The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sy-Yen Kuo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo
    Dynamic Sub-mesh Protection under Dynamic Traffic Demands in Dense WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:511-514 [Conf]
  2. Chen-Shie Ho, Sy-Yen Kuo, Shih-Yi Yuan
    Group Partition and Restoration Strategies for Survivable WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:786-791 [Conf]
  3. Li-Ren Huang, Jing-Yang Jou, Sy-Yen Kuo
    An Efficient PRPG Strategy By Utilizing Essential Faults. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 1996, pp:199-204 [Conf]
  4. Li-Ren Huang, Jing-Yang Jou, Sy-Yen Kuo, Wen-Bin Liao
    Easily Testable Data Path Allocation Using Input/Output Registers. [Citation Graph (0, 0)][DBLP]
    Asian Test Symposium, 1996, pp:142-0 [Conf]
  5. Kai-Hui Chang, Wei-Ting Tu, Yi-Jong Yeh, Sy-Yen Kuo
    A Temporal Assertion Extension to Verilog. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:499-504 [Conf]
  6. Yung-Ruei Chang, Hung-Yau Lin, Ing-Yi Chen, Sy-Yen Kuo
    A Cut-Based Algorithm for Reliability Analysis of Terminal-Pair Network Using OBDD. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:368-0 [Conf]
  7. Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu
    Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1999, pp:468-0 [Conf]
  8. Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu
    Effort-Index-Based Software Reliability Growth Models and Performance Assessment. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:454-0 [Conf]
  9. Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. Lyu, Chuan-Ching Sue
    Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:186-191 [Conf]
  10. Jung-Hua Lo, Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu
    Sensitivity Analysis of Software Reliability for Component-Based Software Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:500-505 [Conf]
  11. Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu, Chin-Yu Huang
    Optimal Resource Allocation and Reliability Analysis for Component-Based Software Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:7-12 [Conf]
  12. Ing-Yi Chen, Geng-Lin Chen, Fredrick J. Hill, Sy-Yen Kuo
    The Sea-of-Wires Array Aynthesis System. [Citation Graph (0, 0)][DBLP]
    DAC, 1993, pp:188-193 [Conf]
  13. Sy-Yen Kuo, W. Kent Fuchs
    Efficient spare allocation in reconfigurable arrays. [Citation Graph (0, 0)][DBLP]
    DAC, 1986, pp:385-390 [Conf]
  14. Sy-Yen Kuo, W. Kent Fuchs
    Spare Allocation and Reconfiguration in Large Area VLSI. [Citation Graph (0, 0)][DBLP]
    DAC, 1988, pp:609-612 [Conf]
  15. Min-An Song, Ting-Chun Huang, Sy-Yen Kuo
    A Functional Verification Environment for Advanced Switching Architecture. [Citation Graph (0, 0)][DBLP]
    DELTA, 2006, pp:201-204 [Conf]
  16. Ping-Hsun Hsieh, Ing-Yi Chen, Yu-Ting Lin, Sy-Yen Kuo
    An XOR Based Reed-Solomon Algorithm for Advanced RAID Systems. [Citation Graph (0, 0)][DBLP]
    DFT, 2004, pp:165-172 [Conf]
  17. Hung-Yau Lin, Fu-Min Yeh, Ing-Yi Chen, Sy-Yen Kuo
    An Efficient Perfect Algorithm for Memory Repair Problems. [Citation Graph (0, 0)][DBLP]
    DFT, 2004, pp:306-313 [Conf]
  18. Brian Peng, Ing-Yi Chen, Sy-Yen Kuo, Colin Bolger
    IC HTOL Test Stress Condition Optimization. [Citation Graph (0, 0)][DBLP]
    DFT, 2004, pp:272-279 [Conf]
  19. Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo
    Efficient Exact Spare Allocation via Boolean Satisfiability. [Citation Graph (0, 0)][DBLP]
    DFT, 2005, pp:361-370 [Conf]
  20. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
    Verifying Web Applications Using Bounded Model Checking. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:199-208 [Conf]
  21. Chi-Yi Lin, Sy-Yen Kuo, Yennun Huang
    A Checkpointing Tool for Palm Operating System. [Citation Graph (0, 0)][DBLP]
    DSN, 2001, pp:71-76 [Conf]
  22. Szu-Chi Wang, Sy-Yen Kuo
    Communication Strategies for Heartbeat-Style Failure Detectors in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:361-0 [Conf]
  23. Jenn-Wei Lin, Sy-Yen Kuo
    A Highly Available Partition-Processing Protocol for Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP]
    Euro-Par, Vol. I, 1996, pp:514-521 [Conf]
  24. Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo
    An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks (Research Note). [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2002, pp:978-982 [Conf]
  25. Kai-Hui Chang, Jeh-Yen Kang, Han-Wei Wang, Wei-Ting Tu, Yi-Jong Yeh, Sy-Yen Kuo
    Automatic Partitioner for Behavior Level Distributed Logic Simulation. [Citation Graph (0, 0)][DBLP]
    FORTE, 2005, pp:525-528 [Conf]
  26. Hung-Yi Liu, Chung-Wei Lin, Szu-Jui Chou, Wei-Ting Tu, Chih-Hung Liu, Yao-Wen Chang, Sy-Yen Kuo
    Current path analysis for electrostatic discharge protection. [Citation Graph (0, 0)][DBLP]
    ICCAD, 2006, pp:510-515 [Conf]
  27. Hung-Yau Lin, Hong-Zu Chou, Fu-Min Yeh, Ing-Yi Chen, Sy-Yen Kuo
    An Efficient Algorithm for Reconfiguring Shared Spare RRAM. [Citation Graph (0, 0)][DBLP]
    ICCD, 2004, pp:544-546 [Conf]
  28. Chi-Yi Lin, Jichiang Tsai, Sy-Yen Kuo, Yennun Huang
    Communication-Induced Checkpointing Protocols with K-Bounded Domino-Effect Freedom. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Distributed Real-Time Systems, 2000, pp:0-0 [Conf]
  29. Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo
    Multiple Failures Restoration by Group Protection in WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:186-193 [Conf]
  30. Chuan-Ching Sue, Sy-Yen Kuo
    Restoration from Multiple Faults in WDM Networks without Wavelength Conversion. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:317-325 [Conf]
  31. Chi-Yuan Chang, Sy-Yen Kuo
    Multicasting Optical Crossconnects with Fault Tolerance Mechanism and Wavelength Routing in All-Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN (1), 2002, pp:313-326 [Conf]
  32. Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo
    An Efficient Restoration Scheme Using Protection Domain for Dynamic Traffic Demands in WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2003, pp:128-140 [Conf]
  33. Chen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo
    Improvments for Dynamic Sub-mesh Restoration Scheme in Dense WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:400-409 [Conf]
  34. Chuan-Ching Sue, Sy-Yen Kuo
    Dependable Wavelength Routing with Spare Rerouting in All-Optical WDM Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:445-452 [Conf]
  35. Wen-Yu Tseng, Sy-Yen Kuo
    All-Optical Multicasting on Wavelength-Routed WDM Networks with Partial Replica. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:813-818 [Conf]
  36. Ching-Yu Lin, Jung-Hua Lo, Sy-Yen Kuo
    Load-Balanced Anycast Routing. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2004, pp:701-708 [Conf]
  37. Min-An Song, I-Feng Lan, Sy-Yen Kuo
    An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:620-626 [Conf]
  38. Chuan-Ching Sue, Sy-Yen Kuo
    Synchronous Flow Control in Wormhole Routed Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:710-717 [Conf]
  39. Szu-Chi Wang, Sy-Yen Kuo
    Fault Tolerance in Hyperbus and Hypercube Multiprocessors Using Partitioning Scheme. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1994, pp:340-347 [Conf]
  40. Sy-Yen Kuo, Sheng-Chiech Liang
    Efficient Parallel Sorting and Merging Algorithms for Two-Dimensional Mesh-Connected Processor Arrays. [Citation Graph (0, 0)][DBLP]
    ICPP (3), 1991, pp:66-69 [Conf]
  41. Sy-Yen Kuo, Ahmed Louri, Sheng-Chiech Liang
    Design and Evaluation of Fault-Tolerant Interleaved Memory Systems. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1991, pp:188-195 [Conf]
  42. Jeng-Ping Lin, Shih-Chang Wang, Sy-Yen Kuo
    Error Recovery in Parallel Systems of Pipelined Processors with Caches. [Citation Graph (0, 0)][DBLP]
    ICPP (1), 1994, pp:271-274 [Conf]
  43. Chi-Yuan Chang, Sy-Yen Kuo
    A Two-level TDM Access Protocol for IP Support in WDM Optical Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:317-324 [Conf]
  44. Ching-Yu Lin, Sy-Yen Kuo, David S. L. Wei
    Reliable Multicast based on k-Connected Graph. [Citation Graph (0, 0)][DBLP]
    IMSA, 2002, pp:409-414 [Conf]
  45. Jenn-Shiang Lai, Sy-Yen Kuo, Ing-Yi Chen
    Neural Networks for Optimization Problems in Graph Theory. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:269-272 [Conf]
  46. Min-An Song, Lan-Da Van, Chih-Chyau Yang, Shih-Chieh Chiu, Sy-Yen Kuo
    A framework for the design of error-aware power-efficient fixed-width Booth multipliers. [Citation Graph (0, 0)][DBLP]
    ISCAS (1), 2005, pp:81-84 [Conf]
  47. Yi-Jong Yeh, Sy-Yen Kuo
    An optimization-based low-power voltage scaling technique using multiple supply voltages. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:535-538 [Conf]
  48. Hung-Yau Lin, Sy-Yen Kuo, Fu-Min Yeh
    Minimal Cutset Enumeration and Network Reliability Evaluation by Recursive Merge and BDD. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1341-1346 [Conf]
  49. Chuan-Ching Sue, Wen-Yu Tseng, Sy-Yen Kuo, Yennun Huang
    An Accelerative Pre-Allocation Protocol for Wavelength Division Multiplexing Star-Coupled Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:209-215 [Conf]
  50. Wen-Yu Tseng, Chuan-Ching Sue, Sy-Yen Kuo
    Performance Analysis for Unicast and Multicast Traffic in Broadcast-and-Select WDM Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 1999, pp:72-78 [Conf]
  51. Hong-Wei Huang, Hsin-Hsin Ho, Ke-Horng Chen, Sy-Yen Kuo
    Dithering skip modulator with a novel load sensor for ultra-wide-load high-efficiency DC-DC converters. [Citation Graph (0, 0)][DBLP]
    ISLPED, 2006, pp:388-393 [Conf]
  52. Chuan-Ching Sue, Yung-Chiao Chen, Min-Shao Shieh, Sy-Yen Kuo
    Dependable WDM Networks with Edge-Disjoint P-Cycles. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:804-814 [Conf]
  53. Wen-Yu Tseng, Chin-Chou Chen, David S. L. Wei, Sy-Yen Kuo
    Design and Implementation of a High Speed Parallel Architecture for ATM UNI. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:288-294 [Conf]
  54. Chin-Yu Huang, Sy-Yen Kuo, Jung-Hua Lo, Michael R. Lyu
    Quantitative Software Reliability Modeling from Testing to Operation. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2000, pp:72-83 [Conf]
  55. Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu
    Optimal Allocation of Testing Resources for Modular Software Systems. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2002, pp:129-138 [Conf]
  56. Yao-Wen Huang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
    Non-Detrimental Web Application Security Scanning. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2004, pp:219-230 [Conf]
  57. Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo
    Dependabilities in a High-performance Quantum Real-time Distributed System. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:1107-1112 [Conf]
  58. Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
    Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:33-46 [Conf]
  59. Jenn-Shiang Lai, Young-Ja Ko, Sy-Yen Kuo
    Artificial Neural Networks for the Bipartite and K-partite Subgraph Problems. [Citation Graph (0, 0)][DBLP]
    PARLE, 1993, pp:426-437 [Conf]
  60. David S. L. Wei, Sanguthevar Rajasekaran, Sy-Yen Kuo
    Efficient Selection and Sorting Schemes for Processing Large Distributed Files in Finite Projectives Plane. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1996, pp:69-78 [Conf]
  61. Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo, Ing-Yi Chen
    A Low Overhead heckpointing Protocol for Mobile Computing Systems. [Citation Graph (0, 0)][DBLP]
    PRDC, 2002, pp:37-44 [Conf]
  62. Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo
    Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDD. [Citation Graph (0, 0)][DBLP]
    PRDC, 2002, pp:193-200 [Conf]
  63. Yung-Ruei Chang, Hung-Yau Lin, Sy-Yen Kuo
    Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDD. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:197-206 [Conf]
  64. Ching-Hua Chuan, Sy-Yen Kuo
    Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PRDC, 2001, pp:199-205 [Conf]
  65. Chih-Hsien Hsu, Shyue-Kung Lu, Sy-Yen Kuo
    Novel Fault-Tolerant Techniques for High Capacity RAMs. [Citation Graph (0, 0)][DBLP]
    PRDC, 2001, pp:11-18 [Conf]
  66. Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu
    Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-Effort. [Citation Graph (0, 0)][DBLP]
    PRDC, 2004, pp:103-112 [Conf]
  67. Wei-Cheng Su, Szu-Chi Wang, Sy-Yen Kuo
    Failure Detection Mechanism for Distributed Object Computing Using CORBA. [Citation Graph (0, 0)][DBLP]
    PRDC, 2001, pp:273-280 [Conf]
  68. Fu-Min Yeh, Hung-Yau Lin, Sy-Yen Kuo
    Analyzing Network Reliability With Imperfect Nodes Using OBDD. [Citation Graph (0, 0)][DBLP]
    PRDC, 2002, pp:89-96 [Conf]
  69. Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo
    A Stateful Approach to Spyware Detection and Removal. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:173-182 [Conf]
  70. Yung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo
    The Survivability of the Augmented Logical Ring Topology in WDM Networks. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:397-398 [Conf]
  71. Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen Kuo, Ing-Yi Chen
    Quantum Oblivious Transfer and Fair Digital Transactions. [Citation Graph (0, 0)][DBLP]
    PRDC, 2006, pp:121-128 [Conf]
  72. Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai
    An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:133-139 [Conf]
  73. Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo
    A Multi-Faceted Approach towards Spam-Resistible Mail. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:208-218 [Conf]
  74. I-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo
    A Secure Quantum Communication Protocol Using Insecure Public Channels. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:113-126 [Conf]
  75. Wen-Yan Kuo, Sy-Yen Kuo
    Parallel Garbage Collection and Graph Reducer. [Citation Graph (0, 0)][DBLP]
    SPDP, 1993, pp:100-105 [Conf]
  76. Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo
    Securing web application code by static analysis and runtime protection. [Citation Graph (0, 0)][DBLP]
    WWW, 2004, pp:40-52 [Conf]
  77. Szu-Chi Wang, Chi-Yi Lin, Sy-Yen Kuo
    A Localized Topology Control Algorithm for Constructing Power Efficient Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WWW (Posters), 2003, pp:- [Conf]
  78. Szu-Chi Wang, David S. L. Wei, Sy-Yen Kuo
    SPT-based topology algorithm for constructing power efficient wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    WWW (Alternate Track Papers & Posters), 2004, pp:234-235 [Conf]
  79. Ming-Wei Wu, Yennun Huang, Ing-Yi Chen, Shyue-Kung Lu, Sy-Yen Kuo
    A Scalable Port Forwarding for P2P-Based Wi-Fi Applications. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:26-37 [Conf]
  80. Wally Chen, Sy-Yen Kuo, Han-Chieh Chao
    Enhanced UPnP Control and Management in a Campus Network. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:331-335 [Conf]
  81. Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, D. T. Lee, Sy-Yen Kuo
    A testing framework for Web application security assessment. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:739-761 [Journal]
  82. Ching-Yu Lin, Ing-Yi Chen, Sy-Yen Kuo
    Extension headers for IPv6 anycast. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3013-3019 [Journal]
  83. Szu-Chi Wang, David S. L. Wei, Sy-Yen Kuo
    An SPT-based topology control algorithm for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3092-3103 [Journal]
  84. Jiann-Liang Chen, Han-Chieh Chao, Sy-Yen Kuo
    IPv6: More than protocol for next generation Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3011-3012 [Journal]
  85. David S. L. Wei, Sanguthevar Rajasekaran, Kshirasagar Naik, Sy-Yen Kuo
    Efficient Algorithms For Selection And Sorting Of Large Distributed Files On De Bruijn And Hypercube Structures. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2003, v:14, n:6, pp:1129-1146 [Journal]
  86. Jiann-Liang Chen, Wen-Hao Chen, Sy-Yen Kuo
    All-IPv6 service interworking gateway. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2005, v:15, n:2, pp:135-147 [Journal]
  87. Jenn-Wei Lin, Sy-Yen Kuo
    Resolving error propagation in distributed systems. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:74, n:5-6, pp:257-262 [Journal]
  88. Jichiang Tsai, Yi-Min Wang, Sy-Yen Kuo
    Evaluations of Domino-Free Communication-Induced Checkpointing Protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:69, n:1, pp:31-37 [Journal]
  89. Rong-Huei Hou, Tzung-Pei Hong, Shian-Shyong Tseng, Sy-Yen Kuo
    A New Probabilistic Induction Method. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1997, v:18, n:1, pp:5-24 [Journal]
  90. Yi-Jong Yeh, Sy-Yen Kuo
    An Optimization-Based Multiple-Voltage Scaling Technique for Low-Power CMOS Digital Design. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 2002, v:11, n:4, pp:365-376 [Journal]
  91. Jenn-Wei Lin, Sy-Yen Kuo
    A New Log-Based Approach to Independent Recovery in Distributed Shraed Memory Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2000, v:16, n:2, pp:271-290 [Journal]
  92. Jenn-Wei Lin, Sy-Yen Kuo
    An Optimistic-Based Partition-Processing Approach for Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:6, pp:853-869 [Journal]
  93. Shih-Chang Wang, Yuh-Rong Leu, Sy-Yen Kuo
    Distributed Fault-Tolerant Embedding of Several Topologies in Hypercubes. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:4, pp:707-732 [Journal]
  94. Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
    More Properties of Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:2, pp:239-257 [Journal]
  95. Jichiang Tsai, Chi-Yi Lin, Sy-Yen Kuo
    Adaptive Communication-Induced Checkpointing Protocols with Domino-Effect Freedom. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:5, pp:885-901 [Journal]
  96. Chi-Yuan Chang, Sy-Yen Kuo
    Analysis and Design of a backbone Architecture with TDMA Mechanism for IP Optical Networking. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:3, pp:- [Journal]
  97. Sy-Yen Kuo, W. Kent Fuchs
    Reconfigurable Cube-Connected Cycles Architectures. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 1990, v:9, n:1, pp:1-10 [Journal]
  98. David S. L. Wei, Sanguthevar Rajasekaran, Zixue Cheng, Kshirasagar Naik, Sy-Yen Kuo
    Efficient Selection and Sorting Schemes Using Coteries for Processing Large Distributed Files. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2002, v:62, n:8, pp:1295-1313 [Journal]
  99. Jung-Hua Lo, Chin-Yu Huang, Ing-Yi Chen, Sy-Yen Kuo, Michael R. Lyu
    Reliability assessment and sensitivity analysis of software reliability growth modeling based on software module structure. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:1, pp:3-13 [Journal]
  100. Sy-Yen Kuo, Han-Chieh Chao
    Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:6, pp:623- [Journal]
  101. Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo
    An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Mobile IP. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:6, pp:687-697 [Journal]
  102. Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo
    Computing System Failure Frequencies and Reliability Importance Measures Using OBDD. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:1, pp:54-68 [Journal]
  103. Rong-Huei Hou, Sy-Yen Kuo, Yi-Ping Chang
    Optimal Release Times for Software Systems with Scheduled Delivery Time Based on the HGDM. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:2, pp:216-221 [Journal]
  104. Sy-Yen Kuo, W. Kent Fuchs
    Fault Diagnosis and Spare Allocation for Yield Enhancement in Large Reconfigurable PLA's. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:2, pp:221-226 [Journal]
  105. Sy-Yen Kuo, Sheng-Chiech Liang
    Concurrent Error Detection and Correction in Real-Time Systolic Sorting Arrays. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:12, pp:1615-1620 [Journal]
  106. Yuh-Rong Leu, Sy-Yen Kuo
    A Fault-Tolerant Tree Communication Scheme for Hypercube Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:6, pp:641-650 [Journal]
  107. Yuh-Rong Leu, Sy-Yen Kuo
    Distributed Fault-Tolerant Ring Embedding and Reconfiguration in Hypercubes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:1, pp:81-88 [Journal]
  108. Shyue-Kung Lu, Sy-Yen Kuo, Cheng-Wen Wu
    Fault-Tolerant Interleaved Memory Systems with Two-Level Redundancy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:9, pp:1028-1034 [Journal]
  109. Shih-Yi Yuan, Sy-Yen Kuo
    A New Technique for Optimization Problems in Graph Theory. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:2, pp:190-196 [Journal]
  110. Li-Ren Huang, Jing-Yang Jou, Sy-Yen Kuo
    Gauss-elimination-based generation of multiple seed-polynomial pairs for LFSR. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1997, v:16, n:9, pp:1015-1024 [Journal]
  111. Sy-Yen Kuo
    YOR: a yield-optimizing routing algorithm by minimizing critical areas and vias. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1993, v:12, n:9, pp:1303-1311 [Journal]
  112. Sy-Yen Kuo, Ing-Yi Chen
    Efficient reconfiguration algorithms for degradable VLSI/WSI arrays. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1992, v:11, n:10, pp:1289-1300 [Journal]
  113. Kuochen Wang, Sy-Yen Kuo
    Computer-aided modeling and evaluation of reconfigurable VLSI processor arrays with VHDL. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1992, v:11, n:2, pp:185-197 [Journal]
  114. Yi-Jong Yeh, Sy-Yen Kuo, Jing-Yang Jou
    Converter-free multiple-voltage scaling techniques for low-powerCMOS digital design. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 2001, v:20, n:1, pp:172-176 [Journal]
  115. Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo
    OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:4, pp:336-347 [Journal]
  116. Jichiang Tsai, Sy-Yen Kuo, Yi-Min Wang
    Theoretical Analysis for Communication-Induced Checkpointing Protocols with Rollback-Dependency Trackability. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:10, pp:963-971 [Journal]
  117. Chin-Yu Huang, Michael R. Lyu, Sy-Yen Kuo
    A Unified Scheme of Some Nonhomogenous Poisson Process Models for Software Reliability Estimation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2003, v:29, n:3, pp:261-269 [Journal]
  118. Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo
    Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:18- [Conf]

  119. iCon: utilizing everyday objects as additional, auxiliary and instant tabletop controllers. [Citation Graph (, )][DBLP]


  120. An O(n log n) path-based obstacle-avoiding algorithm for rectilinear Steiner tree construction. [Citation Graph (, )][DBLP]


  121. Handling don't-care conditions in high-level synthesis and application for reducing initialized registers. [Citation Graph (, )][DBLP]


  122. Finding reset nondeterminism in RTL designs - scalable X-analysis methodology and case study. [Citation Graph (, )][DBLP]


  123. Xprobe2++: Low volume remote network information gathering tool. [Citation Graph (, )][DBLP]


  124. Enhancing bug hunting using high-level symbolic simulation. [Citation Graph (, )][DBLP]


  125. Obstacle-avoiding rectilinear Steiner tree construction based on Steiner point selection. [Citation Graph (, )][DBLP]


  126. Efficient multilayer routing based on obstacle-avoiding preferred direction steiner tree. [Citation Graph (, )][DBLP]


  127. Optimization of Spatial Error Concealment for H.264 Featuring Low Complexity. [Citation Graph (, )][DBLP]


  128. Temporal Error Concealment for H.264 Using Optimum Regression Plane. [Citation Graph (, )][DBLP]


  129. A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. [Citation Graph (, )][DBLP]


  130. A DoS-resilient en-route filtering scheme for sensor networks. [Citation Graph (, )][DBLP]


  131. Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. [Citation Graph (, )][DBLP]


  132. MAPMon: A Host-Based Malware Detection Tool. [Citation Graph (, )][DBLP]


  133. A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  134. A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes. [Citation Graph (, )][DBLP]


  135. Towards Adaptive Covert Communication System. [Citation Graph (, )][DBLP]


  136. Holography: A Hardware Virtualization Tool for Malware Analysis. [Citation Graph (, )][DBLP]


  137. Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. [Citation Graph (, )][DBLP]


  138. MemoIcon: using everyday objects as physical icons. [Citation Graph (, )][DBLP]


  139. QBIST: Quantum Built-in Self-Test for any Boolean Circuit. [Citation Graph (, )][DBLP]


  140. Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  141. Ubiquitous IMS emergency services over cooperative heterogeneous networks. [Citation Graph (, )][DBLP]


  142. Dynamic survivable RWA strategy on IP over WDM networks. [Citation Graph (, )][DBLP]


  143. Quantum Entanglement, Non-Locality and Secure Computation. [Citation Graph (, )][DBLP]


  144. Mobile Sensor Network Resilient Against Node Replication Attacks. [Citation Graph (, )][DBLP]


  145. Implementation of OpenWrt-based IP PnP gateway. [Citation Graph (, )][DBLP]


  146. A constrained function based message authentication scheme for sensor networks. [Citation Graph (, )][DBLP]


  147. Increasing Service Availability in a Wireless Home Network Environment. [Citation Graph (, )][DBLP]


  148. Secure Multidimensional Queries in Tiered Sensor Networks [Citation Graph (, )][DBLP]


  149. Constrained Function Based En-Route Filtering for Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.027secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002