|
Search the dblp DataBase
Jau-Ji Shen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jau-Ji Shen, Ming-Tsung Chen
A Recycle Technique of Association Rule for Missing Value Completion. [Citation Graph (0, 0)][DBLP] AINA, 2003, pp:526-529 [Conf]
- Jau-Ji Shen, Tzung-Liang Hung
Minimizing Transmission Cost for Distributed Database Design Based on Ontology Schema. [Citation Graph (0, 0)][DBLP] AINA, 2003, pp:638-643 [Conf]
- Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen
A Compact Patricia Trie for a Large Set of Keys. [Citation Graph (0, 0)][DBLP] ISDB, 2002, pp:31-36 [Conf]
- Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
Improving Image Quality for JPEG Compression. [Citation Graph (0, 0)][DBLP] KES (3), 2005, pp:442-448 [Conf]
- Jau-Ji Shen, Po-Wei Hsu
Watermarking with Association Rules Alignment. [Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:1159-1167 [Conf]
- Chin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen
A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. [Citation Graph (0, 0)][DBLP] ICICIC (1), 2006, pp:197-200 [Conf]
- Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:453-456 [Conf]
- Chin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen
A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:545-548 [Conf]
- Jau-Ji Shen, Chih-Wei Lin, Min-Shiang Hwang
Security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:7, pp:591-595 [Journal]
- Chin-Feng Lee, S. Wesley Changchien, Wei-Tse Wang, Jau-Ji Shen
A data mining approach to database compression. [Citation Graph (0, 0)][DBLP] Information Systems Frontiers, 2006, v:8, n:3, pp:147-161 [Journal]
- Jau-Ji Shen, S. Wesley Changchien, Tao-Yuan Lin
A Petri-Net Based Modeling Apporach to Concurrent Software Engineering Tasks. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2005, v:21, n:4, pp:767-795 [Journal]
- Jau-Ji Shen, Po-Wei Hsu
A robust associative watermarking technique based on similarity diagrams. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2007, v:40, n:4, pp:1355-1367 [Journal]
- Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
Security enhancement for Optimal Strong-Password Authentication protocol. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:2, pp:7-12 [Journal]
- Chih-Wei Lin, Jau-Ji Shen, Min-Shiang Hwang
Security enhancement for optimal strong-password authentication protocol. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2003, v:37, n:3, pp:12-16 [Journal]
Complete Double Layered Embedding Scheme for Information Hiding. [Citation Graph (, )][DBLP]
FA-Tree - A Dynamic Indexing Structure for Spatial Data. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|