The SCEAS System
Navigation Menu

Search the dblp DataBase


Chien-Ming Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
    Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:457-462 [Conf]
  2. Chien-Ming Chen, Chung-Ta King
    Designing Dynamic Two-Level Branch Predictors Based on Pattern Locality. [Citation Graph (0, 0)][DBLP]
    Euro-Par, Vol. II, 1996, pp:757-764 [Conf]
  3. Chien-Ming Chen, Dwen-Ren Tsai, Pi-Ju Tsai
    A CMMI-based self evaluation of capability maturity level for software organizations. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:372-377 [Conf]
  4. Chien-Ming Chen, Ming-Wei Su, Hanna S. Yuan, Woei C. Chu
    The Design of a Dengue Virus Relational Database to Facilitate Its Bioinformatics Applications. [Citation Graph (0, 0)][DBLP]
    ISWS, 2005, pp:180-0 [Conf]
  5. Chien-Ming Chen, Yunn Yen Chen, Chung-Ta King
    Branch merging for effective exploitation of instruction-level parallelism. [Citation Graph (0, 0)][DBLP]
    MICRO, 1992, pp:37-40 [Conf]
  6. Tzu-Yu Liu, Jerome Yeh, Chien-Ming Chen, Yen-Tseng Hsu
    A GreyART system for grey information processing. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2004, v:56, n:, pp:407-414 [Journal]
  7. Pauray S. M. Tsai, Chien-Ming Chen
    Discovering Knowledge From Large Databases Using Prestored Information. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2001, v:26, n:1, pp:1-14 [Journal]
  8. Pauray S. M. Tsai, Chien-Ming Chen
    Mining interesting association rules from customer databases and transaction databases. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2004, v:29, n:8, pp:685-696 [Journal]
  9. Pauray S. M. Tsai, Chien-Ming Chen
    Mining Quantitative Association Rules in a Large Database of Sales Transactions. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:4, pp:667-681 [Journal]
  10. Wei-Chi Ku, Chien-Ming Chen, Hui-Lung Lee
    Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2003, v:37, n:4, pp:19-25 [Journal]
  11. Chien-Ming Chen, Chung-Ta King
    Walk-Time Address Adjustment for Improving the Accuracy of Dynamic Branch Prediction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1999, v:48, n:5, pp:457-469 [Journal]

  12. Identification of Conserved Simple Sequence Repeats from Orthologous Disease Genes. [Citation Graph (, )][DBLP]

  13. IRIS: Internal Repeat Identification System. [Citation Graph (, )][DBLP]

  14. A Study of Collaboration and Conflicts Using Multi-robots. [Citation Graph (, )][DBLP]

  15. Length Encoded Secondary Structure Profile for Remote Homologous Protein Detection. [Citation Graph (, )][DBLP]

  16. An Efficient and Scalable Key Management Protocol for Secure Group Communications in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  17. An SSR Comparative Genomics Database and Its Applications. [Citation Graph (, )][DBLP]

Search in 0.015secs, Finished in 0.016secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002