The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David C. Yen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shi-Ming Huang, Irene S. Y. Kwan, David C. Yen, Shang-Yuen Hsueh
    Developing an XML Gateway for Business-to-Business Commerce. [Citation Graph (0, 0)][DBLP]
    WISE (2), 2000, pp:67-74 [Conf]
  2. Dong-Her Shih, Po-Ling Sun, David C. Yen, Shi-Ming Huang
    Taxonomy and survey of RFID anti-collision protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:11, pp:2150-2166 [Journal]
  3. Shi-Ming Huang, Yu-Chung Hung, David C. Yen
    A study on decision factors in adopting an online stock trading system by brokers in Taiwan. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2005, v:40, n:2, pp:315-328 [Journal]
  4. Hsin-Ginn Hwang, Cheng-Yuan Ku, David C. Yen, Chi-Chung Cheng
    Critical factors influencing the adoption of data warehouse technology: a study of the banking industry in Taiwan. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2004, v:37, n:1, pp:1-21 [Journal]
  5. I-Chiu Chang, Hsin-Ginn Hwang, David C. Yen, J. W. Lian
    Critical factors for adopting PACS in Taiwan: Views of radiology department directors. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2006, v:42, n:2, pp:1042-1053 [Journal]
  6. Shin-Yuan Hung, David C. Yen, Hsiu-Yu Wang
    Applying data mining to telecom churn management. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2006, v:31, n:3, pp:515-524 [Journal]
  7. Huan-Ming Sheng, Jih-Chang Wang, Hsieh-Hong Huang, David C. Yen
    Fuzzy measure on vehicle routing problem of hospital materials. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2006, v:30, n:2, pp:367-377 [Journal]
  8. Mary A. Clark, David C. Chou, David C. Yen
    Domain names management: a strategy for electronic commerce security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:5, pp:225-232 [Journal]
  9. Austin Jay Harris, David C. Yen
    Biometric authentication: assuring access to information. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:1, pp:12-19 [Journal]
  10. Steve Hawkins, David C. Yen, David C. Chou
    Awareness and challenges of Internet security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:3, pp:131-143 [Journal]
  11. Steve M. Hawkins, David C. Yen, David C. Chou
    Disaster recovery planning: a strategy for data security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2000, v:8, n:5, pp:222-230 [Journal]
  12. John A. Rodgers, David C. Yen, David C. Chou
    Developing e-business; a strategic approach. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:4, pp:184-192 [Journal]
  13. David C. Yen, David C. Chou
    Intranets for organizational innovation. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:2, pp:80-87 [Journal]
  14. Yun E. Zeng, Roger H. L. Chiang, David C. Yen
    Enterprise integration with advanced information technologies: ERP and data warehousing. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:3, pp:115-122 [Journal]
  15. Yun E. Zeng, H. Joseph Wen, David C. Yen
    Customer relationship management (CRM) in business-to-business (B2B) e-commerce. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:39-44 [Journal]
  16. Jyh-Horng Michael Tarn, David C. Yen, Marcus Beaumont
    Exploring the rationales for ERP and SCM integration. [Citation Graph (0, 0)][DBLP]
    Industrial Management and Data Systems, 2002, v:102, n:1, pp:26-34 [Journal]
  17. Yurong Xu, David C. Yen, Binshan Lin, David C. Chou
    Adopting customer relationship management technology. [Citation Graph (0, 0)][DBLP]
    Industrial Management and Data Systems, 2002, v:102, n:8, pp:442-452 [Journal]
  18. David C. Yen, Sooun Lee, Seok Ha Koh
    Critical knowledge/skill sets required by industries: an empirical analysis. [Citation Graph (0, 0)][DBLP]
    Industrial Management and Data Systems, 2001, v:101, n:8, pp:432-442 [Journal]
  19. Chien-Yuan Chen, Cheng-Yuan Ku, David C. Yen
    Cryptanalysis of short secret exponents modulo RSA primes. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2004, v:160, n:1-4, pp:225-233 [Journal]
  20. Dong-Her Shih, Hsiu-Sen Chiang, David C. Yen
    Classification methods in the detection of new malicious emails. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2005, v:172, n:1-2, pp:241-261 [Journal]
  21. Dong-Her Shih, Hsin-Yi Huang, David C. Yen
    A secure reverse Vickrey auction scheme with bid privacy. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:5, pp:550-564 [Journal]
  22. Anthony Lococo, David C. Yen
    Groupware: computer supported collaboration. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 1998, v:15, n:1-2, pp:85-101 [Journal]
  23. I-Chiu Chang, Hsin-Ginn Hwang, David C. Yen, Hen-Yi Huang
    An empirical study of the factors affecting Internet security for the financial industry in Taiwan. [Citation Graph (0, 0)][DBLP]
    Telematics and Informatics, 2006, v:23, n:4, pp:343-364 [Journal]
  24. I-Chiu Chang, Hsin-Ginn Hwang, Ming-Chien Hung, Ming-Hui Lin, David C. Yen
    Factors affecting the adoption of electronic signature: Executives' perspective of hospital information department. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:44, n:1, pp:350-359 [Journal]
  25. Shi-Ming Huang, Shin-Yuan Hung, David C. Yen, Shing-Han Li, Chun-Ju Wu
    Enterprise Application System Reengineering: A Business Component Approach. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2006, v:17, n:3, pp:66-91 [Journal]
  26. Shi-Ming Huang, David C. Yen, Hsiang-Yuan Hsueh
    A Space-Efficient Protocol for Consistency of External View Maintenance on Data Warehouse Systems: A Proxy Approach. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2007, v:18, n:3, pp:21-47 [Journal]
  27. Shing-Han Li, Shi-Ming Huang, David C. Yen, Cheng-Chun Chang
    Migrating Legacy Information Systems to Web Services Architecture. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2007, v:18, n:4, pp:1-25 [Journal]

  28. An exploratory study of the selection of communication media: The relationship between flow and communication outcomes. [Citation Graph (, )][DBLP]


  29. An investigation of Zipf's Law for fraud detection (DSS#06-10-1826R(2)). [Citation Graph (, )][DBLP]


  30. A business process gap detecting mechanism between information system process flow and internal control flow. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002