


default search action
ICS 2022: Taoyuan, Taiwan
- Sun-Yuan Hsieh

, Ling-Ju Hung
, Ralf Klasing, Chia-Wei Lee
, Sheng-Lung Peng
:
New Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings. Communications in Computer and Information Science 1723, Springer 2022, ISBN 978-981-19-9581-1
Invited Paper
- Dong Xiang:

High-Radix Interconnection Networks. 3-9
Algorithms, Bioinformatics, and Computation Theory
- Robert D. Barish

, Tetsuo Shibuya
:
String Editing Under Pattern Constraints. 13-24 - Hans-Joachim Böckenhauer

, Fabian Frei
, Silvan Horvath
:
Priority Algorithms with Advice for Disjoint Path Allocation Problems (Extended Abstract). 25-36 - Juhi Chaudhary

, B. S. Panda:
On Two Variants of Induced Matchings. 37-48 - Meirun Chen, Cheng-Kuan Lin, Kung-Jui Pai:

A Tree Structure for Local Diagnosis in Multiprocessor Systems Under Comparison Model. 49-60 - Po-An Chen, Chi-Jen Lu, Chuang-Chieh Lin

, Ke-Wei Fu:
Multiagent Learning for Competitive Opinion Optimization (Extended Abstract). 61-72 - Guillaume Fertin

, Oscar Fontaine, Géraldine Jean
, Stéphane Vialette
:
The Maximum Zero-Sum Partition Problem. 73-85 - Ruei-Sing Guan

, Yu-Chee Tseng
, Jen-Jee Chen
, Po-Tsun Paul Kuo
:
Combined Bayesian and RNN-Based Hyperparameter Optimization for Efficient Model Selection Applied for autoML. 86-97 - Sanpawat Kantabutra:

Adiabatic Quantum Computation for Cyber Attack and Defense Strategies. 98-110 - Tengxiang Lin

, Cheng-Kuan Lin
, Zhen Chen, Hongju Cheng
:
Computation Offloading Algorithm Based on Deep Reinforcement Learning and Multi-Task Dependency for Edge Computing. 111-122 - Yali Lv

, Cheng-Kuan Lin
, D. Frank Hsu, Jianxi Fan
:
A Comparison Diagnosis Algorithm for Conditional Fault Local Diagnosis of Multiprocessor Systems. 123-134 - Sushmita Paul, Ratanjeet Pratap Chauhan, Srinibas Swain

:
Novel Ways of Enumerating Restrained Dominating Sets of Cycles. 135-144 - Xiao-Wen Qin, Rong-Xia Hao, Sheng-Lung Peng:

Fault Diagnosability of Multigraph Matching Composition Networks. 145-155 - Md. Tahmidur Rafid, Rabeeb Ibrat

, Md. Saidur Rahman
:
Generating Scale-Free Outerplanar Networks. 156-166 - Suying Wu

, Baolei Cheng
, Yan Wang
, Yuejuan Han
, Jianxi Fan
:
Hamiltonian Properties of the Dragonfly Network. 167-179 - Tomoyuki Yamakami:

Fine Grained Space Complexity and the Linear Space Hypothesis (Preliminary Report). 180-191 - Kun Zhao, Hongbin Zhuang

, Xiao-Yan Li, Fangying Song, Lichao Su:
Partition-Edge Fault-Tolerant Hamiltonicity of Pancake Graphs. 192-204
Cloud Computing and Big Data
- Che-Wei Chang, Xinyu Zhang, Hung-Chang Hsiao:

Query Regrouping Problem on Tree Structure for GPUs Accelerated Platform. 207-211 - Chih-Ming Huang, Ming-Ya Hsu, Chuan-Sheng Hung, Chun-Hung Richard Lin, Shi-Huang Chen:

The Enhancement of Classification of Imbalanced Dataset for Edge Computing. 212-222 - Shih-Wen Jiang, Syuan-You Chen, Whai-En Chen, Hsin-Te Wu:

Development of Personnel Epidemic Prevention Monitoring Access Control System. 223-229 - Robert Banaszak, Anna Kobusinska:

The Use of Serverless Processing in Web Application Development. 230-242 - Ming-Huang Tsai, Yun-He Wang, Wu-Chun Chung:

Scaling Model for vIMS on the Cloud. 243-254 - Chen-Shu Wang, Yean-Lin Lee:

Using Classification Algorithms to Predict Taiwan Stock Market - A Case Study of Taiwan Index Futures. 255-266 - Sheng-Kai Wang, Wan-Lin You, Shang-Pin Ma:

Semi-automatic Chatbot Generation for Web APIs. 267-278 - Rita Wiryasaputra

, Chin-Yin Huang
, Rio Williyanto, Chao-Tung Yang
:
Prediction of Middle-Aged Unhealthy Facial Skin Using VGG19 and Support Vector Machine Models. 279-289
Computer Vision and Image Processing
- Alan Shu-Luen Chang:

Real-Time Intentional Eye Blink Detection Using Rhombus Identification. 293-304 - Yu-Kai Ling, Ren Chieh Yang, Sheng-De Wang:

Difficulty-Aware Mixup for Replay-based Continual Learning. 305-316 - Kai-Xiang Liu, Chuan-Yu Chang, Huei-Ming Ma

:
Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology. 317-328 - Sophia Yang, Jun-Teng Zhang, Chia-Wen Lin, Chih-Chung Hsu

:
GAN-Based Criminal Suspect Face Generator. 329-340
Cryptography and Information Security
- Chia-Mei Chen, Yu-Xuan Wang, Zheng-Xun Cai, Boyi Lee, Gu-Hsin Lai:

Automatic Summarization of Critical Threat Intelligence Using Transfer Learning. 343-348 - Wei Gu

, Ching-Chun Chang
, Yu Bai, Yunyuan Fan, Liang Tao, Li Li
:
Anti-screenshot Watermarking Algorithm About Archives Image Based on Deep Learning Model. 349-361 - Chien-Hui Hung, Yi-ming Chen, Chao-Ching Wu:

Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature Calculation. 362-373 - Shin-Jia Hwang, Tzu-Ping Chen:

A Detector Using Variant Stacked Denoising Autoencoders with Logistic Regression for Malicious JavaScript with Obfuscations. 374-386 - Bo-An Lai, Yi-Hsiu Yeh, Guan-Yu Chen, Jheng-Jia Huang, Nai-Wei Lo:

A Lightweight and Robust Authentication and Key Agreements with Physically Unclonable Function in Manufacturing Environments. 387-397 - Zheng Tang, Shiwei Jing, Jianjun Li, Guobao Hui, Wanyong Tian:

Image Compression and Meaningful Ciphertext Encryption Based on Histogram Shift Embedding. 398-406 - Fang-Ting Wu, Shao-Wei Tung, Jheng-Jia Huang

:
A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification. 407-418
Electronics and Information Technology
- Chih-Che Chang, Chia-Mei Chen, Han-Wei Hsiao:

Applying an IoT Analytics Framework in East Asia Area. 421-433 - Wen-Ting Chang, Yi-Ming Chen, Hui-Hsuan Yang:

Android Malware Classifier Combining Permissions and API Features to Face Model Drifting. 434-446 - Jih-Ching Chiu, Yu-Quen Chen, Yi-Xiang Wang, Yung-Chi Liu:

Design and Implementation of the Optimized Computing Architecture for Matrix Decomposition Algorithms. 447-459 - Jih-Ching Chiu, Zhe-You Yan, Yung-Chi Liu:

Design and Implementation of the CNN Accelator Based on Multi-streaming SIMD Mechanisms. 460-473 - Jih-Ching Chiu, Yan-Ting Wu, Yung-Chi Liu, Chi-Yang Hsieh:

Design and Implementation of the Link-List DMA Controller for High Bandwidth Data Streaming. 474-486 - Hsiu-Mei Chou, Sugita Norika, Ching-Yeh Hsin, Tso-Chung Sung:

STEM Education Meets HPC. 487-492 - Chi-Yueh Hsu, Chun-Ming Kuo, Ruo-Wei Hung, Jong-Shin Chen:

Research on KNN-Based GNSS Coordinate Classification for Epidemic Management. 493-500 - Yung-Fa Huang, Shu-Wai Chang, Chuan-Bi Lin, Chun-Jung Chen, Shi-Jun Li, Ching-Mu Chen:

An Improved Light Weight Countermeasure Scheme to Efficiently Mitigate TCP Attacks in SDN. 501-511 - Ah-Fur Lai, Cheng-Ying Yang:

The Effectiveness of Block-Based Programming Learning on the Problem-Solving Skills of the Freshmen. 512-520 - Jason Lin

, Chia-Wei Tsai
, Chun-Wei Yang
, Elie Lafortune:
Behavior Profiling of Role-Playing Game Players Based on Heuristic Event Log Mining. 521-532 - Pai-Ching Tseng, Yi-Li Liou, Iuon-Chang Lin, Tzu-Ching Weng:

The Impact of Live Streaming on Personal Purchase Behavior. 533-544 - Hong-Wen Wang, Dai-Yi Chiu, Wei-Chung Chan, Zhi-Fang Yang:

Stochastic-Gradient-Descent-Based Max-Margin Early Event Detector. 545-552 - Sheng-Ming Wang, Muhammad Ainul Yaqin

, Fu-Hsiang Hsu
:
AHP-Based Assessment of Developing Online Virtual Reality Services with Progressive Web Apps. 553-566 - Mei-Yu Wu, Chih-Kun Ke:

From Data of Internet of Things to Domain Knowledge: A Case Study of Exploration in Smart Agriculture. 567-576 - Cheng-Ying Yang, Chuan-Bi Lin, Jenq-Foung JF Yao, Ming-Hsiang Hwang:

Physical Layer Coding and Cryptanalysis for the Secure Communications. 577-584
Mobile Computation and Wireless Communication
- Chun Hsiung, Fuchun Joseph Lin

, Jyh-Cheng Chen, Chien Chen:
5G Network Slice Scalability Based on Management Data Analytics Function (MDAF). 587-598 - Shashank Mishra

, Jia-Ming Liang
:
Design and Analysis for Wireless Tire Pressure Sensing System. 599-610
Ubiquitous Cybersecurity and Forensics
- Tzu Hao Chen

, Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee
:
Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain. 613-624 - Nompilo Fakude

, Elmarie Kritzinger
:
Utilization of Theoretical Domains Framework (TDF) to Validate the Digital Piracy Behaviour Constructs - A Systematic Literature Review Study. 625-636 - Edy Kristianto

, Po-Ching Lin
, Ren-Hung Hwang
:
Domain-Specific Anomaly Detection for In-Vehicle Networks. 637-648 - Zhe-Wei Lin, Tzu-Hung Liu, Po-Wen Chi

:
LED: Learnable Encryption with Deniability. 649-660 - Guan-Yu Wang

, Hung-Jui Ko, Min-Yi Tsai, Wei-Jen Wang:
Module Architecture of Docker Image and Container Security. 661-669 - Hao-Yu Weng

, Min-Yi Tsai, Wei-Jen Wang, Cheng-Ta Huang:
High-Capacity Double-Layer Data Hiding Technique Based on 3D Magic Cube. 670-678

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














