The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chi-Chun Lo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wen-Chuan Hsieh, Chi-Chun Lo, Jing-Chi Lee, Li-Tsung Huang
    The Implementation of a Proactive Wireless Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:581-586 [Conf]
  2. Chun-Lung Huang, Kuo-Ming Chao, Chi-Chun Lo
    A Moderated Fuzzy Matchmaking for Web Services. [Citation Graph (0, 0)][DBLP]
    CIT, 2005, pp:1116-1122 [Conf]
  3. Kuo-Ming Chao, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan
    Fuzzy Matchmaking for Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:721-726 [Conf]
  4. Wei-Li Lin, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas
    Fuzzy Consensus on QoS in Web Services Discovery. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:791-798 [Conf]
  5. Ping Wang, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu
    A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:889-893 [Conf]
  6. Muhammad Younas, Chi-Chun Lo, Yinsheng Li
    An Efficient Transaction Commit Protocol for Composite Web Services. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:591-596 [Conf]
  7. Ming-Hua Lin, Chi-Chun Lo, Wayne Zhuang
    A Flexible Time-based Pricing Policy for Charging Internet Services. [Citation Graph (0, 0)][DBLP]
    CAiSE Short Paper Proceedings, 2003, pp:- [Conf]
  8. Chi-Chun Lo, Ping Wang, Kuo-Ming Chao
    Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment. [Citation Graph (0, 0)][DBLP]
    CSCWD (Selected papers), 2005, pp:573-585 [Conf]
  9. Chi-Chun Lo, Shuenn-Jyi Wang
    Video Segmentation Using a Histogram-Based Fuzzy C-Means Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    FUZZ-IEEE, 2001, pp:920-923 [Conf]
  10. Chi-Chun Lo, Yu-Jen Chen
    Stream Ciphers for GSM Networks. [Citation Graph (0, 0)][DBLP]
    ICC (1), 2000, pp:80-84 [Conf]
  11. Chi-Chun Lo, Wen-Chuan Hsieh, Li-Tsung Huang
    The Implementation of an Intelligent Logistics Tracking System Utilizing RFID. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:199-204 [Conf]
  12. Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Yinsheng Li
    A Fuzzy Model for Selection of QoS-Aware Web Services. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:585-593 [Conf]
  13. Ming-Hua Lin, Chi-Chun Lo
    A Dynamic Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2004, pp:211-220 [Conf]
  14. Ming-Hua Lin, Chi-Chun Lo
    A Quality of Relay-Based Incentive Pricing Scheme for Relaying Services in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:796-805 [Conf]
  15. Chi-Chun Lo, Bin-Wen Chuang
    An adaptive survivability admission control mechanism using backup VPs for self-healing ATM networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:647-652 [Conf]
  16. Chi-Chun Lo, Chen-Yu Chiu
    A fault-tolerant architecture for ATM networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1995, pp:29-36 [Conf]
  17. Chi-Chun Lo
    Building and managing virtual private network; by D. Kosiur. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:12, pp:1173-0 [Journal]
  18. Chi-Chun Lo, Shing Hong Chen
    A scheduling-based event correlation scheme for fault identification in communications network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:5, pp:432-438 [Journal]
  19. Chi-Chun Lo, Chen-Yu Chiu
    A fault-tolerant architecture for ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:17, pp:1540-1548 [Journal]
  20. Chi-Chun Lo, Ming-Hua Lin
    Location-based incentive pricing for tree-based relaying in multi-hop cellular networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3148-3157 [Journal]
  21. Chi-Chun Lo, Ping Wang, Kuo-Ming Chao
    A fuzzy group-preferences analysis method for new-product development. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2006, v:31, n:4, pp:826-834 [Journal]
  22. Chi-Chun Lo, Bin-Wen Chuang
    An adaptive survivability admission control algorithm using backup path for high-speed networks. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2003, v:13, n:6, pp:399-410 [Journal]
  23. Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
    Coding-based schemes for fault identification in communication networks. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2000, v:10, n:3, pp:157-164 [Journal]
  24. Chun-Lung Huang, Chi-Chun Lo, Kuo-Ming Chao, Muhammad Younas
    Reaching consensus: A moderated fuzzy web services discovery method. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:6, pp:410-423 [Journal]
  25. Kuen-Liang Sue, Chi-Chun Lo
    Diminishing Capacity Requirement For Mobility Database In Wireless ATM. [Citation Graph (0, 0)][DBLP]
    Journal of Circuits, Systems, and Computers, 2004, v:13, n:2, pp:271-291 [Journal]
  26. Chi-Chun Lo, Shuenn-Jyi Wang
    A histogram-based moment-preserving clustering algorithm for video segmentation. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2003, v:24, n:14, pp:2209-2218 [Journal]
  27. Chi-Chun Lo, Wei-Hsin Chang
    A multiobjective hybrid genetic algorithm for the capacitated multipoint network design problem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2000, v:30, n:3, pp:461-470 [Journal]
  28. Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Muhammad Younas
    A fuzzy outranking approach in risk analysis of web service security. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2007, v:10, n:1, pp:47-55 [Journal]

  29. Service Selection Based on Fuzzy TOPSIS Method. [Citation Graph (, )][DBLP]


  30. A Reputation-Based Service Selection Scheme. [Citation Graph (, )][DBLP]


  31. Authentication protocols for the broadband ISDN billing system. [Citation Graph (, )][DBLP]


  32. Security issues on B-ISDN billing system. [Citation Graph (, )][DBLP]


  33. A Study on Representation of QoS in UDDI for Web Services Composition. [Citation Graph (, )][DBLP]


  34. Fuzzy Similarity Clustering for Consumer-Centric QoS-Aware Selection of Web Services. [Citation Graph (, )][DBLP]


  35. A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002