The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jau-Ji Shen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jau-Ji Shen, Ming-Tsung Chen
    A Recycle Technique of Association Rule for Missing Value Completion. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:526-529 [Conf]
  2. Jau-Ji Shen, Tzung-Liang Hung
    Minimizing Transmission Cost for Distributed Database Design Based on Ontology Schema. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:638-643 [Conf]
  3. Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen
    A Compact Patricia Trie for a Large Set of Keys. [Citation Graph (0, 0)][DBLP]
    ISDB, 2002, pp:31-36 [Conf]
  4. Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
    Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:442-448 [Conf]
  5. Jau-Ji Shen, Po-Wei Hsu
    Watermarking with Association Rules Alignment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1159-1167 [Conf]
  6. Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
    A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:197-200 [Conf]
  7. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:453-456 [Conf]
  8. Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
    A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:545-548 [Conf]
  9. Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang
    Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal]
  10. Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen
    A data mining approach to database compression. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2006, v:8, n:3, pp:147-161 [Journal]
  11. Jau-Ji Shen, S. Wesley Changchien, Tao-Yuan Lin
    A Petri-Net Based Modeling Apporach to Concurrent Software Engineering Tasks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:4, pp:767-795 [Journal]
  12. Jau-Ji Shen, Po-Wei Hsu
    A robust associative watermarking technique based on similarity diagrams. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2007, v:40, n:4, pp:1355-1367 [Journal]
  13. Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
    Security enhancement for Optimal Strong-Password Authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:2, pp:7-12 [Journal]
  14. Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
    Security enhancement for optimal strong-password authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:3, pp:12-16 [Journal]

  15. Complete Double Layered Embedding Scheme for Information Hiding. [Citation Graph (, )][DBLP]


  16. FA-Tree - A Dynamic Indexing Structure for Spatial Data. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002