Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lih-Chyau Wuu
@article{DBLP:journals/jifs/KuoWKW19, author = {Wen{-}Chung Kuo and Chun{-}Cheng Wang and Shao{-}Hung Kuo and Lih{-}Chyau Wuu}, title = {Verifiable data hiding scheme with tamper detection}, journal = {J. Intell. Fuzzy Syst.}, volume = {36}, number = {2}, pages = {1311--1321}, year = {2019}, url = {https://doi.org/10.3233/JIFS-169902}, doi = {10.3233/JIFS-169902}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/KuoWKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangKHW18, author = {Chun{-}Cheng Wang and Wen{-}Chung Kuo and Yu{-}Chih Huang and Lih{-}Chyau Wuu}, title = {A high capacity data hiding scheme based on re-adjusted {GEMD}}, journal = {Multim. Tools Appl.}, volume = {77}, number = {5}, pages = {6327--6341}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4541-0}, doi = {10.1007/S11042-017-4541-0}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/WangKHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/KuoSHW17, author = {Wen{-}Chung Kuo and Po{-}Wei Shih and Yu{-}Chih Huang and Lih{-}Chyau Wuu}, title = {Anonymous and Authentication Protocol For Multi-Server}, journal = {Inf. Technol. Control.}, volume = {46}, number = {2}, pages = {235--245}, year = {2017}, url = {https://doi.org/10.5755/j01.itc.46.2.13781}, doi = {10.5755/J01.ITC.46.2.13781}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/KuoSHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoLWWH16, author = {Wen{-}Chung Kuo and Jyun{-}Jia Li and Chun{-}Cheng Wang and Lih{-}Chyau Wuu and Yu{-}Chih Huang}, title = {An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {136--140}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.20}, doi = {10.1109/ASIAJCIS.2016.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoLWWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/KuoLWW15, author = {Wen{-}Chung Kuo and Po{-}Yu Lai and Chun{-}Cheng Wang and Lih{-}Chyau Wuu}, title = {A Formula Diamond Encoding Data Hiding Scheme}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {6}, number = {6}, pages = {1167--1176}, year = {2015}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2015/vol6/JIH-MSP-2015-06-009.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/KuoLWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KuoKCW15, author = {Wen{-}Chung Kuo and Shao{-}Hung Kuo and Hong{-}Yi Chang and Lih{-}Chyau Wuu}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Isao Echizen}, title = {Authenticated Secret Sharing Scheme Based on {GMEMD}}, booktitle = {Digital-Forensics and Watermarking - 14th International Workshop, {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9569}, pages = {395--405}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31960-5\_32}, doi = {10.1007/978-3-319-31960-5\_32}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KuoKCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ChenKW14, author = {Bae{-}Ling Chen and Wen{-}Chung Kuo and Lih{-}Chyau Wuu}, title = {Robust smart-card-based remote user password authentication scheme}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {2}, pages = {377--389}, year = {2014}, url = {https://doi.org/10.1002/dac.2368}, doi = {10.1002/DAC.2368}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ChenKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuuHK14, author = {Lih{-}Chyau Wuu and Chi{-}Hsiang Hung and Wen{-}Chung Kuo}, title = {Group Key Management based on (2, 2) Secret Sharing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {3}, pages = {1144--1156}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.03.025}, doi = {10.3837/TIIS.2014.03.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WuuHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/KuoCW13, author = {Wen{-}Chung Kuo and Bae{-}Ling Chen and Lih{-}Chyau Wuu}, title = {Secure Indefinite-Index {RFID} Authentication Scheme with Challenge-Response Strategy}, journal = {Inf. Technol. Control.}, volume = {42}, number = {2}, pages = {124--130}, year = {2013}, url = {https://doi.org/10.5755/j01.itc.42.2.1615}, doi = {10.5755/J01.ITC.42.2.1615}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/KuoCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/ChenKW12, author = {Bae{-}Ling Chen and Wen{-}Chung Kuo and Lih{-}Chyau Wuu}, title = {A Secure Password-Based Remote User Authentication Scheme without Smart Cards}, journal = {Inf. Technol. Control.}, volume = {41}, number = {1}, pages = {53--59}, year = {2012}, url = {https://doi.org/10.5755/j01.itc.41.1.975}, doi = {10.5755/J01.ITC.41.1.975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/ChenKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WuuHC12, author = {Lih{-}Chyau Wuu and Chi{-}Hsiang Hung and Chia{-}Ming Chang}, title = {Quorum-based Key Management Scheme in Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {9}, pages = {2442--2454}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.09.027}, doi = {10.3837/TIIS.2012.09.027}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WuuHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/WuuHC12, author = {Lih{-}Chyau Wuu and Chi{-}Hsiang Hung and Chia{-}Ming Chang}, editor = {Suk{-}Han Lee and Lajos Hanzo and Roslan Ismail and Dongsoo S. Kim and Min Young Chung and Sang{-}Won Lee}, title = {Quorum-based key management scheme in wireless sensor networks}, booktitle = {The 6th International Conference on Ubiquitous Information Management and Communication, {ICUIMC} '12, Kuala Lumpur, Malaysia, February 20-22, 2012}, pages = {15:1--15:6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2184751.2184770}, doi = {10.1145/2184751.2184770}, timestamp = {Thu, 23 May 2019 16:33:14 +0200}, biburl = {https://dblp.org/rec/conf/icuimc/WuuHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WuuHY11, author = {Lih{-}Chyau Wuu and Chi{-}Hsiang Hung and Jyun{-}Yan Yang}, title = {{IP} Traceback Based on Chinese Remainder Theorem}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {6}, pages = {1985--1999}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201111\_12.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WuuHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgec/ChenKW11, author = {Bae{-}Ling Chen and Wen{-}Chung Kuo and Lih{-}Chyau Wuu}, editor = {Junzo Watada and Pau{-}Choo Chung and Jim{-}Min Lin and Chin{-}Shiuh Shieh and Jeng{-}Shyang Pan}, title = {Security on the Design of {RFID} Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response}, booktitle = {Fifth International Conference on Genetic and Evolutionary Computing, {ICGEC} 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011}, pages = {9--12}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICGEC.2011.10}, doi = {10.1109/ICGEC.2011.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgec/ChenKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/WuuLK10, author = {Lih{-}Chyau Wuu and Wen{-}Bin Li and Wen{-}Chung Kuo}, title = {Detour Routing Protocol for Geographic Sensor Networks}, booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)}, pages = {505--510}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/BWCCA.2010.122}, doi = {10.1109/BWCCA.2010.122}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/WuuLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KuoCLW10, author = {Wen{-}Chung Kuo and Jiin{-}Chiou Cheng and Yen{-}Hung Lin and Lih{-}Chyau Wuu}, editor = {Tai{-}Hoon Kim and Young{-}Hoon Lee and Byeong Ho Kang and Dominik Slezak}, title = {High Flexible Sanitizing Signature Scheme Based on Bilinear Maps}, booktitle = {Future Generation Information Technology - Second International Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6485}, pages = {402--412}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17569-5\_40}, doi = {10.1007/978-3-642-17569-5\_40}, timestamp = {Mon, 04 Nov 2019 12:36:13 +0100}, biburl = {https://dblp.org/rec/conf/fgit/KuoCLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/KuoKW10, author = {Wen{-}Chung Kuo and Shao{-}Hung Kuo and Lih{-}Chyau Wuu}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {High Embedding Reversible Data Hiding Scheme for {JPEG}}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {74--77}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.26}, doi = {10.1109/IIHMSP.2010.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/KuoKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/KuoLW10, author = {Wen{-}Chung Kuo and Po{-}Yu Lai and Lih{-}Chyau Wuu}, title = {Adaptive reversible data hiding based on histogram}, booktitle = {10th International Conference on Intelligent Systems Design and Applications, {ISDA} 2010, November 29 - December 1, 2010, Cairo, Egypt}, pages = {1376--1381}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISDA.2010.5687102}, doi = {10.1109/ISDA.2010.5687102}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/isda/KuoLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KuoCLW10, author = {Wen{-}Chung Kuo and Jiin{-}Chiou Cheng and Yen{-}Hung Lin and Lih{-}Chyau Wuu}, editor = {Christopher C. Yang and Daniel Zeng and Ke Wang and Antonio Sanfilippo and Herbert H. Tsang and Min{-}Yuh Day and Uwe Gl{\"{a}}sser and Patricia L. Brantingham and Hsinchun Chen}, title = {Digitally signed document flexible sanitizing scheme based on bilinear maps}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings}, pages = {172}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISI.2010.5484747}, doi = {10.1109/ISI.2010.5484747}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/isi/KuoCLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WuuCHK09, author = {Lih{-}Chyau Wuu and Yen{-}Ju Chen and Chi{-}Hsiang Hung and Wen{-}Chung Kuo}, title = {Zero-Collision {RFID} Tags Identification Based on {CDMA}}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {513--516}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.216}, doi = {10.1109/IAS.2009.216}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/WuuCHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/KuoWSK09, author = {Wen{-}Chung Kuo and Lih{-}Chyau Wuu and Chia{-}Nian Shyi and Shao{-}Hung Kuo}, editor = {Ge Yu and Mario K{\"{o}}ppen and Shyi{-}Ming Chen and Xiamu Niu}, title = {A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method}, booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS} 2009), August 12-14, 2009, Shenyang, China}, pages = {69--72}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HIS.2009.226}, doi = {10.1109/HIS.2009.226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/KuoWSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/WangCW08, author = {Wen{-}Fong Wang and Yi{-}Shian Chen and Lih{-}Chyau Wuu}, editor = {Yan Ma and Deokjai Choi and Shingo Ata}, title = {An Adaptive Control Scheme of Reserved Bandwidth for {RPR} in Steering Mode}, booktitle = {Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2008, Beijing, China, October 22-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5297}, pages = {507--510}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88623-5\_63}, doi = {10.1007/978-3-540-88623-5\_63}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/WangCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WuuLC07, author = {Lih{-}Chyau Wuu and Tzong{-}Jye Liu and Kuo{-}Ming Chen}, title = {A longest prefix first search tree for {IP} lookup}, journal = {Comput. Networks}, volume = {51}, number = {12}, pages = {3354--3367}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.01.023}, doi = {10.1016/J.COMNET.2007.01.023}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WuuLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WuuHC07, author = {Lih{-}Chyau Wuu and Chi{-}Hsiang Hung and Sout{-}Fong Chen}, title = {Building intrusion pattern miner for Snort network intrusion detection system}, journal = {J. Syst. Softw.}, volume = {80}, number = {10}, pages = {1699--1715}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.12.546}, doi = {10.1016/J.JSS.2006.12.546}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WuuHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciit/WuuLY07, author = {Lih{-}Chyau Wuu and Tzong{-}Jye Liu and Jyun{-}Yan Yang}, editor = {Reda Alhajj}, title = {{IP} traceback based on chinese remainder theorem}, booktitle = {Proceedings of the Sixth {IASTED} International Conference on Communications, Internet, and Information Technology, July 2-4, 2007, Banff, Alberta, Canada}, pages = {222--227}, publisher = {{IASTED/ACTA} Press}, year = {2007}, timestamp = {Tue, 26 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciit/WuuLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoscale/HuangLCDW07, author = {Hsiang{-}Lun Huang and Tzong{-}Jye Liu and Kuong{-}Ho Chen and Chyi{-}Ren Dow and Lih{-}Chyau Wuu}, editor = {Jianzhong Li and Wang{-}Chien Lee and Fabrizio Silvestri}, title = {A polymorphic shellcode detection mechanism in the network}, booktitle = {Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {304}, pages = {64}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.4108/infoscale.2007.225}, doi = {10.4108/INFOSCALE.2007.225}, timestamp = {Wed, 28 Nov 2018 12:57:13 +0100}, biburl = {https://dblp.org/rec/conf/infoscale/HuangLCDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WuuLW06, author = {Lih{-}Chyau Wuu and Chih{-}Ming Lin and Wen{-}Fong Wang}, title = {Anonymous and Transferable Coins in Pay-Fair Ecommerce}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {89-D}, number = {12}, pages = {2950--2956}, year = {2006}, url = {https://doi.org/10.1093/ietisy/e89-d.12.2950}, doi = {10.1093/IETISY/E89-D.12.2950}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WuuLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiuW06, author = {Tzong{-}Jye Liu and Lih{-}Chyau Wuu}, title = {Randomized three-state alternator for uniform rings}, journal = {J. Parallel Distributed Comput.}, volume = {66}, number = {10}, pages = {1347--1351}, year = {2006}, url = {https://doi.org/10.1016/j.jpdc.2006.05.009}, doi = {10.1016/J.JPDC.2006.05.009}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LiuW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WuuCL05, author = {Lih{-}Chyau Wuu and Kuo{-}Ming Chen and Tzong{-}Jye Liu}, title = {A longest prefix first search tree for {IP} lookup}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {989--993}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICC.2005.1494497}, doi = {10.1109/ICC.2005.1494497}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/WuuCL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangWH03, author = {Ting{-}Yuan Wang and Lih{-}Chyau Wuu and Shing{-}Tsaan Huang}, title = {A Scalable Core Migration Protocol for Dynamic Multicast Tree}, journal = {J. Inf. Sci. Eng.}, volume = {19}, number = {3}, pages = {479--501}, year = {2003}, url = {http://www.iis.sinica.edu.tw/page/jise/2003/200305\_06.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangWH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/WangWH02, author = {Ting{-}Yuan Wang and Lih{-}Chyau Wuu and Shing{-}Tsaan Huang}, title = {A Scalable Core Migration Protocol for Dynamic Multicast Tree}, booktitle = {9th International Conference on Parallel and Distributed Systems, {ICPADS} 2002, Taiwan, ROC, December 17-20, 2002}, pages = {48}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICPADS.2002.1183377}, doi = {10.1109/ICPADS.2002.1183377}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/WangWH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WuuLS01, author = {Lih{-}Chyau Wuu and Longsong Lin and Shing{-}Chyi Shiao}, title = {Constructing Delay-Bounded Multicast Trees in Computer Networks}, journal = {J. Inf. Sci. Eng.}, volume = {17}, number = {3}, pages = {507--524}, year = {2001}, url = {http://www.iis.sinica.edu.tw/page/jise/2001/200105\_09.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WuuLS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/WuuC01, author = {Lih{-}Chyau Wuu and Hui{-}Chun Chen}, editor = {Pascal Lorenz}, title = {A Scalable Framework for Secure Group Communication}, booktitle = {Networking - {ICN} 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2}, series = {Lecture Notes in Computer Science}, volume = {2094}, pages = {225--238}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47734-9\_23}, doi = {10.1007/3-540-47734-9\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/icn/WuuC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/LinLW00, author = {Longsong Lin and Ming{-}Shou Liu and Lih{-}Chyau Wuu}, title = {Resource reservation and packet scheduling for prioritized delay-bounded multicast}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, {ICON} 2000, Singapore, September 5-8, 2000}, pages = {341--345}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICON.2000.875811}, doi = {10.1109/ICON.2000.875811}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/LinLW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/WuuLLH00, author = {Lih{-}Chyau Wuu and Ming{-}Shou Liu and Longsong Lin and Yao{-}Te Huang}, editor = {Hamid R. Arabnia}, title = {Decentralized Reconfiguration of Multicast Trees on Faulty Networks}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2000, June 24-29, 2000, Las Vegas, Nevada, {USA}}, publisher = {{CSREA} Press}, year = {2000}, timestamp = {Mon, 08 Dec 2003 16:35:08 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/WuuLLH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadband/LinLWT99, author = {Longsong Lin and Ming{-}Shou Liu and Lih{-}Chyau Wuu and Chun{-}Yeh Tsai}, editor = {Danny H. K. Tsang and Paul J. K{\"{u}}hn}, title = {A QoS-Based Resource Reservation Protocol for Priority-Differentiated Delay-Bounded Multicast}, booktitle = {Broadband Communications: Convergence of Network Technologies, {IFIP} {TC6} {WG6.2} Fifth International Conference on Broadband Communications {(BC} '99), November 10-12, 1999, Hong Kong}, series = {{IFIP} Conference Proceedings}, volume = {159}, pages = {549--560}, publisher = {Kluwer}, year = {1999}, url = {https://doi.org/10.1007/978-0-387-35579-5\_46}, doi = {10.1007/978-0-387-35579-5\_46}, timestamp = {Fri, 18 Nov 2022 15:40:45 +0100}, biburl = {https://dblp.org/rec/conf/broadband/LinLWT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LinWTHL99, author = {Longsong Lin and Lih{-}Chyau Wuu and Chun{-}Yeh Tsai and Yao{-}Te Huang and Ruel{-}Yau Liu}, title = {A {CORBA} framework for QoS-guaranteed multicast service in wireless {ATM} networks}, booktitle = {1999 {IEEE} International Conference on Communications: Global Convergence Through Communications, {ICC} 1999, Vancouver, BC, Canada, June 18-22, 1999}, pages = {630--635}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICC.1999.768014}, doi = {10.1109/ICC.1999.768014}, timestamp = {Mon, 23 Nov 2020 08:36:56 +0100}, biburl = {https://dblp.org/rec/conf/icc/LinWTHL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/LiuWLT99, author = {Ming{-}Shou Liu and Lih{-}Chyau Wuu and Longsong Lin and Chun{-}Yeh Tsai}, title = {A fair queueing algorithm for multiple-streams delay-bounded services}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 1999, {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October 1, 1999}, pages = {234--241}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICON.1999.796183}, doi = {10.1109/ICON.1999.796183}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/LiuWLT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/HuangW97, author = {Shing{-}Tsaan Huang and Lih{-}Chyau Wuu}, title = {Self-Stabilizing Token Circulation in Uniform Networks}, journal = {Distributed Comput.}, volume = {10}, number = {4}, pages = {181--187}, year = {1997}, url = {https://doi.org/10.1007/s004460050035}, doi = {10.1007/S004460050035}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/HuangW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WuuH95, author = {Lih{-}Chyau Wuu and Shing{-}Tsaan Huang}, title = {Distributed Self-Stabilizing Systems}, journal = {J. Inf. Sci. Eng.}, volume = {11}, number = {2}, pages = {307--319}, year = {1995}, url = {http://www.iis.sinica.edu.tw/page/jise/1995/199506\_08.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WuuH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WuuH94, author = {Lih{-}Chyau Wuu and Shing{-}Tsaan Huang}, title = {Identity Assignment in Uniform Synchronous Rings}, journal = {Inf. Process. Lett.}, volume = {49}, number = {5}, pages = {257--262}, year = {1994}, url = {https://doi.org/10.1016/0020-0190(94)90064-7}, doi = {10.1016/0020-0190(94)90064-7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/WuuH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/HuangWT94, author = {Shing{-}Tsaan Huang and Lih{-}Chyau Wuu and Ming{-}Shin Tsai}, title = {Distributed Execution Model for Self-Stabilizing Systems}, booktitle = {Proceedings of the 14th International Conference on Distributed Computing Systems, Poznan, Poland, June 21-24, 1994}, pages = {432--439}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/ICDCS.1994.302448}, doi = {10.1109/ICDCS.1994.302448}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/HuangWT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.