Search the dblp DataBase
Huey-Ming Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Huey-Ming Lee , Chih-Jen Hsieh , Mu-Hsiu Hsu , Tsung-Yen Lee A Virtual Reality System on Grid Computing Architecture. [Citation Graph (0, 0)][DBLP ] EuroIMSA, 2006, pp:115-118 [Conf ] Huey-Ming Lee , Shih-Feng Liao , Shu-Yen Lee A Gene-based Early Warning Model in Home Network Control. [Citation Graph (0, 0)][DBLP ] Computational Intelligence, 2005, pp:288-291 [Conf ] Huey-Ming Lee , Shih-Feng Liao , Tsang-Yean Lee , Mu-Hsiu Hsu , Jin-Shieh Su A Self-tuning Emergency Model of Home Network Environment. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2006, pp:1111-1118 [Conf ] Huey-Ming Lee , Chao-Chi Hsu , Mu-Hsiu Hsu A Dynamic Supervising Model Based on Grid Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1258-1264 [Conf ] Huey-Ming Lee , Shih-Feng Liao An Emergency Model of Home Network Environment Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1245-1251 [Conf ] Huey-Ming Lee , Tsang-Yean Lee , Mu-Hsiu Hsu A Process Schedule Analyzing Model Based on Grid Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2006, pp:938-947 [Conf ] Huey-Ming Lee , Ching-Hao Mao , Shu-Yen Lee Intelligent Control Model of Information Appliances. [Citation Graph (0, 0)][DBLP ] KES, 2004, pp:123-128 [Conf ] Huey-Ming Lee , Pin-Jen Chen , Yao-Jen Shih , Yuan-Chieh Tsai , Ching-Hao Mao An Intelligent Extracting Web Content Agent on the Internet. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1265-1271 [Conf ] Huey-Ming Lee , Cheng-Hsiung Yang A Distributed Backup Agent Based on Grid Computing Architecture. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1252-1257 [Conf ] Huey-Ming Lee , Tsung-Yen Lee , Shu-Yen Lee , Jan-Jo Chen The Defuzzification by the Median and Centroid Rules. [Citation Graph (0, 0)][DBLP ] Modelling and Simulation, 2003, pp:386-388 [Conf ] Huey-Ming Lee , Tsung-Yen Lee , Shu-Yen Lee , Jan-Jo Chen Assessment of the Rate of Aggregative Risk in Software Development using a Fuzzy Group Model. [Citation Graph (0, 0)][DBLP ] Modelling and Simulation, 2003, pp:389-394 [Conf ] Jan-Jo Chen , Lixing Jia , Jian-Chern Chen , Wei-Wei Cheng , Huey-Ming Lee The Parallel Algorithm for an Improved SUMT Method for Equality Constrained Optimization. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2005, pp:327-330 [Conf ] Ju-Yu Huang , Huey-Ming Lee , Chen-Liang Fang A Chinese Text Mining Application: An Automatic Answer Reply to Customers' E-mail Queries Model. [Citation Graph (0, 0)][DBLP ] SEKE, 2005, pp:504-507 [Conf ] Huey-Ming Lee Generalization of the Group Decision Making Using Fuzzy Sets Theory for Evaluating the Rate of Aggregative Risk in Software Development. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:113, n:3-4, pp:301-311 [Journal ] Huey-Ming Lee , Shu-Yen Lee , Tsung-Yen Lee , Jan-Jo Chen A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2003, v:153, n:, pp:177-197 [Journal ] Jing-Shing Yao , Huey-Ming Lee Fuzzy Inventory with Backorder for Fuzzy Order Quantity. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1996, v:93, n:3, pp:283-319 [Journal ] Jershan Chiang , Jing-Shing Yao , Huey-Ming Lee Fuzzy Inventory with Backorder Deffuzzificaiton by Signed Distance Method. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2005, v:21, n:4, pp:673-694 [Journal ] Lily Lin , Huey-Ming Lee , Li-Hsueh Lin Comparison of Consumer Behaviors in Taiwan Non-store Channels. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:363-369 [Conf ] Huey-Ming Lee , Ching-Hao Mao A Self-adaptive Evolutionary Negative Selection Approach for Home Anomaly Events Detection. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:325-332 [Conf ] Huey-Ming Lee , Tsang-Yean Lee , Heng-Sheng Chen Certificate and Authority Application Based on Grid Environment. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:354-362 [Conf ] Lily Lin , Huey-Ming Lee Fuzzy Group Assessment for Facility Location Decision. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:386-392 [Conf ] Huey-Ming Lee , Jershan Chiang Fuzzy Production Inventory Based on Signed Distance. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2007, v:23, n:6, pp:1939-1953 [Journal ] A Process Scheduling Analysis Model Based on Grid Environment. [Citation Graph (, )][DBLP ] Fuzzy evaluating the rate of aggregative risk in software development. [Citation Graph (, )][DBLP ] Fuzzy Multiple Objective Programming Based on Interval-Valued Fuzzy Sets. [Citation Graph (, )][DBLP ] Fuzzy Assessment for Sampling Survey Defuzzification by Signed Distance Method. [Citation Graph (, )][DBLP ] A New Fuzzy Risk Assessment Approach. [Citation Graph (, )][DBLP ] Consumer Behaviors in Taiwan Online Shopping - Case Study of A Company. [Citation Graph (, )][DBLP ] A Fuzzy Risk Assessment in Software Development Defuzzified by Signed Distance. [Citation Graph (, )][DBLP ] The IEEE802.11n Capability Analysis Model Based on Mobile Networking Architecture. [Citation Graph (, )][DBLP ] Finding Abnormal Events in Home Sensor Network Environment Using Correlation Graph. [Citation Graph (, )][DBLP ] A System for Assisting English Oral Proficiency - A Case Study of the Elementary Level of General English Proficiency Test (GEPT) in Taiwan. [Citation Graph (, )][DBLP ] Verification of Stored Security Data in Computer System. [Citation Graph (, )][DBLP ] Collect and broadcast news in security. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.302secs