default search action
Jehn-Ruey Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j38]Jehn-Ruey Jiang, Chun-Wei Chu:
Classifying and Benchmarking Quantum Annealing Algorithms Based on Quadratic Unconstrained Binary Optimization for Solving NP-Hard Problems. IEEE Access 11: 104165-104178 (2023) - [j37]Jehn-Ruey Jiang, Hanas Subakti:
An Indoor Location-Based Augmented Reality Framework. Sensors 23(3): 1370 (2023) - [c71]Jehn-Ruey Jiang, Yu-Jie Wang:
Quantum Circuit Based on Grover's Algorithm to Solve Exact Cover Problem. APWCS 2023: 1-5 - [c70]Jehn-Ruey Jiang, Hsueh-Chih Chen:
Manufacturing Quality Prediction Based on Deep Learning in Conjunction with Gramian Angular and Markov Transition Fields. ICCE-Taiwan 2023: 439-440 - [c69]Jehn-Ruey Jiang, Si-Han Chen:
Deep Learning Multi-objective Optimization for Smart Manufacturing via Elitist Genetic Algorithm. ICCE-Taiwan 2023: 545-546 - [c68]Jehn-Ruey Jiang, Chien-Kai Liao:
Credit Card Fraud Detection Based on DeepInsight and Deep Learning. ICCE-Taiwan 2023: 559-560 - [c67]Jehn-Ruey Jiang, You-Lin Chen:
Transfer Learning for Fingerprint-based Indoor Localization Calibration. ICCE-Taiwan 2023: 561-562 - [i2]Jehn-Ruey Jiang, Qiao-Yi Lin:
Utilizing Novel Quantum Counters for Grover's Algorithm to Solve the Dominating Set Problem. CoRR abs/2312.09388 (2023) - 2022
- [j36]Jehn-Ruey Jiang, Yan-Ting Chen:
Industrial Control System Anomaly Detection and Classification Based on Network Traffic. IEEE Access 10: 41874-41888 (2022) - [j35]Jehn-Ruey Jiang, Yan-Ting Lin:
Deep Learning Anomaly Classification Using Multi-Attention Residual Blocks for Industrial Control Systems. Sensors 22(23): 9084 (2022) - [i1]Jehn-Ruey Jiang:
Quantum Entanglement with Self-stabilizing Token Ring for Fault-tolerant Distributed Quantum Computing System. CoRR abs/2209.11361 (2022) - 2021
- [j34]Jehn-Ruey Jiang, Yen-Chung Chen, Ting-Yu Lin:
Particle swarm optimization for charger deployment in wireless rechargeable sensor networks. Int. J. Parallel Emergent Distributed Syst. 36(6): 652-667 (2021) - [j33]Jehn-Ruey Jiang, Hanas Subakti, Hui-Sung Liang:
Fingerprint Feature Extraction for Indoor Localization. Sensors 21(16): 5434 (2021) - [c66]Jehn-Ruey Jiang, Chia-Lin Li:
Binary- and Multi-class Network Intrusion Detection with Adaptive Synthetic Sampling and Deep Learning. ICCE-TW 2021: 1-2 - 2020
- [j32]Jehn-Ruey Jiang, Juei-En Lee, Yi-Ming Zeng:
Time Series Multiple Channel Convolutional Neural Network with Attention-Based Long Short-Term Memory for Predicting Bearing Remaining Useful Life. Sensors 20(1): 166 (2020) - [c65]Jehn-Ruey Jiang, Zi-Kuan Cheng:
Product Quality Prediction with Deep Transfer Learning for Smart Factories. ICCE-TW 2020: 1-2 - [c64]Jehn-Ruey Jiang, Cheng-Tai Yen:
Markov Transition Field and Convolutional Long Short-Term Memory Neural Network for Manufacturing Quality Prediction. ICCE-TW 2020: 1-2 - [c63]Jehn-Ruey Jiang:
Short Survey on Physical Layer Authentication by Machine-Learning for 5G-based Internet of Things. ICKII 2020: 41-44 - [c62]Jehn-Ruey Jiang, Yen-Chung Chen, Chung-Hsien Tsai, Zong-Syun Wu:
Meta-optimization for Charger Deployment in Wireless Rechargeable Sensor Networks. ICKII 2020: 185-188 - [c61]Tzu-Hsuan Lin, Jehn-Ruey Jiang:
Anomaly Detection with Autoencoder and Random Forest. ICS 2020: 96-99
2010 – 2019
- 2019
- [c60]Jehn-Ruey Jiang, Wei-Sheng Chung:
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service. SOCA 2019: 147-153 - 2018
- [c59]Hanas Subakti, Jehn-Ruey Jiang:
Indoor Augmented Reality Using Deep Learning for Industry 4.0 Smart Factories. COMPSAC (2) 2018: 63-68 - [c58]Jehn-Ruey Jiang, Hanas Subakti, Ching-Chih Chen, Kazuya Sakai:
PINUS: Indoor Weighted Centroid Localization with Crowdsourced Calibration. PDCAT 2018: 433-443 - 2017
- [j31]Yung-Liang Lai, Jehn-Ruey Jiang:
Optimizing Detection Quality and Transmission Quality of Barrier Coverage in Heterogeneous Wireless Sensor Networks. Mob. Networks Appl. 22(5): 959-969 (2017) - [j30]Ke-Han Yao, Jehn-Ruey Jiang, Chung-Hsien Tsai, Zong-Syun Wu:
Evolutionary Beamforming Optimization for Radio Frequency Charging in Wireless Rechargeable Sensor Networks. Sensors 17(8): 1918 (2017) - 2016
- [j29]Jehn-Ruey Jiang, Jih-Wei Wu, Chi-Wen Fann, Jie-Yi Wu:
Immersive voice communication for massively multiplayer online games. Peer-to-Peer Netw. Appl. 9(1): 54-66 (2016) - [c57]Jehn-Ruey Jiang, Szu-Yuan Chen:
Constructing Multiple Steiner Trees for Software-Defined Networking Multicast. CFI 2016: 1-6 - [c56]Hanas Subakti, Jehn-Ruey Jiang:
A Marker-Based Cyber-Physical Augmented-Reality Indoor Guidance System for Smart Campuses. HPCC/SmartCity/DSS 2016: 1373-1379 - [c55]Yen-Chung Chen, Jehn-Ruey Jiang:
Particle Swarm Optimization for Charger Deployment in Wireless Rechargeable Sensor Networks. ITNAC 2016: 231-236 - [c54]Ming-Kuei Yeh, Yung-Liang Lai, Jehn-Ruey Jiang:
Silence Coding for RFID Tag Anti-Collision. LCN 2016: 240-243 - 2015
- [j28]Yung-Liang Lai, Jehn-Ruey Jiang:
Optimising sink-connected barrier coverage in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 20(1): 39-48 (2015) - [c53]Yu-Chung Huang, Jehn-Ruey Jiang:
Ultralightweight RFID Reader-Tag Mutual Authentication. COMPSAC Workshops 2015: 613-616 - [c52]Pei-Chen Qiu, Whai-En Chen, Jehn-Ruey Jiang:
Traffic Offloading with Mobility in LTE HeNB Networks. ICPADS 2015: 809-814 - [c51]Yu-Chung Huang, Jehn-Ruey Jiang:
Ultralightweight RFID Reader-Tag Mutual Authentication Revisited. IEEE MS 2015: 166-173 - 2014
- [j27]Jehn-Ruey Jiang, Chih-Ming Lin, Kai-Chao Cheng, Shing-Tsaan Huang:
Fingerprinting localisation with cruciate directional antennas for wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 15(1/2/3): 161-170 (2014) - [j26]Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Four-ary query tree splitting with parallel responses for RFID tag anti-collision. Int. J. Ad Hoc Ubiquitous Comput. 16(3): 193-205 (2014) - [c50]Jehn-Ruey Jiang, Hsin-Wen Huang, Ji-Hau Liao, Szu-Yuan Chen:
Extending Dijkstra's shortest path algorithm for software defined networking. APNOMS 2014: 1-4 - [c49]Jia-Jiun Yang, Jehn-Ruey Jiang, Yung-Liang Lai:
A Decreasing k-means algorithm for the Disk Covering Tour Problem in wireless sensor networks. ICPADS 2014: 906-910 - [c48]Ming-Kuei Yeh, Yung-Liang Lai, Jehn-Ruey Jiang:
An Efficient Query Tree protocol for RFID tag anti-collision. ICPADS 2014: 926-930 - [c47]Ji-Hau Liao, Chi-Ming Hong, Jehn-Ruey Jiang:
An Adaptive Algorithm for Charger Deployment Optimization in Wireless Rechargeable Sensor Networks. ICS 2014: 2080-2089 - [c46]Jehn-Ruey Jiang, Widhi Yahya, Mahardeka Tri Ananta:
Load Balancing and Multicasting Using the Extended Dijkstra's Algorithm in Software Defined Networking. ICS 2014: 2123-2132 - [c45]Yu-Chung Huang, Jehn-Ruey Jiang:
Efficient Ultralightweight RFID Mutual Authentication. iThings/GreenCom/CPSCom 2014: 102-108 - [c44]Jih-Wei Wu, Ding-Wei Chou, Jehn-Ruey Jiang:
The Virtual Environment of Things (VEoT): A Framework for Integrating Smart Things into Networked Virtual Environments. iThings/GreenCom/CPSCom 2014: 456-459 - 2013
- [j25]Yung-Liang Lai, Jehn-Ruey Jiang:
A 3-dimensional broadcast protocol with optimised transmission efficiency in wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 12(4): 205-215 (2013) - [j24]Jehn-Ruey Jiang, Chih-Ming Lin, Feng-Yi Lin, Shing-Tsaan Huang:
ALRD: AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j23]Chin-Ling Chen, Yu-Chung Huang, Jehn-Ruey Jiang:
A secure ownership transfer protocol using EPCglobal Gen-2 RFID. Telecommun. Syst. 53(4): 387-399 (2013) - [c43]Ming-Kuei Yeh, Jehn-Ruey Jiang:
A Novel Query Tree Protocol Based on Partial Responses for RFID Tag Anti-collision. ICPADS 2013: 617-622 - 2012
- [j22]Jehn-Ruey Jiang, Yung-Liang Lai:
Wireless Broadcasting with Optimized Transmission Efficiency. J. Inf. Sci. Eng. 28(3): 479-502 (2012) - [c42]Yung-Liang Lai, Hsueh-Chi Shih, Jehn-Ruey Jiang:
Strategies of Mobile Agents on Malicious Clouds. AMCIS 2012 - [c41]Mo-Che Chan, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Fault-Tolerant and secure networked storage. ICDIM 2012: 186-191 - [c40]Jung-Shyr Wu, Shun-Fang Yang, Chia-Ming Hsu, Jiun-Yu Tu, Jehn-Ruey Jiang:
User Satisfaction-Based Scheduling Algorithm for Uplink Transmission in Long Term Evolution System. ICPADS 2012: 930-935 - [c39]Yu-Chung Huang, Jehn-Ruey Jiang:
An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags. PAAP 2012: 133-140 - [c38]Yung-Liang Lai, Jehn-Ruey Jiang:
Barrier coverage with optimized quality for wireless sensor networks. WPMC 2012: 192-196 - 2011
- [j21]Jehn-Ruey Jiang, Yung-Liang Lai, Fu-Cheng Deng:
Mobile Robot Coordination and navigation with directional antennas in positionless Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 7(4): 272-280 (2011) - [j20]Ming-Kuei Yeh, Jehn-Ruey Jiang:
Parallel Splitting for RFID tag anti-collision. Int. J. Ad Hoc Ubiquitous Comput. 8(4): 249-260 (2011) - [j19]Jehn-Ruey Jiang:
Nondominated local coteries for resource allocation in grids and clouds. Inf. Process. Lett. 111(8): 379-384 (2011) - [j18]Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, Jih-Wei Wu:
An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks. J. Inf. Sci. Eng. 27(2): 657-680 (2011) - [c37]Chi-Wen Fann, Jehn-Ruey Jiang, Jih-Wei Wu:
Peer-to-Peer Immersive Voice Communication for Massively Multiplayer Online Games. ICPADS 2011: 759-764 - [c36]Yu-Tan Huang, Chih-Ming Lin, Jehn-Ruey Jiang, Wei Tsang Ooi, Maha Abdallah, Khaled Boussetta:
SYMA: A Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games. ICPADS 2011: 793-798 - [c35]Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Parallel Response Query Tree Splitting for RFID Tag Anti-collision. ICPP Workshops 2011: 6-15 - [c34]Yung-Liang Lai, Jehn-Ruey Jiang:
Optimal Multipath Planning for Neyman-Pearson Detection in Wireless Sensor Networks. ICPP Workshops 2011: 57-62 - 2010
- [j17]Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, Chuan-Wei Cheng:
Bandwidth-aware Peer-to-Peer 3D streaming. Int. J. Adv. Media Commun. 4(4): 324-342 (2010) - [j16]Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen:
Peer-to-Peer 3D Streaming. IEEE Internet Comput. 14(2): 54-61 (2010) - [j15]Chi-Hung Tzeng, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Size-Independent Self-Stabilizing Asynchronous Phase Synchronization in General Graphs. J. Inf. Sci. Eng. 26(4): 1307-1322 (2010) - [c33]Jehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu:
Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks. ICPADS 2010: 829-834 - [c32]Jehn-Ruey Jiang, Ching-Chuan Huang, Chung-Hsien Tsai:
Avatar Path Clustering in Networked Virtual Environments. ICPADS 2010: 845-850 - [c31]Jehn-Ruey Jiang, Chih-Ming Lin, Yi-Jia Hsu:
Localization with Rotatable Directional Antennas for Wireless Sensor Networks. ICPP Workshops 2010: 542-548 - [c30]Yung-Liang Lai, Jehn-Ruey Jiang:
Optimal Multipath Planning for Intrusion Detection in Smart Homes Using Wireless Sensor and Actor Networks. ICPP Workshops 2010: 562-570
2000 – 2009
- 2009
- [j14]Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Adaptive splitting and pre-signaling for RFID tag anti-collision. Comput. Commun. 32(17): 1862-1870 (2009) - [j13]Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao, Ching-Hao Liu:
MUREX: A mutable replica control scheme for structured peer-to-peer storage systems. Int. J. Pervasive Comput. Commun. 5(1): 9-24 (2009) - [j12]Chi-Hung Tzeng, Jehn-Ruey Jiang, Shing-Tsaan Huang:
A self-stabilizing algorithm for the maximum planarization problem in complete bipartite networks. Inf. Process. Lett. 109(10): 518-522 (2009) - [j11]Jehn-Ruey Jiang, Tzu-Ming Sung:
Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks. J. Networks 4(6): 403-410 (2009) - [j10]Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang:
Secure peer-to-peer 3D streaming. Multim. Tools Appl. 45(1-3): 369-384 (2009) - [c29]Yung-Liang Lai, Jehn-Ruey Jiang:
Broadcasting with Optimized Transmission Efficiency in 3-Dimensional Wireless Networks. ICPADS 2009: 80-87 - [c28]Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Hung, Wei Tsang Ooi:
Group-Based Peer-to-Peer 3D Streaming Authentication. ICPADS 2009: 685-691 - [c27]Yung-Liang Lai, Jehn-Ruey Jiang:
Optimal Path Planning for Fault-Tolerant and Energy-Efficient Target Surveillance in Wireless Sensor and Actor Networks. Mobile Data Management 2009: 531-535 - [c26]Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang:
Bandwidth-aware Peer-to-Peer 3D streaming. NETGAMES 2009: 1-6 - 2008
- [j9]Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang:
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Comput. Networks 52(9): 1838-1845 (2008) - [j8]Jehn-Ruey Jiang:
Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks. Comput. Networks 52(17): 3296-3306 (2008) - [j7]Guan-Yu Huang, Shun-Yun Hu, Jehn-Ruey Jiang:
Scalable reputation management with trustworthy user selection for P2P MMOGs. Int. J. Adv. Media Commun. 2(4): 380-401 (2008) - [j6]Jehn-Ruey Jiang, Chau-Yuan Yang, Ting-Yao Chiou, Shing-Tsaan Huang:
A hybrid power-saving protocol by dual-channel and dual-transmission-range clustering for IEEE 802.11-based MANETs. Int. J. Pervasive Comput. Commun. 3(3): 227-242 (2008) - [c25]Jehn-Ruey Jiang, Jih-Wei Wu, Guan-Shien Du:
Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-sink Wireless Sensor Networks. APSCC 2008: 1120-1126 - [c24]Shun-Yun Hu, Shao-Chen Chang, Jehn-Ruey Jiang:
Voronoi State Management for Peer-to-Peer Massively Multiplayer Online Games. CCNC 2008: 1134-1138 - [c23]Yu-Chia Chang, Jehn-Ruey Jiang, Jang-Ping Sheu, Hsin-Yi Shih:
ADCA: An Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks. GLOBECOM 2008: 383-387 - [c22]Jang-Ping Sheu, Jehn-Ruey Jiang, Ching Tu:
Anonymous Path Routing in Wireless Sensor Networks. ICC 2008: 2728-2734 - [c21]Jehn-Ruey Jiang, Tzu-Ming Sung:
Maintaining Connected Coverage for Wireless Sensor Networks. ICDCS Workshops 2008: 297-302 - [c20]Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu:
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments. ICDCS Workshops 2008: 447-452 - [c19]Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang:
Delaunay State Management for Large-Scale Networked Virtual Environments. ICPADS 2008: 781-786 - [c18]Shun-Yun Hu, Jehn-Ruey Jiang:
Plug: Virtual Worlds for Millions of People. ICPADS 2008: 787-792 - [c17]Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, Bing-Yu Chen:
FLoD: A Framework for Peer-to-Peer 3D Streaming. INFOCOM 2008: 1373-1381 - [c16]Jehn-Ruey Jiang, Yung-Liang Lai, Fu-Cheng Deng:
Mobile robot coordination and navigation with directional antennas in positionless wireless sensor networks. Mobility Conference 2008: 80 - [c15]Wei-Lun Sung, Shun-Yun Hu, Jehn-Ruey Jiang:
Selection strategies for peer-to-peer 3D streaming. NOSSDAV 2008: 15-20 - 2007
- [j5]Chi-Hung Tzeng, Jehn-Ruey Jiang, Shing-Tsaan Huang:
A self-stabilizing (Delta+4)-edge-coloring algorithm for planar graphs in anonymous uniform systems. Inf. Process. Lett. 101(4): 168-173 (2007) - [c14]Jehn-Ruey Jiang, Jiun-Shiang Chiou, Shun-Yun Hu:
Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual Environments. ICDCS Workshops 2007: 71 - [c13]Jehn-Ruey Jiang:
Message from P2P-NVE Program Chair. ICPADS 2007: 1 - [c12]Jehn-Ruey Jiang, Hung-Shiang Chen:
Peer-to-Peer AOI voice chatting for massively multiplayer online games. ICPADS 2007: 1-8 - [c11]Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang:
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games. Networking 2007: 1037-1046 - 2006
- [c10]Jehn-Ruey Jiang, Chung-Ta King, Chi-Hsiang Liao:
MUREX: A Mutable Replica Control Scheme for Structured Peer-to-Peer Storage Systems. GPC 2006: 93-102 - [c9]Chi-Hung Tzeng, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Self-stabilizing Asynchronous Phase Synchronization in General Graphs. SSS 2006: 501-515 - 2005
- [j4]Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, Ten-Hwang Lai:
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks. Mob. Networks Appl. 10(1-2): 169-181 (2005) - 2004
- [j3]Jehn-Ruey Jiang:
On the Nondomination of Cohorts Coteries. IEEE Trans. Computers 53(7): 922-923 (2004) - [c8]Jehn-Ruey Jiang:
A Fault-Tolerant h-Out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems. PDCAT 2004: 267-273 - 2003
- [c7]Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, Ten-Hwang Lai:
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks. ICPP 2003: 257-264 - [c6]Jehn-Ruey Jiang, Cheng-Sheng Chou, Shing-Tsaan Huang:
Constructing Nondominated Local Coteries for Distributed Resource Allocation. ICPP Workshops 2003: 123-130 - [c5]Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee:
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network. ICPP Workshops 2003: 375- - 2002
- [c4]Jehn-Ruey Jiang:
A Distributed h-out of -k Mutual Exclusion Algorithm for Ad Hoc Mobile Networks. IPDPS 2002 - [c3]Jehn-Ruey Jiang:
A Group Mutual Exclusion Algorithm for Ad Hoc Mobile Networks. JCIS 2002: 266-270
1990 – 1999
- 1997
- [j2]Jehn-Ruey Jiang, Shing-Tsaan Huang, Yu-Chen Kuo:
Cohorts Structures for Fault-Tolerant k Entries to a Critical Section. IEEE Trans. Computers 46(2): 222-228 (1997) - 1995
- [j1]Jehn-Ruey Jiang:
The Column Protocol: A High Availability and Low Message Cost Solution for Managing Replicated Data. Inf. Syst. 20(8): 687-696 (1995) - 1994
- [c2]Jehn-Ruey Jiang, Shing-Tsaan Huang:
Obtaining Nondominated K-Coteries for Fault-Tolerant Distributed K-Mutual Exclusion. ICPADS 1994: 582-587 - 1993
- [c1]Shing-Tsaan Huang, Jehn-Ruey Jiang, Yu-Chen Kuo:
K-Coteries for Fault-Tolerant K Entries to a Critical Section. ICDCS 1993: 74-81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 20:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint