The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yen-Ping Chu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lun-Chi Chen, Ruey-Kai Sheu, Hui-Chieh Lu, Win-Tsung Lo, Yen-Ping Chu
    Object Finding System Based on RFID Technology. [Citation Graph (0, 0)][DBLP]
    APWeb Workshops, 2006, pp:383-396 [Conf]
  2. Hui-Chieh Lu, Yen-Ping Chu, Ruey-Kai Sheu, Win-Tsung Lo
    A Generic Application Sharing Architecture Based on Message-Oriented Middleware Platform. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:33-37 [Conf]
  3. Yung-Kuan Chan, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu
    Robust Image Hiding Method. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  4. Wen-Ling Chan, Yen-Ping Chu, Yung-fu Chen, Chwei-Shyong Tsai, Jan-Gowth Chang
    Identification of Mouse mslp2 from EST Databases by Repeated Searching, Comparison, and Assembling. [Citation Graph (0, 0)][DBLP]
    METMBS, 2004, pp:271-275 [Conf]
  5. Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Yen-Ping Chu
    A new multi-secret images sharing scheme using Largrange's interpolation. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:76, n:3, pp:327-339 [Journal]
  6. Yung-fu Chen, Yung-Kuan Chan, Ching-Chun Huang, Meng-Hsiun Tsai, Yen-Ping Chu
    A multiple-level visual secret-sharing scheme without image size expansion. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:21, pp:4696-4710 [Journal]

  7. Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process. [Citation Graph (, )][DBLP]


  8. An Exchangeable E-Cash Scheme by E-Mint. [Citation Graph (, )][DBLP]


  9. Gradient Direction Edge Enhancement Based Nucleus and Cytoplasm Contour Detector of Cervical Smear Images. [Citation Graph (, )][DBLP]


  10. Halftone image resampling by interpolation and error-diffusion. [Citation Graph (, )][DBLP]


  11. Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion. [Citation Graph (, )][DBLP]


  12. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. [Citation Graph (, )][DBLP]


  13. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. [Citation Graph (, )][DBLP]


Search in 0.187secs, Finished in 0.188secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002