|
Search the dblp DataBase
David C. Yen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shi-Ming Huang, Irene S. Y. Kwan, David C. Yen, Shang-Yuen Hsueh
Developing an XML Gateway for Business-to-Business Commerce. [Citation Graph (0, 0)][DBLP] WISE (2), 2000, pp:67-74 [Conf]
- Dong-Her Shih, Po-Ling Sun, David C. Yen, Shi-Ming Huang
Taxonomy and survey of RFID anti-collision protocols. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:11, pp:2150-2166 [Journal]
- Shi-Ming Huang, Yu-Chung Hung, David C. Yen
A study on decision factors in adopting an online stock trading system by brokers in Taiwan. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2005, v:40, n:2, pp:315-328 [Journal]
- Hsin-Ginn Hwang, Cheng-Yuan Ku, David C. Yen, Chi-Chung Cheng
Critical factors influencing the adoption of data warehouse technology: a study of the banking industry in Taiwan. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2004, v:37, n:1, pp:1-21 [Journal]
- I-Chiu Chang, Hsin-Ginn Hwang, David C. Yen, J. W. Lian
Critical factors for adopting PACS in Taiwan: Views of radiology department directors. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2006, v:42, n:2, pp:1042-1053 [Journal]
- Shin-Yuan Hung, David C. Yen, Hsiu-Yu Wang
Applying data mining to telecom churn management. [Citation Graph (0, 0)][DBLP] Expert Syst. Appl., 2006, v:31, n:3, pp:515-524 [Journal]
- Huan-Ming Sheng, Jih-Chang Wang, Hsieh-Hong Huang, David C. Yen
Fuzzy measure on vehicle routing problem of hospital materials. [Citation Graph (0, 0)][DBLP] Expert Syst. Appl., 2006, v:30, n:2, pp:367-377 [Journal]
- Mary A. Clark, David C. Chou, David C. Yen
Domain names management: a strategy for electronic commerce security. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:225-232 [Journal]
- Austin Jay Harris, David C. Yen
Biometric authentication: assuring access to information. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2002, v:10, n:1, pp:12-19 [Journal]
- Steve Hawkins, David C. Yen, David C. Chou
Awareness and challenges of Internet security. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:131-143 [Journal]
- Steve M. Hawkins, David C. Yen, David C. Chou
Disaster recovery planning: a strategy for data security. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:222-230 [Journal]
- John A. Rodgers, David C. Yen, David C. Chou
Developing e-business; a strategic approach. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:184-192 [Journal]
- David C. Yen, David C. Chou
Intranets for organizational innovation. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:80-87 [Journal]
- Yun E. Zeng, Roger H. L. Chiang, David C. Yen
Enterprise integration with advanced information technologies: ERP and data warehousing. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:3, pp:115-122 [Journal]
- Yun E. Zeng, H. Joseph Wen, David C. Yen
Customer relationship management (CRM) in business-to-business (B2B) e-commerce. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:39-44 [Journal]
- Jyh-Horng Michael Tarn, David C. Yen, Marcus Beaumont
Exploring the rationales for ERP and SCM integration. [Citation Graph (0, 0)][DBLP] Industrial Management and Data Systems, 2002, v:102, n:1, pp:26-34 [Journal]
- Yurong Xu, David C. Yen, Binshan Lin, David C. Chou
Adopting customer relationship management technology. [Citation Graph (0, 0)][DBLP] Industrial Management and Data Systems, 2002, v:102, n:8, pp:442-452 [Journal]
- David C. Yen, Sooun Lee, Seok Ha Koh
Critical knowledge/skill sets required by industries: an empirical analysis. [Citation Graph (0, 0)][DBLP] Industrial Management and Data Systems, 2001, v:101, n:8, pp:432-442 [Journal]
- Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen
Cryptanalysis of short secret exponents modulo RSA primes. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2004, v:160, n:1-4, pp:225-233 [Journal]
- Dong-Her Shih, Hsiu-Sen Chiang, David C. Yen
Classification methods in the detection of new malicious emails. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2005, v:172, n:1-2, pp:241-261 [Journal]
- Dong-Her Shih, Hsin-Yi Huang, David C. Yen
A secure reverse Vickrey auction scheme with bid privacy. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2006, v:176, n:5, pp:550-564 [Journal]
- Anthony Lococo, David C. Yen
Groupware: computer supported collaboration. [Citation Graph (0, 0)][DBLP] Telematics and Informatics, 1998, v:15, n:1-2, pp:85-101 [Journal]
- I-Chiu Chang, Hsin-Ginn Hwang, David C. Yen, Hen-Yi Huang
An empirical study of the factors affecting Internet security for the financial industry in Taiwan. [Citation Graph (0, 0)][DBLP] Telematics and Informatics, 2006, v:23, n:4, pp:343-364 [Journal]
- I-Chiu Chang, Hsin-Ginn Hwang, Ming-Chien Hung, Ming-Hui Lin, David C. Yen
Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department. [Citation Graph (0, 0)][DBLP] Decision Support Systems, 2007, v:44, n:1, pp:350-359 [Journal]
- Shi-Ming Huang, Shin-Yuan Hung, David C. Yen, Shing-Han Li, Chun-Ju Wu
Enterprise Application System Reengineering: A Business Component Approach. [Citation Graph (0, 0)][DBLP] J. Database Manag., 2006, v:17, n:3, pp:66-91 [Journal]
- Shi-Ming Huang, David C. Yen, Hsiang-Yuan Hsueh
A Space-Efficient Protocol for Consistency of External View Maintenance on Data Warehouse Systems: A Proxy Approach. [Citation Graph (0, 0)][DBLP] J. Database Manag., 2007, v:18, n:3, pp:21-47 [Journal]
- Shing-Han Li, Shi-Ming Huang, David C. Yen, Cheng-Chun Chang
Migrating Legacy Information Systems to Web Services Architecture. [Citation Graph (0, 0)][DBLP] J. Database Manag., 2007, v:18, n:4, pp:1-25 [Journal]
An exploratory study of the selection of communication media: The relationship between flow and communication outcomes. [Citation Graph (, )][DBLP]
An investigation of Zipf's Law for fraud detection (DSS#06-10-1826R(2)). [Citation Graph (, )][DBLP]
A business process gap detecting mechanism between information system process flow and internal control flow. [Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.033secs
|