamic Embedding via Feature Crossing. 565-569 - Chun-Ming Lai

, Yi-Chen Liu, Rong-Ching Chang, Jon William Chapman, Chu-Hsing Lin:
Pandemic Response and Crisis Informatics: An Imperative for Public Health Messaging. 570-575 - Ying-Hong Wang, Lin Hui, Yi-Cheng Chen, Meng-Shiu Chaung:

An Algorithm based on Efficient Influence Maximization applied to Social Network. 576-581

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














